Internet Jones and the Raiders of the Lost Trackers

Size: px
Start display at page:

Download "Internet Jones and the Raiders of the Lost Trackers"

Transcription

1 Internet Jones and the Raiders of the Lost Trackers An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner* Anna Kornfeld Simpson* *Joint First Authors in Alphabetical Order Tadayoshi Kohno Franziska Roesner 1

2 Third Party Web Tracking 1. Third party web tracking is important 2. We should be studying web tracking over time 2

3 What is Third Party Web Tracking? I know that user "d04874f3" has visited these sites: tracker.com news.google.com weather.com twitch.tv hulu.com imdb.com foxnews.com zappos.com honda.com jetblue.com 3

4 4

5 Being watched has chilling effects Views and edits of privacy-related Wikipedia articles reduced after leaks of NSA surveillance activities* People donate more for communal coffee when a picture of watching eyes is posted near the coffee** *Penney, Jon. "Chilling Effects: Online Surveillance and Wikipedia Use."Berkeley Technology Law Journal (2016). **Bateson M, Nettle D, Roberts G. Cues of being watched enhance cooperation in a real-world setting. Biology Letters. 2006;2(3): doi: /rsbl

6 Web Tracking 1. Third party web tracking is important 2. We should be studying web tracking over time 6

7 We should study web tracking over time Gomer et al. '13 Roesner, Kohno, and Wetherall '12 Eubank et al. '13 Krishnamurthy and Wills ' Mayer and Mitchell '12 Englehardt et al. '

8 We should study web tracking over time Gomer et al. '13 Roesner, Kohno, and Wetherall '12? 1996 Eubank et al. '13 Krishnamurthy and Wills ' Mayer and Mitchell '12 Englehardt et al. '

9 Time Travel 9

10 Time Travel 10

11 11

12 The Wayback Machine 12

13 The Wayback Machine 13

14 ~11 petabytes of web sites archived! 14

15 ~11 petabytes of web sites archived! Includes JavaScript! HTTP headers! CSS! Images! Hosted on web servers! 15

16 The Wayback Machine enables us to perform retrospective web measurements 16

17 This Talk A 20 year longitudinal study of third party web tracking, performed using archival web data 17

18 Abstract 18

19 Abstract Insight: Web archives exist (e.g., Wayback Machine) 19

20 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent 20

21 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator 21

22 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator Validation: Comparison of archival measurements to ground truth 22

23 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator Validation: Comparison of archival measurements to ground truth Measurement Results: A picture of web tracking over the last 20 years 23

24 Background How does Third Party Web Tracking Work? A first-party is a domain to which a user goes intentionally, by typing a URL or clicking a link. A third-party is a domain whose content is embedded in a first-party web page. 24

25 Background How does Third Party Web Tracking Work? A first-party is a domain to which a user goes intentionally, by typing a URL or clicking a link. If a third party is able to link together A third-party is a domain whose content is embedded in a a subset of a person's browsing first-party web page. history, we call this ability 3rd Party Web Tracking. 25

26 Background How does Third Party Web Tracking Work? logo tracker.com ad 26

27 Background How does Third Party Web Tracking Work? logo tracker.com ad theonion.com 27

28 Background How does Third Party Web Tracking Work? logo tracker.com ad theonion.com 28

29 Background How does Third Party Web Tracking Work? logo tracker.com ad theonion.com 29

30 Background How does Third Party Web Tracking Work? logo tracker.com ad 30

31 Background How does Third Party Web Tracking Work? logo tracker.com ad 31

32 Background How does Third Party Web Tracking Work? logo Set this cookie: id=789 tracker.com ad Browsing profile for user 789: theonion.com 32

33 Background How does Third Party Web Tracking Work? logo Set this cookie: id=789 tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com 33

34 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad 34

35 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad cnn.com 35

36 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad cnn.com 36

37 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad 37

38 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad My cookie is: id=789 38

39 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com, cnn.com logo ad My cookie is: id=789 39

40 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com, cnn.com logo ad My cookie is: id=789 40

