home page
advert
home page

Or go to Site Search

"Your data has a social life too"

My old TinHat

home page

"It won't stop a bullet, but I still feel safer wearing it"

Home

 

 

Site Map

Usability
References
Download speed and splitting pages
Colours and contrast

For Web editors
UK usability links
US usability links

Other pages
Contact
Search
Republishing
Privacy Policy
HCI links



UK accessibility
Intro
Site reviews
Simple WAI level A checklist
WAI Standard 'AAA'
Tips for site editors
Non-HTML files (PDFs)
The author

UK government accessibility guidelines
UK guidelines intro
Overlap with WAI Guidelines
Other First Half Elements
Guide to the Second Half
Questionable Elements
Overview for Managers
Using Gov sites as Templates
WAI Standard 'A'
WAI Standard 'AA

 

Archived material from 2000

Email
As private as a postcard
Safe procedures for email
How to avoid junk (spam)
Privacy through encryption

Monitoring by authorities
Monitoring at work
Viruses in email attachments

Reading email headers
Reading attachment file extensions

Hacking
What hackers do
Hacker site links

Viruses
An introduction
In Email and attachments
On Web sites and in software downloads
Protection software
Interpreting file extensions of email attachments
Displaying file extensions in Windows
Assess your risk
I
n Word documents
On Macs
Short glossary
Links

Cookies
An introduction to cookies
More details on cookie contents
Inspecting cookies
Deleting cookies
Deleting cookies in IE6

Allow or disallow?

Disallow/ switch off cookies

Personal data
Your intimate friend the Network manager
Records at your Internet Service Provider

What every Web site can find out about you
Good and bad passwords
Links and further information
Corporate collection of personal data

Children
Internet access
Teenagers
Abuse of trust
Report child pornography

 

 

The authorities (police and intelligence services)
Monitoring your Internet activity
Code-breaking encrypted messages
"Echelon" world-wide surveillance
Eavesdropping mobile calls
Links and more information

Computer bugs & holes
Security holes
Improving your security
Examples of holes
Security tips
Aureate and Radiate

Shopping
How safe is it to shop online?
Personal data - who knows about you?

Security tips
Links and more information

Sexual harassment online
Avoiding harassment
Dealing with harassment
Reading full email headers
Complaining to an ISP about harassment

How safe is it to bank online?

Mobile phones
Your personal tracking beacon

Tracking examples

Other pages
Security and Privacy News
Introduction to Internet Privacy
About TihHat
Contact
Search
Republishing
Privacy Policy
HCI links
Computers as a threat (Bill Joy)
Computers as a threat (Links)
How the Internet works ("Jellybeans in the Park")
Tips on Using Search Engines

copyright Foxglove Media Ltd 2003. See disclaimer and republishing guidelines.