User Guide

User’s Guide 61
Internet Security and Privacy
The simplest encryption systems use letter shifting, in which a message is
encrypted by shifting every le tter n letters later in the alphabet. For example,
say A is changed toB, andB to C, etc.As long as the recipient knows how you
shifted the letters, they can easily decrypt the message by reversing the
process. Of course, a brute force approach to breaking this sort of encryption
would simply try all possible 26-letter combinations until the final message
was retrieved—not a very strong method of encryption.
Computer encryption uses a much more difficult technique of hiding the
message. Rather than a simple letter-shifting scheme, the original message is
transformed by a mathematical algorithm. The algorithm uses a s ecret “key”
to scramblethe message, and the key is necessaryto unscramble it. The key is
similar to a house key: The moreteeth a key has,the more difficult it is to pick
the lock. Similarly, “strong” encryption uses keys with many “teeth”—in this
case, bits of data.
Therearetwocommonlyusedlevelsofencryption.Theinternationalstandard
is 40-bit encryption, but some sites in the United States use a higher level of
128-bit encryption. The nu mber of bits indicates the length of the key used to
encrypt data. The longer the key, the strongerand more secure the encryption.
On the Web, your browser works with secure Web sites to establish and
manage the encryption that secures information. If your browser security
options include the Secure Sockets Layer (SSL), which ensures
data-transmission privacy, you should turn on this option to facilitate secure
data transmission.
NOTE: Guard Dog’s CheckUp automatically checks your browser’s
security level, and lets you know if you need to change it.
Security on the Web
OneofthemostexcitingWebdevelopmentsistheevolutionofdownloadable,
executable programs. Java and ActiveX are two tools that help developers
create programs that can “live” inside Webpages, and use your Web browser
to automatically run over the Internet. Java allows Web pages to host small
programs called “applets.” When Java-enabled browsers access a Web page
containing Java, they automatically download and run the applets they find
on the page. This is an intriguing development, since it makes it possible to
download and run p rograms over the Web.Complete, Web-driven programs
written entirely in Java are on the horizon. ActiveX is a similar technology,
developed by Microsoft.