41 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com, cnn.com logo ad 41

42 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 42

43 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 43

44 Our Tool, TrackingExcavator, and the Challenges of Retrospective Measurements 44

45 TrackingExcavator 45

46 TrackingExcavator Input Munging 46

47 TrackingExcavator Input Munging Automatic Browsing 47

48 TrackingExcavator Input Munging Automatic Browsing 48

49 TrackingExcavator Input Munging Automatic Browsing Data Analysis & Visualization 49

50 What Makes this Hard? Cookies don't work in the archive Incomplete archives Inconsistent archives ("anachronisms") 50

51 Cookies don't work in the archive Set-cookie: id=789 becomes... X-Archive-Orig-Set-cookie: id=789 51

52 TrackingExcavator Cookie simulation Input Munging Automatic Browsing Data Analysis & Visualization 52

53 What Makes this Hard? Cookies are weird in archival environments Incomplete archives Inconsistent archives ("anachronisms") 53

54 Incomplete Archives Set-cookie: id=789 Set-cookie: oatmeal=raisin Set-cookie: chocolate=chip 54

55 55

56

57 57

58 Fortunately, we can still count requests to missing resources! 58

59 59

60 Robots.txt files User-agent: * Disallow: /search Allow: /search/about Disallow: /sdch Disallow: /groups Disallow: /index.html? Disallow: /? Allow: /?hl= Disallow: /?hl=*& Allow: /?hl=*&gws_rd=ssl$ Disallow: /?hl=*&*&gws_rd=ssl Allow: /?gws_rd=ssl$ Allow: /?pt1=true$ Disallow: /imgres... 60

61 Robots.txt files The Wayback Machine respects these preferences retroactively! User-agent: * Disallow: /search Allow: /search/about Disallow: /sdch Disallow: /groups Disallow: /index.html? Disallow: /? Allow: /?hl= Disallow: /?hl=*& Allow: /?hl=*&gws_rd=ssl$ Disallow: /?hl=*&*&gws_rd=ssl Allow: /?gws_rd=ssl$ Allow: /?pt1=true$ Disallow: /imgres... 61

62 TrackingExcavator Input Munging Automatic Browsing Data Analysis & Visualization 62

63 Inconsistent Archives 63

64 From 64

65 From 65

66 Block non-archival web requests Input Munging Automatic Browsing 66

67 Timestamp filtering Input Munging Automatic Browsing Data Analysis & Visualization 67

68 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 68

69 Validation of Archival Data 69

70 Validation of Archival Data vs. Ground Truth UW NSDI 2012 paper* (and follow-up measurements) provided a taxonomy of web tracking and ground truth data over the last 5 years *Roesner, Franziska, Tadayoshi Kohno, and David Wetherall. "Detecting and defending against third-party tracking on the web." Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association,

71 Archival trends reflect ground truth trends 71

72 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 72

73 Measurement Results 73

74 Measurement Results "Web Tracking has Increased Over Time" 1. Number of trackers 2. Type of tracking employed 3. Coverage of top trackers 74

75 Measurement Results "Web Tracking has Increased Over Time" 1. Number of trackers 2. Type of tracking employed 3. Coverage of top trackers 75

76 76

77 Measurement Results "Web Tracking has Increased Over Time" 1. Number of trackers 2. Type of tracking employed 3. Coverage of top trackers 77

78 78

79 79

80 The power of individual trackers has grown over time. Individual companies know more about your browsing history than they did before. 80

81 google-analytics.com 81

82 Individual companies' choices are important to your privacy Transparency is important 82

83 The "Worst" Days of the Web

84 The Worst Days of the Web accessed Aug

85 The "Worst" Days of the Web Popups enable stronger tracking 85

86 The "Worst" Days of the Web

87 The "Worst" Days of the Web 2004: Internet Explorer starts popup-blocking by default

88 The "Worst" Days of the Web The choices of browser manufacturers, even those unrelated to tracking, 30 third-party popups influence the way trackers behave (top 500 sites) significantly

89 We should study web tracking over time Gomer et al. '13 Roesner, Kohno, and Wetherall '12 Eubank et al. '13 Krishnamurthy and Wills ' Mayer and Mitchell '12 Englehardt et al. ' The Future This Work 89

90 Adam, Anna, Yoshi, & Franzi say: "Thanks!" Insight: Web archives exist (Wayback Machine) Challenges: Web Archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator Validation: Comparison of archival measurements to ground truth Measurement Results: A 20 year picture of third party web tracking 90

The Invisible Trail: Third- Party Tracking on the Web

The Invisible Trail: Third- Party Tracking on the Web The Invisible Trail: Third- Party Tracking on the Web Franziska Roesner Assistant Professor Computer Science & Engineering University of Washington The Invisible Trail: Third- Party Tracking on the Web

More information

Security, Privacy, & User Expectations:

Security, Privacy, & User Expectations: Security, Privacy, & User Expectations: Case Studies in Web Tracking and Application Permissions Franziska Roesner Assistant Professor Computer Science & Engineering University of Washington Security,

