Free Essay

Avoiding Identity Theft

In:

Submitted By gurmanlee
Words 1963
Pages 8
Avoiding Identity Theft
Gary Lee
Kaplan University
CM 220
Kelley Gordon

Avoiding Identity Theft Ben Franklin once said “An ounce of prevention is worth a pound of cure” Well this has never been truer than in today’s hi-tech society where our personal information flows freely over the internet. Identity theft has become a wide-spread crime committed by thieves who use stolen personal information to commit various types of fraud. Simply put, identity theft is a crime that takes your personal information and uses it to open unauthorized accounts, make purchases and acquire loans without the victim’s knowledge. So in order to protect against identity theft citizens should understand how identity thieves work, guard their personal information, and learn what measures to take if this does happen to them. No one is safe from identity theft but the elderly are especially vulnerable. Americans over the age of 60 are the fastest growing segment of computer and Internet users today. And according to the FBI, they are also the targets of identity theft more often than anyone else (FBI, 2011). Identity thieves target senior citizens because they don't regularly check credit-card statements, review credit reports or monitor their bank statements. Identity theft can be broken down into two separate categories (Identity Theft & Identity Fraud) since it is actually a two part crime. Identity theft is the actual act of obtaining personal information of an individual without his or her knowledge. Many of these thieves never use the information they obtain; they sell it to a third party for cash. Identity fraud is the actual use of the personal information to obtain financial gain such as unauthorized purchases or creating fraudulent accounts in the victim’s name.

Avoiding Identity Theft Approximately 15 million U.S residents have their identities stolen each year with financial losses totaling upwards of $50 billion dollars. This equates to approximately 7% of all adults having their identity stolen and misused for an average $3,500 dollars each (TransUnion, 2011). Many of these stolen identities are obtained through scams such as phishing emails, dumpster diving for information or just plain old fashioned stolen wallets. According to TransUnion credit company 32% of identity theft victims discovered a family member or relative was responsible for stealing their identity. That same study found 18% were victimized by a friend, neighbor or in-home employee (Transunion, 2011). Identity theft can also happen on the corporate level where the individuals have no control whatsoever. Identity theft affects individuals in many ways. First and foremost is financial; it takes the average identity theft victim $500 dollars out of pocket expense and 30 hours of personal time to resolve an identity theft crime (Transunion 2011). Even though victims are not liable for the bills accumulated by the thieves they will have to endure the anxiety and frustration of spending months or even years, restoring their good name and credit history to its prior status. Financial institutions such as banks and lenders usually only hold the victim responsible for the first $50 dollars of a fraudulent charge but it is often up to the victim to prove his or her innocence with very little help from these institutions. So even with new and improved laws to protect the victims in these crimes and better methods of catching the thieves that perpetrate them we as individuals are still often presumed guilty until proven innocent.

Avoiding Identity Theft
The first order of business for any identity thief is to gain knowledge of an individual’s personal information. This can be accomplished by something as simple as a lost or stolen wallet, mail or even dumpster diving for discarded documents with personal information on it. Phishing is the method of choice used by most identity thieves today. This technique involves a fraudulent email that looks like an official notice or questionnaire from a business such as the individuals banking institution or credit card company. The email will ask the person to verify or fill in some personal information and thinking they are filling out an official document they unknowingly give their personal information to the thieves. According to Jeff Orloff of All Spammed Up.Com phishing scams cost corporations 98 billion dollars a year (Orloff, 2012).
Other methods of obtaining one’s personal information are not so sophisticated. Searching through trash or (dumpster diving) is a common technique or maybe something as simple as a stolen or lost wallet. This will give the identity thief everything he or she needs to steal an individual’s identity. In recent years identity thieves have moved more in the high tech direction with what is known as card skimming. Skimming is when an individual’s credit card information is stolen via a device that reads and stores the information off the magnetic strip stored on the card. These devices can be carried in the pocket of any cashier or restaurant host making it easy for them to swipe your card in an instant. The methods used by these thieves are getting better by the day so we have to stay diligent and stay one step ahead of them.
Avoiding Identity Theft Preventing identity theft is not a difficult thing to do; common sense is ones biggest ally in this endeavor. Phishing emails can be very difficult if not impossible to spot, so the number one rule here is never open a link from an email. If you want to check the validity of the email close the email completely and go directly to website that sent it such as the financial institution or credit card company and log in there. If they have any questions or comments for the customer they will be posted in the account information area. One of the most common ways of stealing an identity is dumpster diving, this is also the easiest to overcome. Shred, Shred, Shred. Shredding documents only takes a few seconds and insures all of the private information stays private.

