Browse Definitions :
Definition

nym

A nym (pronounced NIHM and a shortened form of "pseudonym,") is a name invented by or provided for an Internet user in order to conceal the user's real identity and, in some cases, to expressly create a new and separate Internet identity. Among reasons to have and use a "nym" are these:

  • You want to comment or take part in controversial political or other discussions on the Internet without revealing your opinions to colleagues, friends, or employers
  • You want to send spam (unrequested bulk e-mail) without anyone being able to trace it to you
  • You are a self-declared cracker that wants to talk about it without being identified
  • You simply feel strongly about protecting your privacy on the Internet

There are a number of legitimate reasons for communicating anonymously. The example of a battered spouse seeking help in a Usenet news group or a Web site discussion is sometimes cited.

To use a nym instead of your real e-mail name when sending and receiving e-mail, you can use the services of a remailer , a company with a Web server that accepts e-mail from you and forwards it to its destination with a different return address than yours. Incoming mail to your nym is forwarded to your real Internet address. Some remailing services forward mail through several remailers to make it even harder to trace the source of an e-mail note. There are free or public remailer services. Andre Bacard, author of The Anonymous Remailer FAQ and The Computer Privacy Handbook , divides remailers into: (1) PSEUDO- anonymous remailers, who know the names of the people for whom they are providing anonymity service, and (2) more serious anonymous remailers, who never know your name. Bacard believes that, for most people, the PSEUDO-anonymous is sufficient. It's also much easier to use. Most remailer services disallow the use of spam. Remailing is often combined with encryption using Pretty Good Privacy ( PGP ).

Some companies also allow you to surf the Web anonymously by first linking to an intermediary site that in turn connects you to any Web site you select without that site being able to learn anything about you from your request message.

This was last updated in April 2005
SearchCompliance
  • OPSEC (operations security)

    OPSEC (operations security) is a security and risk management process and strategy that classifies information, then determines ...

  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

SearchSecurity
  • threat modeling

    Threat modeling is a procedure for optimizing application, system or business process security by identifying objectives and ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • bare-metal cloud

    Bare-metal cloud is a public cloud service that offers dedicated hardware resources without any installed operating systems or ...

  • race condition

    A race condition is an undesirable situation that occurs when a device or system attempts to perform two or more operations at ...

  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

Close