More information

Third-Party Tracking on the Web

Third-Party Tracking on the Web CSE 484 / CSE M 584: Computer Security and Privacy Third-Party Tracking on the Web Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Web Security. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Web Security. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Web Security Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

On the Change in Archivability of Websites Over Time

On the Change in Archivability of Websites Over Time Old Dominion University ODU Digital Commons Computer Science Presentations Computer Science 9-23-2013 On the Change in Archivability of Websites Over Time Mat Kelly Old Dominion University Justin F. Brunelle

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner

CSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner CSE 484 / CSE M 584: Computer Security and Privacy Usable Security Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, Ada Lerner,

More information

Identifying and Preventing Conditions for Web Privacy Leakage

Identifying and Preventing Conditions for Web Privacy Leakage Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals

More information

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web

Security and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/

More information

Private Information Leakage on the Mobile Web

Private Information Leakage on the Mobile Web Private Information Leakage on the Mobile Web Amanda Kirk, Stephen Rice, Zach Azar, Yipu Wang amankirk@cs.du.edu, steprice@cs.du.edu, ZachAzar@cs.du.edu, yipu.wang@du.edu 11/18/13 COMP 4704: Foundations

More information

Cryptography: Symmetric Encryption [continued]

Cryptography: Symmetric Encryption [continued] CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption [continued] Fall 2016 Ada (Adam) Lerner lerner@cs.washington.edu Thanks to Franzi Roesner, Dan Boneh, Dieter Gollmann,

More information

Iowa IDEA Supported Browsers and Settings Updated 2/9/2009

Iowa IDEA Supported Browsers and Settings Updated 2/9/2009 Iowa IDEA Supported Browsers and Settings Updated 2/9/2009 The Iowa IDEA applications are supported on the following platforms and browsers: Macintosh OS 10.4 with Firefox Versions 3.0 and newer Windows

More information

Learning Center Computer and Security Settings

Learning Center Computer and Security Settings Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record

More information

Origin Policy Enforcement in Modern Browsers

Origin Policy Enforcement in Modern Browsers Origin Policy Enforcement in Modern Browsers A Case Study in Same Origin Implementations Frederik Braun Frederik Braun (Ruhr-Uni Bochum/Mozilla) Origin Policy Enforcement June 21, 2013 1 / 32 Table of

More information

Control What You Include! Server- Side Protec7on against Third Party Web Tracking. Dolière Francis Somé, Nataliia Bielova, Tamara Rezk Privaski 2017

Control What You Include! Server- Side Protec7on against Third Party Web Tracking. Dolière Francis Somé, Nataliia Bielova, Tamara Rezk Privaski 2017 Control What You Include! Server- Side Protec7on against Third Party Web Tracking Dolière Francis Somé, Nataliia Bielova, Tamara Rezk Privaski 2017 thanks to eprivacy direc7ve 2009 bcc.co.uk emp.bcci.co.uk

More information

The Internet Archive and The Wayback Machine

The Internet Archive and The Wayback Machine The Internet Archive and The Wayback Machine The Internet Archive (IA) is a non-profit that was founded in 1996 to build an Internet library. Its primary purpose is to support a free and open internet

More information

Hybrid informa-on flow monitoring against Web Tracking

Hybrid informa-on flow monitoring against Web Tracking Hybrid informa-on flow monitoring against Web Tracking Nataliia Bielova (Inria INDES) with Frederic Besson and Thomas Jensen (Inria CELTIQUE) Security and Privacy Workshop LabEx 18 December 2013 Web Tracking

More information

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes Fall 2016 Adam (Ada) Lerner lerner@cs.washington.edu Thanks

More information

FP-TESTER: Automated Testing of Browser Fingerprint Resilience

FP-TESTER: Automated Testing of Browser Fingerprint Resilience FP-TESTER: Automated Testing of Browser Fingerprint Resilience Antoine Vastel, Walter Rudametkin, Romain Rouvoy To cite this version: Antoine Vastel, Walter Rudametkin, Romain Rouvoy. FP-TESTER: Automated

More information

Computer Security and the Internet of Things

Computer Security and the Internet of Things Computer Security and the Internet of Things Tadayoshi Kohno Computer Science & Engineering University of Washington At USENIX Enigma, January 2016 The Internet of Things Door Locks Thermostats Furnaces