Card skimming has become a favored technique in recent years; it is quick and simple to do with the right tools. Anyone using a credit card can fall victim to this scam. Preventing this from happing requires that you never let your card out of your site. Always watch as your card is being swiped even at restaurants. Another common place to find skimmers is attached to ATM machines and other card readers. When you approach a card reader of any type always inspect the slot for attached devices or other indications that the machine may have been tampered with, if the machine does not look quite right do not insert the card. In short identity thieves are getting better and more sophisticated at stealing personal information so we as individuals have to stay diligent in our effort to stay one step ahead of them.

Avoiding Identity Theft A controversial topic among many is Identity Theft Protection Services. I am sure you have seen the commercials where the gentleman publishes his social security number on the side of a delivery truck in order to prove how safe his identity is with this particular company protecting it. Well what he doesn’t tell you according to (Zetter, 2010) is that his identity has been stolen 13 times since he made his social security number public. Yes these companies will for a fee monitor an individual’s credit or public records for any suspicious charges and will help clean up the mess left behind in the wake of identity theft and assist the victim in rebuilding his or her credit. What they don’t tell you is they don't monitor certain types of identity theft, such as prior instances of identity theft, Social Security number fraud, debit card fraud, criminal identity fraud which is when a criminal assumes your identity when arrested and medical fraud which is basically the same as criminal identity fraud but the thief uses the victim’s identity to receive medical treatment According to an article in SmartMoney if an individual takes time to monitor his or her credit and takes the necessary steps to ensure its protection from these thieves then spending money for a service that can do nothing more cannot be justified (Grant, 2008). But for the person that often time procrastinates and seldom checks the status of his or her credit reports then the service may actually be beneficial. Simply put a protection service can do no more to protect the credit of an individual than the individual himself. The real question then is do I want to pay a company to monitor my credit or do I want to do it myself?

Avoiding Identity Theft If a person should find themselves the victim of identity theft there are steps that should be taken as soon as possible. If someone suspects he or she has been the victim of identity theft the first thing he or she needs to do is request a copy of all three credit reports. Individuals are allowed one free copy each year. If fraudulent activity is present then time is of the essence. According to the Federal Trade Commission there are four essential steps one should take in the event of an identity theft crime. Step one is to place a fraud alert on your credit reports, and review your credit reports. Step two is close the accounts that you know, or believe, to have been tampered with or opened fraudulently. Step three File a complaint with the Federal Trade Commission and step four is to file a local police report where the identity theft occurred ("Defend: recover," ). Another important step is to notify credit card companies and banks in writing. Always send your letters by certified mail, and request a return receipt so you can document what the company received and when. Keep detailed files on all transactions for later use if needed. Always get a copy of the police report or at the very least, the number of the report. It can help you deal with financial institutions and creditors who need proof of the crime later. Unfortunately, most first time identity-theft victims are under the assumption that the police, financial institutions, and others in official positions will help them, but this often times just isn’t the case. Many times it is up to the victim to clear his or her name with very little help if any. Identity theft is not going away anytime soon so we as individuals must rely on good common sense, education, and precautionary measures to protect the information the thieves so desperately want. This can be done by keeping all personal information in a safe place, shredding personal documents and monitoring credit reports. Remember an ounce of prevention is worth a pound of cure.

