<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 5 Threats to Watch out for when Using a Public Machine</title>
	<atom:link href="http://www.gfi.com/blog/5-threats-watch-public-machine/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/5-threats-watch-public-machine/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-threats-watch-public-machine</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Emmanuel Carabott</title>
		<link>http://www.gfi.com/blog/5-threats-watch-public-machine/comment-page-1/#comment-22772</link>
		<dc:creator>Emmanuel Carabott</dc:creator>
		<pubDate>Mon, 28 Feb 2011 09:29:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3145#comment-22772</guid>
		<description><![CDATA[Andrew is right, keeping separate passwords for separate services will ensure that if one password is compromised the other system will be safe. It&#039;s good practice that everyone should follow.

Someone could be behind you spying over your shoulder only if you don&#039;t acknowledge their presence. Some good old fashioned eye contact will ensure they move away.]]></description>
		<content:encoded><![CDATA[<p>Andrew is right, keeping separate passwords for separate services will ensure that if one password is compromised the other system will be safe. It&#8217;s good practice that everyone should follow.</p>
<p>Someone could be behind you spying over your shoulder only if you don&#8217;t acknowledge their presence. Some good old fashioned eye contact will ensure they move away.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Miss Sarah</title>
		<link>http://www.gfi.com/blog/5-threats-watch-public-machine/comment-page-1/#comment-22653</link>
		<dc:creator>Miss Sarah</dc:creator>
		<pubDate>Sun, 27 Feb 2011 13:52:25 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3145#comment-22653</guid>
		<description><![CDATA[Aside from using public machines, we should also be careful about using public or free wifi internet connections.

In Starbucks or libraries, an unsecured Internet connection could become a breeding ground for hackers. They can launch and install keylogging, sniffing, and / or phishing  software into your laptops or mobile devices without even you knowing.]]></description>
		<content:encoded><![CDATA[<p>Aside from using public machines, we should also be careful about using public or free wifi internet connections.</p>
<p>In Starbucks or libraries, an unsecured Internet connection could become a breeding ground for hackers. They can launch and install keylogging, sniffing, and / or phishing  software into your laptops or mobile devices without even you knowing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: whatsupman27</title>
		<link>http://www.gfi.com/blog/5-threats-watch-public-machine/comment-page-1/#comment-22287</link>
		<dc:creator>whatsupman27</dc:creator>
		<pubDate>Thu, 24 Feb 2011 08:52:36 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3145#comment-22287</guid>
		<description><![CDATA[Oh man the idea of having someone behind my back is not only threatening but extremely creepy as well. What the heck! But I know it happens. 

At this time when technologies like mobile phones and PDAs can now access the Internet, I really don&#039;t see the need to use public machines.]]></description>
		<content:encoded><![CDATA[<p>Oh man the idea of having someone behind my back is not only threatening but extremely creepy as well. What the heck! But I know it happens. </p>
<p>At this time when technologies like mobile phones and PDAs can now access the Internet, I really don&#8217;t see the need to use public machines.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Joe Bursky</title>
		<link>http://www.gfi.com/blog/5-threats-watch-public-machine/comment-page-1/#comment-22070</link>
		<dc:creator>Joe Bursky</dc:creator>
		<pubDate>Tue, 22 Feb 2011 20:26:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3145#comment-22070</guid>
		<description><![CDATA[&quot;My ideal recommendation would be to avoid using a public computer at all&quot;
I couldn&#039;t agree more! I would recommend exactly the same. It is true that there are cases when you need to use a public computer but with the wider adoption of wireless and the increased power of mobile devices, I hope that soon the number of people who have to use public computers will drop even more. With public networks (i.e. where you connect with your own device) there are still some risks but it is nothing compared to what you are exposing yourself to when using a public computer.]]></description>
		<content:encoded><![CDATA[<p>&#8220;My ideal recommendation would be to avoid using a public computer at all&#8221;<br />
I couldn&#8217;t agree more! I would recommend exactly the same. It is true that there are cases when you need to use a public computer but with the wider adoption of wireless and the increased power of mobile devices, I hope that soon the number of people who have to use public computers will drop even more. With public networks (i.e. where you connect with your own device) there are still some risks but it is nothing compared to what you are exposing yourself to when using a public computer.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Andrew Harris</title>
		<link>http://www.gfi.com/blog/5-threats-watch-public-machine/comment-page-1/#comment-22050</link>
		<dc:creator>Andrew Harris</dc:creator>
		<pubDate>Tue, 22 Feb 2011 18:01:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3145#comment-22050</guid>
		<description><![CDATA[Some online systems use emails for user-logins. It&#039;s very important that for such systems, you don&#039;t use the same password as the one you type for accessing your email. Although most online systems hash or encrypt the passwords stored on the database, their is still a risk that someone might get hold of them. So also make sure that you never use the same email address and password on online applications.]]></description>
		<content:encoded><![CDATA[<p>Some online systems use emails for user-logins. It&#8217;s very important that for such systems, you don&#8217;t use the same password as the one you type for accessing your email. Although most online systems hash or encrypt the passwords stored on the database, their is still a risk that someone might get hold of them. So also make sure that you never use the same email address and password on online applications.</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:34:42 by W3 Total Cache --