More information

Internet Explorer 9.x and Above for Windows

Internet Explorer 9.x and Above for Windows Internet Explorer 9.x and Above for Windows Page Setup From the File. dropdown menu, select 'Page Setup'. On the Page Setup screen: Set all margins to the minimum allowed. If you enter 0 for all margins,

More information

Cryptography [Symmetric Encryption]

Cryptography [Symmetric Encryption] CSE 484 / CSE M 584: Computer Security and Privacy Cryptography [Symmetric Encryption] Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin,

More information

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes

Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

Some example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington

Some example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington Some example UW security lab projects, related to emerging technologies Tadayoshi Kohno CSE 484, University of Washington Wireless Implantable Medical Devices Computation and wireless capabilities lead

More information

Learning Center Computer and Security Settings

Learning Center Computer and Security Settings Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record

More information

Autoresponder Guide. David Sharpe

Autoresponder Guide. David Sharpe David Sharpe There are two autoresponders that I personally use and recommended AWeber and Sendlane. AWeber AWeber is a great service to use if you already have a website you are using. You can easily

More information

The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists

The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists Umar Iqbal The University of Iowa Zubair Shafiq The University of Iowa Zhiyun Qian University of California-Riverside ABSTRACT

More information

Delete Browsing History

Delete Browsing History Delete Browsing History Occasionally trading partners will need to clear or delete their browsing history, cookies and website data in order for their computers to be compatible with the USVI Medicaid

More information

Web scraping and social media scraping introduction

Web scraping and social media scraping introduction Web scraping and social media scraping introduction Jacek Lewkowicz, Dorota Celińska University of Warsaw February 23, 2018 Motivation Definition of scraping Tons of (potentially useful) information on

More information

Lecture 9a: Sessions and Cookies

Lecture 9a: Sessions and Cookies CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global

More information

Internet Explorer 6 and 7 Users

Internet Explorer 6 and 7 Users Internet Explorer 6 and 7 Users How and Why to Clear Your Cache Often referred to as the cache, the Temporary Internet Files folder contains a kind of travel record of the items you have seen, heard, or

More information

Manual Html A Href Javascript Window Open In New

Manual Html A Href Javascript Window Open In New Manual Html A Href Javascript Window Open In New _a href="foracure.org.au" target="_blank" style="width: 105px," /a_ You might consider opening a new window with JavaScript instead, cf. to the accepted

More information

Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc

Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc This document describes the steps to configure the common web browsers for use with the City of Boise s webbased applications.

More information

You Are Being Watched Analysis of JavaScript-Based Trackers

You Are Being Watched Analysis of JavaScript-Based Trackers You Are Being Watched Analysis of JavaScript-Based Trackers Rohit Mehra IIIT-Delhi rohit1376@iiitd.ac.in Shobhita Saxena IIIT-Delhi shobhita1315@iiitd.ac.in Vaishali Garg IIIT-Delhi vaishali1318@iiitd.ac.in

More information

Browser Support Internet Explorer

Browser Support Internet Explorer Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device

More information

Puma Energy elearning Hub. How To Guide for Staff Includes FAQs and Troubleshooting Guide

Puma Energy elearning Hub. How To Guide for Staff Includes FAQs and Troubleshooting Guide Puma Energy elearning Hub How To Guide for Staff Includes FAQs and Troubleshooting Guide How To Guide for Staff Welcome to the elearning Hub. This How To Guide will highlight the steps you need to take

More information

Prevention Of Cross-Site Scripting Attacks (XSS) On Web Applications In The Client Side

Prevention Of Cross-Site Scripting Attacks (XSS) On Web Applications In The Client Side www.ijcsi.org 650 Prevention Of Cross-Site Scripting Attacks (XSS) On Web Applications In The Client Side S.SHALINI 1, S.USHA 2 1 Department of Computer and Communication, Sri Sairam Engineering College,

More information

World Journal of Engineering Research and Technology WJERT

World Journal of Engineering Research and Technology WJERT wjert, 2017, Vol. 3, Issue 2, 168-177 Original Article ISSN 2454-695X WJERT www.wjert.org SJIF Impact Factor: 4.326 ANALYSIS OF THE PERFORMANCE OF FEW WEBSITES OF THE GOVERNMENT OF BANGLADESH Nazmin Akter*,

More information

An Introduction to Google Chrome

An Introduction to Google Chrome An Introduction to Google Chrome Box is an online file sharing and cloud content management service and it provides features such as: Getting Google Chrome 1. To get started with Google Chrome, you have