References PR Newswire US PR, N. (2012, October 28). How to Catch a Phish: In Time for National Consumer Protection Week, Visa Releases Tips to Spot Email Phishing Scams. Retrieved from Kaplan Library

FBI. (2011). The fbi. Retrieved from http://www.fbi.gov/aboutus/investigate/cyber/identity_theft

Transunion. (2011). Identity theft facts- transunion.com. Retrieved from http://www.transunion.com/personal-credit/identity-theft-and-fraud/identity-theft-facts.page

Grant, K. B. (2008, July 14). Smartmoney. Retrieved from http://www.smartmoney.com/spend/family-money/4-reasons-to-forgo-credit-monitoring-services-23454/

Orloff, J. (2012, September 5). Phishing: A Look Inside the Statistics. Anti spam, anti phishing and email security in business - AllSpammedUp.com. Retrieved October 30, 2012, from http://www.allspammedup.com/2012/09/phishing-a-look-inside-the-statistics/
Defend: recover from identity theft. (n.d.). Retrieved from http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html Zetter, K. (2010). Retrieved from http://www.wired.com/threatlevel/2010/05/lifelock-identity-theft/

Similar Documents

Free Essay

Protection Against Identity Theft

...Protection Against Identity Theft Identity theft is a crime that can easily ruin one’s life and cause extreme suffering and loss. Criminals have been using other people’s identity since the beginning of time to commit crimes, achieve financial gain, and for many other illegal purposes. Since the rise in the popularity of the Internet, identity theft has also been on the rise. “Approximately 15 million United States residents have their identities used fraudulently each year with financial losses totaling upwards of $50 billion.” (Douglas, 2012) By securing someone else’s personally identifiable information (PII), a criminal with enough knowledge about the Internet could illegally gain access to medical records, bank accounts, and many other aspects of the unknowing victim’s life. This is why protecting one’s personally identifiable information is paramount in avoiding identity theft. There are many methods criminals can use to acquire PII but there are many ways one can protect their information as well. It is easier to protect PII by practicing several simple habits rather than forfeiting time, effort, and potentially large sums of money after one’s identity has been compromised. The United States Department of Justice suggests several easy tips to help avoid becoming a victim of identity theft. Individuals should be stingy about releasing their PII to anyone they do not know or trust. (Identity Theft And Identity Fraud, 2014) It is common to receive phone calls...

Words: 1008 - Pages: 5

Premium Essay

Idenity Theft

...Identity theft Identity theft surrounds us every day. from people stealing other people’s info and using it to gain credit or just to get out of trouble .identity theft can be as easy as just using someone’s name to using their whole identity, like name social security numbers . Anyone can go online if they have this information and apply for any type of credit which would assume your identity. Many creditors are hard to go through to prove that it wasn’t you. They will require many documents to prove the fact. People don’t even have to be online to steal your identity they can do it by copying your credit card information at your local restaurant to the local deli. In short it shows how very easily wrong doing can be done and a person can be misrepresented by just a simple click of a mouse or swipe of a card, some identify thieves have been as easy as using a smart phone to take pictures of the selected credit card and use it to buy many things in all running u a high bill then not worried about it cause usually hard to trace that it wasn’t you cause they have the stuff sent to a po box or different address. Best way to lower some identity theft is when you get any credit card applications in the mail shred those if you have a shredder this will stop identity theft people from being able to steal your identity and use it for their own personal gain. There are programs out there like life lock and credit karma that help you to watch your credit report so you can see if there...

Words: 565 - Pages: 3

Free Essay

Internet Fraud

...Internet Fraud Today we live in a modernized society that is dependent on computers and the internet like the human body is dependent on its brain and heart for ordinary daily function. In 1973, the U.S. Defense Advanced Research Projects Agency (DARPA) initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. The objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks. This was called the Inter netting project and the system of networks which emerged from the research was known as the "Internet. (2) The Internet is constantly developing, becoming a greater power each day and it has affected our world in various negative and positive ways. The internet serves as an important data base worldwide. It is the greatest source of information, news, entertainment, education and even local and global interactions such as sales and trade are performed through the internet making life so much easier and hustle free. Computers are emerging almost in every aspect of our lives usually they are making everything very convenient for us, permitting us to shop from home, research information, work online, and communicate with our friends, family and acquaintances all around the world with speed. As technology continues to improve more benefits and disadvantages start to evolve. Internet access is no longer a luxury...

