The recent phone tapping issue not only closed UK’s paper, News of the World, and left its innocent workers at disarray but also incited a clash between the border disregarding merchants (Rupert Murdoch's empire) and the border defending politicians. Almost reminding Clash of civilizations, a Hindu could easily see a clash between Kchhetrias and Vaisyas. Although the paper died, following the clash, BSkyB suddenly survived.
- Proxy address use: In this method surfers use proxy IP address instead of their own IPs. The visited site sees the proxy IP’s location and easily gets fooled.
- Anonymous search: Although search engines keep our search data (that is how you get previously searched keywords in their pages), http://www.ixquick.com/ uniquely deletes data after 48 hours.
- Encrypted data transfer- While use of wired modem is safer than wireless one, unprotected data from the latter is extremely dangerous- more so when bank transactions are done. While username and password protects data from routine offenders, a tunneled data transfer through the Net avoids prying eyes of both ISPs and hackers. Encryption of data offers the better protection. Credit cards use 28 bit encrypted data transfer- even a 3D system for added security.
- 5. Data destruction: Data are like precious diamonds. However, they can bring disaster if placed in the wrong hands. They need deleting.