More information

Smart Browser: A framework for bringing intelligence into the browser

Smart Browser: A framework for bringing intelligence into the browser Smart Browser: A framework for bringing intelligence into the browser Demiao Lin, Jianming Jin, Yuhong Xiong HP Laboratories HPL-2010-1 Keyword(s): smart browser, Firefox extension, XML message, information

More information

Richard Anderson University of Washington Seattle, USA

Richard Anderson University of Washington Seattle, USA Computing and Financial Services for the Poor: The UW Digital Financial Services Research Group Richard Anderson University of Washington Seattle, USA Financial services for the poor Improved access to

More information

Firmware Update Procedure by HTTP Server (FIRMWARE1/FIRMWARE2/FIRMWARE3/FIRMWARE4) Rev.5.0

Firmware Update Procedure by HTTP Server (FIRMWARE1/FIRMWARE2/FIRMWARE3/FIRMWARE4) Rev.5.0 Firmware Update Procedure by HTTP Server (FIRMWARE1/FIRMWARE2/FIRMWARE3/FIRMWARE4) Rev.5.0 Read This Manual Before Attempting Firmware Update This manual describes the procedure for updating firmware of

More information

HTML5 Tracking Techniques in Practice

HTML5 Tracking Techniques in Practice Bachelor thesis Computer Science Radboud University HTML5 Tracking Techniques in Practice Author: Ivar Derksen 4375408 First supervisor/assessor: Dr. Ir. Erik Poll e.poll@cs.ru.nl Second assessor: Fabian

More information

Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi

Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi WIN1044 August 2007 Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi Introduction... 1 System Requirements... 1 Where to Get It... 1 Installation... 2

More information

Site Audit SpaceX

Site Audit SpaceX Site Audit 217 SpaceX Site Audit: Issues Total Score Crawled Pages 48 % -13 3868 Healthy (649) Broken (39) Have issues (276) Redirected (474) Blocked () Errors Warnings Notices 4164 +3311 1918 +7312 5k

More information

Iowa IDEA Supported Browsers and Settings July 1, 2013 Release

Iowa IDEA Supported Browsers and Settings July 1, 2013 Release Iowa IDEA Supported Browsers and Settings July 1, 2013 Release The Iowa IDEA applications are supported on the following platforms and browsers: Macintosh OS 10.6 or newer and: o Firefox Versions 16.0.x

More information

Web Security: Web Application Security [continued]

Web Security: Web Application Security [continued] CSE 484 / CSE M 584: Computer Security and Privacy Web Security: Web Application Security [continued] Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

This guide will walk you through the steps for installing and using wget on Windows.

This guide will walk you through the steps for installing and using wget on Windows. Wget Windows Guide This guide will walk you through the steps for installing and using wget on Windows. The Eye is currently sponsored by 10gbps.io. Check out their services, they re awesome. :) Quick

More information

CS 120 Digital Literacy, Chapter 5: p

CS 120 Digital Literacy, Chapter 5: p CS 120 Digital Literacy, Chapter 5: p. 287-344 CS 120, Digital Literacy, Ch 5, p.1 Browsing & Searching the Internet: Web browser a software program that is used to display web pages. IE, Safari, Firefox,

More information

Adding a RSS Feed Custom Widget to your Homepage

Adding a RSS Feed Custom Widget to your Homepage Adding a RSS Feed Custom Widget to your Homepage The first, and often hardest, task is to decide which blog or news source you wish to bring into your Avenue course. Once you have selected a blog or news

More information

Editor Guide. There are three ways to create, edit and delete an article within SOCS. They are Central Services, SOCS Wiki s and Easy Edit.

Editor Guide. There are three ways to create, edit and delete an article within SOCS. They are Central Services, SOCS Wiki s and Easy Edit. Editor Guide There are three ways to create, edit and delete an article within SOCS. They are Central Services, SOCS Wiki s and Easy Edit. Central Services Select Editor from left-hand side navigation

More information

Web Security: Loose Ends

Web Security: Loose Ends CSE 484 / CSE M 584: Computer Security and Privacy Web Security: Loose Ends Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno,

More information

LET S TALK MONEY. Fahad Pervaiz. Sam Castle, Galen Weld, Franziska Roesner, Richard Anderson

LET S TALK MONEY. Fahad Pervaiz. Sam Castle, Galen Weld, Franziska Roesner, Richard Anderson LET S TALK MONEY Fahad Pervaiz Sam Castle, Galen Weld, Franziska Roesner, Richard Anderson Unbanked Population Branchless Banking Bank/Financial Institute Bank of America, Standard Chartered Bank Telecommunication

More information

URLs excluded by REP may still appear in a search engine index.