Words: 1347 - Pages: 6

Premium Essay

Identity Theft

...Identity is yours and only yours “But he that filches from me my good name/Robs me of what not enriches him and makes me poor indeed” --- Shakespeare Crimes are not always on the rise; with tough and stringent laws and hard work of excellent law enforcement agencies the rate of crime can always be controlled. For example the crime rate in the New York City went down considerably in the beginning of this decade, with the introduction of new policies by the new government. There is one type of crime, which has consistently grown every year in the last decade, and also has been the fastest growing crime. It is a neither gun crimes nor the use and abuse of certain drug; it is identity theft. When searched for fastest growing crime on google.com the unanimous answer turned out to be identity theft. This crime basically proves that there is no doubt in the fact that there is something going wrong when dealing with identity theft. It seems like there is a piece of the puzzle which is missing. The main focus of this paper is to put some light on the issues concerning with identity theft, how it takes place in various manners and what are the current laws in place to act against identity theft. The role of credit card companies to deal with identity theft is also mentioned. Identity theft and identity fraud are words used to refer to all degrees of crime in which someone wrong fully acquires and exploit individual private information in numerous ways that engage scam or trickery...

Words: 1086 - Pages: 5

Premium Essay

Identity Theft

...IDENTITY THEFT NAME: INSTITUTION: IDENTITY THEFT Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005). There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards or phone accounts in the names of their victims. These victims may not learn out about it for some period of time, until they notice some charges they did not make, or are contacted by a person or people claiming that they owe them. It may sometimes cost them hundreds or thousands of dollars and a lot of time while trying to undo the damage (Keith, 2005). Identity theft could ruin an otherwise spotless reputation. It could also lead to much suffering if the victims are held responsible for the thief’s actions. TYPES OF IDENTITY THEFT Identity theft can be divided into the following categories: • Criminal identity theft, that is, pretending to be another person when arrested for an offense • Child identity theft. • Financial identity theft, that is, using the identity of another...

Words: 1923 - Pages: 8

Free Essay

Annotated Bib

...potential victims of identity theft through text messaging and what to look for in case you may or have fallen victim for bogus text messages. It also gives you a list of things such as offers for gift cards and free gifts that you may have won out of nowhere. Also this article explains the dangers of clicking on unfamiliar websites that will download malware on to your system unknowingly if you click on it. The Price of Identity Theft . (2013). Retrieved from http://www.identitytheftfacts.com/articles/price-of-identity-theft/ “How thoroughly you manage to recover from an incident of identity theft depends how quickly you get things moving. Delays can cost you big bucks, but decisive action can save your bacon” This article talks about the steps you should take in order to protect yourself and your information. It also explains the different emotional side effects people experience after identity theft. Child Identity Theft. (2013). Retrieved from http://www.identitytheftfacts.com/articles/child-identity-theft-2013/ Already rampant and increasing in frequency of occurrence, child identity theft represents an attractive form of fraud, because crooks can take out credit in their victim's name and have it go without notice for years. This article shows parents valuable ways to secure their child’s future and information that normally goes unnoticed until they reach the age of 18 by then it’s too late. Singletary, M. (2013, Jan 20). In the age of identity theft, you need a friend...

Words: 463 - Pages: 2

Premium Essay

Aa Afaff

...Preventing Data Security Breaches And Identity Thefts Information Technology Essay Current online marketing strategies deliver immense benefits to the modern global firm by way of better market reach, cheap and convenient transaction possessing, multiple online payment options and real time consumer data management. Marked benefits are commonly discernible in the area of internet based business-to-business or B2B, and business-to-consumer or B2C e-commerce models. These online commerce models rely on digital marketing for their success, which in turn in essentially a remarkable success of information technology and data management techniques. However, the growth of digital marketing is getting severely affected by the misuse of technology by criminals and unscrupulous persons in various ways. Such misuse of technology encompasses identity theft, data loss and other data security breaches. Increasing information security breaches and cases of identity theft in recent times threaten the marketing of products and services either online or offline like never before. This paper attempts to understand issues and outcomes of identity theft, data loss and security breaches on the present and future global marketing environment by examining several secondary sources of information. 2. What is identity theft? We can help you to write your essay! Professional essay writers Our writers can help get your essay back on track, take a look at our services to learn more about how we can...

