Skip to main content

Home/ Internetni praktikum/ Contents contributed and discussions participated by inesmag

Contents contributed and discussions participated by inesmag

inesmag

Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams > Spam - 0 views

  • Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
  • Spam is the common name for unsolicited e-mail and it is a problem that is rampant on the Internet today.
  • Spammers do their dirty work by purchasing or creating giant e-mail lists and automated mailing tools called spambots. The lists are usually compiled from web pages where people provide their e-mail address as part of a registration process.
  • ...2 more annotations...
  • How to Block Spam There is a good chance that your ISP has some sort of spam-blocking feature available and, if spam is a problem for you, we suggest starting there.
  • replying to a spam e-mail does not stop it from coming
inesmag

Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts > Password Sniffing and Accoun... - 0 views

  • Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
  • Password sniffing and account hijacking have become more prevalent in recent years because of Wi-Fi and software that make these hacking techniques so easy
  • Both of the methods we're discussing require the eavesdropper to be connected to the same network as you.
  • ...1 more annotation...
  • These hacking techniques can still be used by other users on private networks using the Personal/Pre-Shared Key (PSK) mode of WPA/WPA2 encryption or the older WEP encryption. However, they can't be used on networks using the Enterprise/EAP mode of WPA/WPA2 encryption, which is usually used only by businesses and requires a separate 802.1X server.
inesmag

Apple value falls below $400bn, as Warren Buffett says 'ignore critics' | Technology | ... - 0 views

  • Apple is still embroiled in a legal tussle with Samsung, once its biggest supplier of phone parts. Photograph: Michaela Rehle/Reuters
  • The company is under increasing pressure from rivals including Google and smartphone manufacturers like South Korean electronics giant Samsung, whose Galaxy line has challenged iPhone's success.
  • Samsung used to be Apple's biggest supplier for phone parts, and Apple its largest customer. But in 2010, Jobs vowed to go to "thermonuclear war" over what he saw as copying of iPhone features by phones using Google's Android operating system.
inesmag

Technology News: Internet: Facebook's Relationship With Developers: It's Even More Comp... - 2 views

  • When it comes to developers working with Facebook, "share and share alike" is the new policy.
  • No one rides the Facebook express for free.
  • "If you use any Facebook APIs to build personalized or social experiences, you must also enable people to easily share their experiences back with people on Facebook," Facebook said in a blog post announcing the change.
  • ...2 more annotations...
  • On one hand it can be argued that Facebook is merely following industry trends; other social networks like Twitter have also banned apps that mimic their core functionality.
  • In short, Facebook is moving aggressively to block Twitter and other social media sites from establishing free-rider status on its site
inesmag

For sale: Your personal info - Feb. 26, 2013 - 1 views

  • Only about 5% of retailers currently have the interest or the ability to market to specific customers based on their location, according to Ingle. Most of what brands are interested in is more generalized information about their customers. But in a rapidly evolving and increasingly mobile marketplace, the brands that arrive late to the location-based targeted advertising game may be left out in the cold.
  • Your smartphone holds a treasure trove of information about you, and cell phone companies are looking for ways to turn that into profit.
  • "An interesting transformation is happening in wireless, in which consumers are no longer customers -- they're the product," said Dan Hays, principal in PricewaterhouseCooper's communications and technology practice. "The trick is for operators to find out how to make money without violating their relationships and trust with their users."
  • ...1 more annotation...
  • "Network operators sit on a goldmine of data," said Kelly Ahuja, general manager of Cisco's service provider mobility group. "We're going to help them capture and apply it."
inesmag

Figuring out the future of online privacy - CNN.com - 1 views

  • They may not be paying for the services directly, but customers still have a lot of power -- and companies know that they need to listen.
  • "We can't just sit back and allow the industry to just continue to ignore a core component of the user experience online," said Alex Fowler, Mozilla's global privacy and public policy leader.
  • The more devices that connect to the Internet, from smart cars to home thermostats, the more data there are about a person to collect.
  • ...5 more annotations...
  • Free versions come with ads, but for a price, people can upgrade to the ad-free experience.
  • It's also possible that over the next five to 10 years, people's attitudes toward privacy and their data will change, and they'll be willing to share more personal information
  • Not everyone will want the same level of privacy,
  • "Do not track" seems like a clear, smart option to give consumers
  • Companies that provide free services, such as search engines or social networks, have to strike the right balance between respecting their customers' privacy concerns and serving advertisers.
inesmag

Google and competition: searching for a solution | Tom Watson | Comment is free | guard... - 1 views

  • Some time later this month we are expecting the European commission to decide how it will proceed with its investigation of the search giant Google, following the latter's submission of proposed remedies at the end of January over allegations that it has engaged in a range of anticompetitive practices.
  • Google is a global company and its activities will require a global solution.
  • Google's global revenues were £23.5bn in 2011. Those are its revenues before tax, although Google's approach to tax is another and equally interesting story. Those vast revenues do not come from those who search, but from those who bid to place advertisements alongside the search results. This means that Google has a clear interest to arrange the rankings in a way that maximises its profits and faces a stark conflict of interests when it does so. It has every incentive to demote other companies, who might actually be offering answers or services that are more relevant to the user queries, and to advance its own services.
  • ...3 more annotations...
  • There is no reason why an appropriate remedy that introduces fair rankings should in any way impair the user experience.
  • that Google, with more than 90% of the search market in Europe, is overwhelmingly dominant.
  • Effective remedies will aim to protect competition for the future but need also to acknowledge the past. Google has continued to expand and exploit its position during the period of the investigation and it will be necessary to find a solution that tackles that past misbehaviour and reintroduces something approaching a level playing field.
inesmag

How to keep your privacy online | Ask Jack | Technology | guardian.co.uk - 2 views

  • I would like my browsing and Google searches to be private. I don't want targeted advertising and I don't want to feel that anonymous companies are harvesting my clicks to learn all about me.
  • When the web was young, and a lot less shiny, web pages were fixed (static) and – barring browser quirks – everybody saw much the same thing. Today, much of the web is dynamic, which means that what you see has been adapted or possibly constructed on the fly just for you.
  • From your point of view, the advantage is that the websites you visit will be personalised to suit your needs and tastes. From the website's point of view, the advantage is that it can also personalise its prices and advertising to try to suit your needs and tastes, and increase your propensity to click and buy.
  • ...6 more annotations...
  • On the web, the rule is: if you're not paying, then you are what's being sold.
  • Probably the simplest way to reduce personalisation is to use an anonymising service. Instead of accessing the web directly, you access it via a third-party proxy server, so your that requests are mixed in with thousands of others. These services usually allow you to control cookies, turn JavaScript on and off, withhold "referrer details" and so on.
  • Nonetheless, it's often useful to have access to an anonymous proxy service, and everybody should find one they like. Examples include The Cloak, Megaproxy, Proxify and ID Zap. There are also networked open source privacy systems such as Tor and I2P.
  • Google also tracks your progress across hundreds of thousands of websites via Google Analytics. To opt out of this, install the Google Analytics Opt-out Browser Add-on (Beta), which Google offers for Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Apple Safari and Opera. However, some sites use different analytics software or track visitors in other ways you will be unaware of. Ghostery may help reduce these.
  • Finally, Facebook Connect is a potential privacy problem because it "allows users to 'connect' their Facebook identity, friends and privacy to any site".
  • In general, the more you do online – social networking, cloud computing etc – the more your privacy and security are at risk. Reducing that risk involves effort and inconvenience, so it's up to you to find an acceptable compromise
1 - 8 of 8
Showing 20 items per page