URLs excluded by REP may still appear in a search engine index. Robots Exclusion Protocol Guide The Robots Exclusion Protocol (REP) is a very simple but powerful mechanism available to webmasters and SEOs alike. Perhaps it is the simplicity of the file that means it

More information

Analysis and Design of Enhanced HTTP Proxy Cashing Server

Analysis and Design of Enhanced HTTP Proxy Cashing Server Analysis and Design of Enhanced HTTP Proxy Cashing Server C. Prakash (Department of Mathematics, BHU) Chandu.math.bhu@gmail.com Abstract A proxy acts as a middle person specialists between its customers

More information

The New Rules of SEO: Crafting Content That Dances to Google s Algorithm

The New Rules of SEO: Crafting Content That Dances to Google s Algorithm PR News: Social Shake-Up Boot Camp The New Rules of SEO: Crafting Content That Dances to Google s Algorithm Jack Michelman Director of Business Development About Status Labs Founded in 2012, Status Labs

More information

CLIENT NAME. Origin Eight Optimize Your Digital Impact. Digital Impact Analysis Report

CLIENT NAME. Origin Eight Optimize Your Digital Impact. Digital Impact Analysis Report Origin Eight Optimize Your Digital Impact CLIENT NAME Digital Impact Analysis Report Prepared by Seth Viebrock and team, seth@origineight.net Origin Eight 1010 West Lake Street, Suite 100-116, Minneapolis,

More information

Provenance: Information for Shared Understanding

Provenance: Information for Shared Understanding Provenance: Information for Shared Understanding M. David Allen June 2012 Approved for Public Release: 3/7/2012 Case 12-0965 Government Mandates Net-Centric Data Strategy mandate: Is the source, accuracy

More information

Crawling. CS6200: Information Retrieval. Slides by: Jesse Anderton

Crawling. CS6200: Information Retrieval. Slides by: Jesse Anderton Crawling CS6200: Information Retrieval Slides by: Jesse Anderton Motivating Problem Internet crawling is discovering web content and downloading it to add to your index. This is a technically complex,

More information

CS 161 Computer Security

CS 161 Computer Security Paxson Spring 2011 CS 161 Computer Security Discussion 6 March 2, 2011 Question 1 Cross-Site Scripting (XSS) (10 min) As part of your daily routine, you are browsing through the news and status updates

More information

Sawmill TECH TIPS help for Web, Security, & Data Professionals

Sawmill TECH TIPS help for Web, Security, & Data Professionals Sawmill TECH TIPS help for Web, Security, & Data Professionals TECH TIPS # 2 Welcome to Sawmill TECH TIPS #2 Sawmill Tech Tips is a regular newsletter designed to help you make the most of Sawmill Reporting

More information

Getting started now with Rational Performance Tester 9.1.0

Getting started now with Rational Performance Tester 9.1.0 Getting started now with Rational Performance Tester 9.1.0 Rational Performance Tester Contents iii Contents Chapter 1: Start with Rational Performance Tester...5 Start now... 6 Chapter 2: Performance

More information

OWASP AppSec Research The OWASP Foundation New Insights into Clickjacking

OWASP AppSec Research The OWASP Foundation  New Insights into Clickjacking New Insights into Clickjacking Marco `embyte` Balduzzi iseclab @ EURECOM embyte@iseclab.org AppSec Research 2010 Joint work with Egele, Kirda, Balzarotti and Kruegel Copyright The Foundation Permission

More information

Newsletters We may send out newsletters to our customers providing them with articles and information which we believe may be of interest to you.

Newsletters We may send out newsletters to our customers providing them with articles and information which we believe may be of interest to you. BODY INTERACT PRIVACY POLICY Body Interact and its owner company Take The Wind, Lda. recognizes that our customers value their right to privacy and want to be assured that any personal information that

More information

Do Not Track Compromise Proposal

Do Not Track Compromise Proposal Do Not Track Compromise Proposal Unofficial Draft 06 June 2012 Editors: Peter Eckersley, Electronic Frontier Foundation Tom Lowenthal, Mozilla Jonathan Mayer, Stanford University This document is licensed

More information

Republicbank.com Supported Browsers and Settings (Updated 03/12/13)

Republicbank.com Supported Browsers and Settings (Updated 03/12/13) Republicbank.com Supported Browsers and Settings (Updated 03/12/13) We support the Internet Explorer 8.0 & 9.0. If you are using Internet Explorer 7.0 or earlier you will need to update your browser. Click