Words: 3128 - Pages: 13

Premium Essay

Law Paper 2

...Our personal information is always at risk and goes through unimaginable ways of getting it. No matter what advances technology makes there are ways around it. Hackers can be ruthless at cracking codes, finding backdoors, and tactics in fooling secure systems. Google is the largest and most powerful search engine and surprisingly in addition to the information it shares about you on the Internet there is a lot of information that not shared. When using the Google search engine your search history reveals a lot about you like your beliefs, associations and other personal information. Anytime that you are visiting websites cached copies of those sites are saved and your activities links to they call “Internet identity” and remains the Google database for a very long time. Bluetooths have proved to be a helpful device for cell phones and hackers now have found ways to them in stealing people’s information. Many of the new cell phones have Bluetooth by for uses like wireless headsets, in-car connectivity, and syncing for your computer. This device allows hackers to do many things with this automated process being so simple in just walking around for as long periods of time collecting as much data as possible and then manipulate it. After the software hackers use searches and connect to a susceptible Bluetooth capable cell phone and began to download things like information from your address book, daily agendas and information off SIM card by phone calls using hacked device and bug...

Words: 1043 - Pages: 5

Free Essay

Idenitty Theft

...been a victim of identity theft. What is identity theft you ask? It is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. According to the national association of the attorneys general, “Identity theft is one of the fastest growing crimes in the nation with an estimated 700,000 victims each year and after the victim discovers their theft, they spend an average of 808 dollars to clear up the discrepancies along with 175 hours approx. Restoring their reputation by means of notifying the credit bureaus, cancelling cards, and negotiating with creditors (2006.) Currently those numbers are now even higher at 1,495 dollars in expenses and 609 hours to clean up credit”. Identity theft happens all the time. This is partly caused because of who you trust and what you put on the internet. In the paragraphs to come we will get into the types and stages of identity theft, who it affects and how you can protect yourself. According to the NIJ (National Institute of Justice), there are seven broad types of identity theft and three stages. The Seven stages are exploiting weakness in specific technologies and information system, financial scams, a motive for other crimes, facilitating other crimes, avoiding arrest, repeat victimization (“classic” identity theft), and organized identity theft. The three stages...

Words: 1118 - Pages: 5

Premium Essay

Dumpster Fraud Research Paper

...Technology is abundant and the knowledge of being able to use the technology can be easily manipulated. Hackers and criminals like to use two different techniques, non-technological schemes and technological schemes. Non – technological schemes include dumpster diving, mail theft, social engineering, and shoulder surfing and stealing personal items. This technique is exactly what it sounds like the criminal or hacker does not use technology but will use theft and other diversions to gather personal information. Dumpster diving is the act of going through somebody else’s garbage to obtain personal information off of the items found in the garbage. To protect yourself from this you should shred everything before throwing it away. You could also go paperless and get online bank...

Words: 1134 - Pages: 5

Free Essay

Devry Eng 135 Week 1

...gov/news-events/press-releases/2015/02/identity-theft-tops-ftcs-consumer-complaint-categories-again-2014 http://blog.fraudfighter.com/bid/94512/Aug-14-2013-Identity-Theft-The-Fastest-Growing-Crime-in-America How can I prevent identity theft? Some of the things you can do and not a victim yet is to monitor your credit and keeping your information safe. We talked about not only making sure your information is safe when you’re out in the public, such as only carrying one credit card when you really need it, not carrying your social security card and birth certificate just to name a few, We don’t need to have these things with us everyday. Just keep the common things you need with you every day, like your drive’s license, one credit card, just to be safe. Don’t carry your checking account if you don’t need to write a check because again someone could take that information and really start writing checks that aren’t yours and can start causing a lot of damage down the road. Another things is when you’re checking credit, make sure that you’re checking it on a regular basis. You can get one free copy of your credit report from each of the three credit bureaus each year. So if you want to check that systematically, you could pull your first one from Equifax, and then three or four months later pull the next one from Experian, and then three or four months later pull the next one from Trans Union. So keeping up to date with what’s going on is key when preventing or avoiding identity theft. Another thing...

