Clicking on banner ads enables JWR to constantly improve
Jewish World Review April 11, 2001 / 18 Nissan, 5761

The Computer Maven by James Derk

JWR's Pundits
World Editorial
Cartoon Showcase

Mallard Fillmore

Michael Barone
Mona Charen
Linda Chavez
Ann Coulter
Greg Crosby
Larry Elder
Don Feder
Suzanne Fields
James Glassman
Paul Greenberg
Bob Greene
Betsy Hart
Nat Hentoff
David Horowitz
Marianne Jennings
Michael Kelly
Mort Kondracke
Ch. Krauthammer
Lawrence Kudlow
Dr. Laura
John Leo
David Limbaugh
Michelle Malkin
Chris Matthews
Michael Medved
Kathleen Parker
Wes Pruden
Sam Schulman
Roger Simon
Tony Snow
Thomas Sowell
Cal Thomas
Jonathan S. Tobin
Ben Wattenberg
George Will
Bruce Williams
Walter Williams
Mort Zuckerman

Consumer Reports

How private is your e-mail; recovering deleted e-messages -- I GET a lot of mail from people who are concerned about their privacy. One of the questions is: can other people read my e-mail?

The answer, of course, is yes. If you send mail from work on a company-owned computer, you should assume it is being read by others. A good rule of thumb is don't put anything in e-mail that you would not want on the company bulletin board. (And e-mail, as some people have learned, is subject to discovery in a lawsuit.) Company officials have the right to read your mail, scan it for certain keywords or just log it. It's their equipment.

What about home computers? While this is more difficult, your mail is not all that secure there, either. Any nerd at your Internet Service Provider can read your mail. The FBI or police (hopefully armed with a warrant) can read your mail. And people can go "back in time" using the backup tapes on your ISP's server, to get mail you thought was deleted.

Even "deleted" mail and files on your hard drive can be pretty easily retrieved with the correct tool and some talent.

If you are concerned about this sort of thing, you may want to consider "encryption" software. This is not something for beginners (or those with AOL e-mail accounts) but this is a way to keep your information relatively private.

The software is called PGP, or "Pretty Good Privacy." It integrates with major e-mail programs such as Outlook, Outlook Express, Lotus Notes and Eudora. You can download it from (in the downloads section). It is free for home users.

What the software does is install optional encryption technology into your e-mail program. You use it for every message you send or just those you pick. Once you install the software, you are issued two "keys." One is your "public" key, which you share with people with whom you correspond. The second is your "private" key, which you use to read and send your messages.

It works like this: If you are using Outlook Express, for example, your new message window now has three new icons, "Launch PGP Keys," "Encrypt" and "Sign." The first keeps the keys from your correspondents handy on a so-called "key ring." The Encrypt command scrambles your outgoing messages using the recipient's public key on your key ring. (When they get it, they use their private key to read it.)

The Sign function works like a digital signature, assuring the recipient the note came from you.

What privacy buffs enjoy most is that even when your mail resides on a server (or your hard drive) the notes are still encrypted and cannot be read without the password. (There's also a "Wipe" function that purports to remove all traces of a file or message from your hard drive. I somehow imagine the FBI has found a way around that, though.)

WEEKLY WEB WONDER: For more about privacy rights, see

James Derk is computer columnist for Scripps Howard News Service. Comment by clicking here.


04/03/01: Internet Explorer 6.0...get rid of temporary Internet files
03/28/01: Tips on traveling with a laptop
03/20/01: Naughty e-mails...which side up...see a castle
03/16/01: Personal choices for the computer
03/06/01: Apollo printers...CD problems...more
02/27/01: Good firewalls to keep your computer safe
02/12/01: How to set up a LAN party
01/30/01: Used computers... picture.exe...other problems
01/23/00: Cool computer tricks

© 2001 SHNS