More information

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24

Proxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24 Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority

More information

Site Audit Virgin Galactic

Site Audit Virgin Galactic Site Audit 27 Virgin Galactic Site Audit: Issues Total Score Crawled Pages 59 % 79 Healthy (34) Broken (3) Have issues (27) Redirected (3) Blocked (2) Errors Warnings Notices 25 236 5 3 25 2 Jan Jan Jan

More information

Nonlinear Kinematics and Compliance Simulation of Automobiles

Nonlinear Kinematics and Compliance Simulation of Automobiles Abaqus Technology Brief TB-10-KC-1 Revised: December 2010 Nonlinear Kinematics and Compliance Simulation of Automobiles Summary In the automobile industry, kinematics and compliance (K&C) testing is used

More information

Web Programming Paper Solution (Chapter wise)

Web Programming Paper Solution (Chapter wise) Introduction to web technology Three tier/ n-tier architecture of web multitier architecture (often referred to as n-tier architecture) is a client server architecture in which presentation, application

More information

EDGE, MICROSOFT S BROWSER

EDGE, MICROSOFT S BROWSER EDGE, MICROSOFT S BROWSER To launch Microsoft Edge, click the Microsoft Edge button (it s the solid blue E) on the Windows Taskbar. Edge Replaces Internet Explorer Internet Explorer is no longer the default

More information

Web Data mining-a Research area in Web usage mining

Web Data mining-a Research area in Web usage mining IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,

More information

Cookie Security. Myths and Misconceptions. David Johansson OWASP London 30 Nov. 2017

Cookie Security. Myths and Misconceptions. David Johansson OWASP London 30 Nov. 2017 Cookie Security Myths and Misconceptions David Johansson OWASP London 30 Nov. 2017 About Me David Johansson (@securitybits) Security consultant with 10 years in AppSec Helping clients design and build

More information

Web Security [SSL/TLS and Browser Security Model]

Web Security [SSL/TLS and Browser Security Model] CSE 484 / CSE M 584: Computer Security and Privacy Web Security [SSL/TLS and Browser Security Model] Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,

More information

HTTP Reading: Section and COS 461: Computer Networks Spring 2013

HTTP Reading: Section and COS 461: Computer Networks Spring 2013 HTTP Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2013 1 Recap: Client-Server Communication Client sometimes on Initiates a request to the server when interested E.g., Web browser

More information

Rev

Rev Rev. 1.1.7 Copyright Notice Copyright 2010-2013 Telinta Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the

More information

Browser Guide for PeopleSoft

Browser Guide for PeopleSoft Browser Guide for PeopleSoft Business Process Guide For Academic Support Specialists (Advisors) TABLE OF CONTENTS PURPOSE...2 INTERNET EXPLORER 7...3 GENERAL TAB...4 SECURITY TAB...6 PRIVACY TAB...10 CONTENT

More information

Report Exec Enterprise Browser Settings. Choose Settings Topic

Report Exec Enterprise Browser Settings. Choose Settings Topic Report Exec Enterprise Browser Settings Choose Settings Topic Overview... 2 Technical Support... 2 Windows OS... 2 Microsoft Internet Explorer... 2... 2 Trusted Sites... 3 Browsing History... 3 Temporary

More information

TxEIS on Internet Explorer 8

TxEIS on Internet Explorer 8 TxEIS on Internet Explorer 8 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,

More information

Firefox for Android. Reviewer s Guide. Contact us:

Firefox for Android. Reviewer s Guide. Contact us: Reviewer s Guide Contact us: press@mozilla.com Table of Contents About Mozilla 1 Move at the Speed of the Web 2 Get Started 3 Mobile Browsing Upgrade 4 Get Up and Go 6 Customize On the Go 7 Privacy and

More information

Reading How the Web Works

Reading How the Web Works Reading 1.3 - How the Web Works By Jonathan Lane Introduction Every so often, you get offered a behind-the-scenes look at the cogs and fan belts behind the action. Today is your lucky day. In this article

More information

1 Introduction. 2 Web Architecture

1 Introduction. 2 Web Architecture 1 Introduction This document serves two purposes. The first section provides a high level overview of how the different pieces of technology in web applications relate to each other, and how they relate

More information

End User Monitoring. AppDynamics Pro Documentation. Version Page 1

End User Monitoring. AppDynamics Pro Documentation. Version Page 1 End User Monitoring AppDynamics Pro Documentation Version 4.1.5 Page 1 End User Monitoring....................................................... 4 Browser Real User Monitoring.............................................