Words: 4147 - Pages: 17

Free Essay

Identity Theft

...Abstract The Federal Trade Commission considers identity theft to be the fastest growing crime in the country. The Internet has become a hot zone for attracting identity theft thieves to steal personal information. Identity theft is divided into four basic areas – financial identity theft, criminal identity theft, identity cloning and business and commercial identity theft. Criminals obtain our personal information through methods such as using an insider, dumpster diving, computer hacking, war driving, phishing and pre-texting. The Department of Justice prosecutes identity theft under federal statutes. Congress passed the Identity Theft and Assumption Deterrence Act, Title 18 United States Code 1028 in 1998. One of the most noted identity theft cases was USA v. Cummings. The largest hacking and identity theft case ever prosecuted by the Department of Justice involved eleven people who stole more than forty million credit and debit card numbers. To severely curtail on identity theft, President Bush mandated Executive Order 13402 called the Identity Theft Task Force. Identity theft causes immeasurable damage to peoples’ names and reputations. Greater awareness and education will help us to combat identity theft. Identity Theft It’s a nightmare that can leave an unsuspecting person feeling violated and vulnerable. It doesn’t care who you are or where you live. Gender, race and age are totally irrelevant. In this modern technological age, it is a crime that can realistically...

Words: 2466 - Pages: 10

Free Essay

Demat

...account with no balance of shares, there is no minimum balance is required Documents required for opening a Demat Account?   1) To open a demat account you have to fill demat request form  2) One Passport size photograph, proof of address like Voter ID card, electricity bill or Ration Card, Employee ID Card, Bank attestation and Latest IT Return 3) Submit the DRF & share certificate(s) to DP. DP would forward them to the issuer / their R&T Agent. 4) Deface the share certificate(s) you want to dematerialize by writing across Surrendered for dematerialization  5) After dematerialization, your depository account with your DP would be credited with the dematerialized securities.  6) You have to Submit the PAN Card as a proof of identity .As of April 2006 it ismandatory, if any person want to open a demat account should have a PAN CARD (Permanent Account number) .Without a PAN CARD you are not be eligible to open a Demat account Benefits of Demat Account * Nomination facility is available in...

Words: 415 - Pages: 2

Premium Essay

Social Media

...Strategic Communication Consultants COMM/470 New Media Tools There are many social media tools that may be used to distribute messages to consumers and clients, the question is, which is would best hit the targeted market. There is Social Media Campaign Managements, which enable users to manage centrally social accounts, organize activities by business objective, schedule conversations for maximum reach, participate in real-time conversations and report on key performance indicators (KPIs).  With this functionality, social marketers reach larger audiences and create higher impact social engagements (Emailvision Powering Smarter Marketing, 2012). There is the SocialOomph, which will allow one to manage the Facebook pages, Twitter accounts, and any other networking media one may have (SocialOomph, 2012). There are 11 features consisting of 63 different functions for manipulating the account even to the point of discovery, which followers have the most clout. Social media is truly a resource to providing connectivity directly to potential customers and clients via e-commerce and networking. As of February 2012, Facebook has more than 845 million active users and continues to be ranked as the most used social networking services by worldwide monthly active users according to Compete.com; an analysis service, which operates in the United States and publishes the approximate number of global visitors to the top 1,000,000 web sites in the world (Wikipedia, 2012). Facebook...

Words: 2906 - Pages: 12

Premium Essay

Computer Crime Journal

...Journal - Week 1, Due 09.28.2014 Beginner’s Guide to Internet Protocol (IP) Addresses Beginner’s Guide to Internet Protocol (IP) Addresses. (2011, Mar. 04). Retrieved on September 26. 2014 from ICANN site: https://www.icann.org/resources/files/ip-addresses-beginners-guide-2011-03-04-en The Beginner’s Guide to IP Addresses is a publication by the Internet Corporation for Assigned Names and Numbers (ICANN), the private sector, non-profit corporation which assumes responsibility for IP address space allocation, protocol parameter assignment, domain name system management, and root server system management functions. The publication is part of the Beginner’s Guide series, published in the interest of educating new users about internet issues. The document details IP addresses, why we need them, protocol version history, implementation/distribution methods, and how these topics affect users. This particular concept is not new to me, but reading the document provided a ‘refresher course’ on topics that I have not recently studied. I use this information and technology on a daily basis - but through the course of use it is easy to step away from the fundamental details. In follow up reading, I find myself curious about the success of implementing IPv6 addressing. I know that it can be done, but have not seen a great deal of evidence that it is being done. As of June, 2014 the percentage of users accessing Google via IPv6 reached a milestone. 4%. While the 4% mark...

Words: 7665 - Pages: 31