More information

Northeastern University Systems Security Lab

Northeastern University Systems Security Lab Northeastern University Systems Security Lab Why is CSP Failing? Trends and Challenges in CSP Adoption Symposium on Research in Attacks, Intrusions and Defenses (RAID) Gothenburg, Sweden, September 2014

More information

Website privacy policy 25 May 2018

Website privacy policy 25 May 2018 Website privacy policy 25 May 2018 This privacy notice tells you about the information we collect from you when you use our website. In collecting this information, we are acting as a data controller and,

More information

DEALER RESOURCE CENTER TUTORIAL

DEALER RESOURCE CENTER TUTORIAL DEALER RESOURCE CENTER TUTORIAL Please review the General System Requirements and Navigation rules below before proceeding. System Requirements Internet Access is required; the faster, the better. It is

More information

Apps, Trackers, Privacy, and Regulators A Global Study of the Mobile Tracking Ecosystem

Apps, Trackers, Privacy, and Regulators A Global Study of the Mobile Tracking Ecosystem Apps, Trackers, Privacy, and Regulators A Global Study of the Mobile Tracking Ecosystem Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich,

More information

WorldNow Producer. Requirements Set-up

WorldNow Producer. Requirements Set-up WorldNow Producer Requirements Set-up Table of Contents Introduction... 3 1. System Requirements... 3 2. Set-up Producer URL as a 'Trusted Site' (Internet Explorer only)... 4 3. Enable JavaScript in your

More information

CSE 484 / CSE M 584: Computer Security and Privacy. Web Security. Autumn Tadayoshi (Yoshi) Kohno

CSE 484 / CSE M 584: Computer Security and Privacy. Web Security. Autumn Tadayoshi (Yoshi) Kohno CSE 484 / CSE M 584: Computer Security and Privacy Web Security Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,

More information

Administrative. Web crawlers. Web Crawlers and Link Analysis!

Administrative. Web crawlers. Web Crawlers and Link Analysis! Web Crawlers and Link Analysis! David Kauchak cs458 Fall 2011 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture15-linkanalysis.ppt http://webcourse.cs.technion.ac.il/236522/spring2007/ho/wcfiles/tutorial05.ppt

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s

Instructions for Configuring Your Browser Settings and Online Security FAQ s Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.

More information

NET 311 D INFORMATION SECURITY

NET 311 D INFORMATION SECURITY 1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing

More information

Google chrome incognito window

Google chrome incognito window Google chrome incognito window Click on Chrome's main menu button, represented by three vertically placed dots and located in the upper right corner of the browser window. When the drop-down menu appears,

More information

PRIVACY POLICY Let us summarize this for you...

PRIVACY POLICY Let us summarize this for you... PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase

More information

Kona ALL ABOUT FILES

Kona ALL ABOUT FILES Kona ALL ABOUT FILES February 20, 2014 Contents Overview... 4 Add a File/Link... 5 Add a file via the Files tab... 5 Add a file via a conversation, task, or event... 6 Add a file via a comment... 7 Add

More information

device management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)]

device management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)] Knox container device management policy The following policies can be applied to Knox container of Samsung devices. System group Screen capture Clipboard Share list Google account synchronization App crash

More information

IPFS Data Storage Blueprint

IPFS Data Storage Blueprint AEGEUS IPFS Data Storage Blueprint When you have IPFS, you can start looking at everything else in one specific way and you realize that you can replace it all Juan Benet V2.0 September 2018 1 Contents

More information

Getting Started with Authoring in Claro

Getting Started with Authoring in Claro Getting Started with Authoring in Claro dominknow s Claro is a new breed of web- based authoring and publishing software designed for teams. This short guide helps you get started quickly as an author

More information

Site Audit Boeing

Site Audit Boeing Site Audit 217 Boeing Site Audit: Issues Total Score Crawled Pages 48 % 13533 Healthy (3181) Broken (231) Have issues (9271) Redirected (812) Errors Warnings Notices 15266 41538 38 2k 5k 4 k 11 Jan k 11

More information

Luther Consulting, LLC August 2015 All rights reserved. Enabling Pop-ups in EvaluationWeb

Luther Consulting, LLC August 2015 All rights reserved. Enabling Pop-ups in EvaluationWeb Luther Consulting, LLC August 2015 All rights reserved. Enabling Pop-ups in EvaluationWeb Contents Enabling Pop-ups in EvaluationWeb... 3 Internet Explorer (Version 9 or later):... 4 Firefox Windows...

More information