Internet Jones and the Raiders of the Lost Trackers
|
|
- Roy Hicks
- 6 years ago
- Views:
Transcription
1 Internet Jones and the Raiders of the Lost Trackers An Archaeological Study of Web Tracking from 1996 to 2016 Adam Lerner* Anna Kornfeld Simpson* *Joint First Authors in Alphabetical Order Tadayoshi Kohno Franziska Roesner 1
2 Third Party Web Tracking 1. Third party web tracking is important 2. We should be studying web tracking over time 2
3 What is Third Party Web Tracking? I know that user "d04874f3" has visited these sites: tracker.com news.google.com weather.com twitch.tv hulu.com imdb.com foxnews.com zappos.com honda.com jetblue.com 3
4 4
5 Being watched has chilling effects Views and edits of privacy-related Wikipedia articles reduced after leaks of NSA surveillance activities* People donate more for communal coffee when a picture of watching eyes is posted near the coffee** *Penney, Jon. "Chilling Effects: Online Surveillance and Wikipedia Use."Berkeley Technology Law Journal (2016). **Bateson M, Nettle D, Roberts G. Cues of being watched enhance cooperation in a real-world setting. Biology Letters. 2006;2(3): doi: /rsbl
6 Web Tracking 1. Third party web tracking is important 2. We should be studying web tracking over time 6
7 We should study web tracking over time Gomer et al. '13 Roesner, Kohno, and Wetherall '12 Eubank et al. '13 Krishnamurthy and Wills ' Mayer and Mitchell '12 Englehardt et al. '
8 We should study web tracking over time Gomer et al. '13 Roesner, Kohno, and Wetherall '12? 1996 Eubank et al. '13 Krishnamurthy and Wills ' Mayer and Mitchell '12 Englehardt et al. '
9 Time Travel 9
10 Time Travel 10
11 11
12 The Wayback Machine 12
13 The Wayback Machine 13
14 ~11 petabytes of web sites archived! 14
15 ~11 petabytes of web sites archived! Includes JavaScript! HTTP headers! CSS! Images! Hosted on web servers! 15
16 The Wayback Machine enables us to perform retrospective web measurements 16
17 This Talk A 20 year longitudinal study of third party web tracking, performed using archival web data 17
18 Abstract 18
19 Abstract Insight: Web archives exist (e.g., Wayback Machine) 19
20 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent 20
21 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator 21
22 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator Validation: Comparison of archival measurements to ground truth 22
23 Abstract Insight: Web archives exist (e.g., Wayback Machine) Challenges: Web archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator Validation: Comparison of archival measurements to ground truth Measurement Results: A picture of web tracking over the last 20 years 23
24 Background How does Third Party Web Tracking Work? A first-party is a domain to which a user goes intentionally, by typing a URL or clicking a link. A third-party is a domain whose content is embedded in a first-party web page. 24
25 Background How does Third Party Web Tracking Work? A first-party is a domain to which a user goes intentionally, by typing a URL or clicking a link. If a third party is able to link together A third-party is a domain whose content is embedded in a a subset of a person's browsing first-party web page. history, we call this ability 3rd Party Web Tracking. 25
26 Background How does Third Party Web Tracking Work? logo tracker.com ad 26
27 Background How does Third Party Web Tracking Work? logo tracker.com ad theonion.com 27
28 Background How does Third Party Web Tracking Work? logo tracker.com ad theonion.com 28
29 Background How does Third Party Web Tracking Work? logo tracker.com ad theonion.com 29
30 Background How does Third Party Web Tracking Work? logo tracker.com ad 30
31 Background How does Third Party Web Tracking Work? logo tracker.com ad 31
32 Background How does Third Party Web Tracking Work? logo Set this cookie: id=789 tracker.com ad Browsing profile for user 789: theonion.com 32
33 Background How does Third Party Web Tracking Work? logo Set this cookie: id=789 tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com 33
34 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad 34
35 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad cnn.com 35
36 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad cnn.com 36
37 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad 37
38 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com logo ad My cookie is: id=789 38
39 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com, cnn.com logo ad My cookie is: id=789 39
40 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com, cnn.com logo ad My cookie is: id=789 40
41 Background How does Third Party Web Tracking Work? logo tracker.com ad tracker.com: id=789 Browsing profile for user 789: theonion.com, cnn.com logo ad 41
42 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 42
43 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 43
44 Our Tool, TrackingExcavator, and the Challenges of Retrospective Measurements 44
45 TrackingExcavator 45
46 TrackingExcavator Input Munging 46
47 TrackingExcavator Input Munging Automatic Browsing 47
48 TrackingExcavator Input Munging Automatic Browsing 48
49 TrackingExcavator Input Munging Automatic Browsing Data Analysis & Visualization 49
50 What Makes this Hard? Cookies don't work in the archive Incomplete archives Inconsistent archives ("anachronisms") 50
51 Cookies don't work in the archive Set-cookie: id=789 becomes... X-Archive-Orig-Set-cookie: id=789 51
52 TrackingExcavator Cookie simulation Input Munging Automatic Browsing Data Analysis & Visualization 52
53 What Makes this Hard? Cookies are weird in archival environments Incomplete archives Inconsistent archives ("anachronisms") 53
54 Incomplete Archives Set-cookie: id=789 Set-cookie: oatmeal=raisin Set-cookie: chocolate=chip 54
55 55
56
57 57
58 Fortunately, we can still count requests to missing resources! 58
59 59
60 Robots.txt files User-agent: * Disallow: /search Allow: /search/about Disallow: /sdch Disallow: /groups Disallow: /index.html? Disallow: /? Allow: /?hl= Disallow: /?hl=*& Allow: /?hl=*&gws_rd=ssl$ Disallow: /?hl=*&*&gws_rd=ssl Allow: /?gws_rd=ssl$ Allow: /?pt1=true$ Disallow: /imgres... 60
61 Robots.txt files The Wayback Machine respects these preferences retroactively! User-agent: * Disallow: /search Allow: /search/about Disallow: /sdch Disallow: /groups Disallow: /index.html? Disallow: /? Allow: /?hl= Disallow: /?hl=*& Allow: /?hl=*&gws_rd=ssl$ Disallow: /?hl=*&*&gws_rd=ssl Allow: /?gws_rd=ssl$ Allow: /?pt1=true$ Disallow: /imgres... 61
62 TrackingExcavator Input Munging Automatic Browsing Data Analysis & Visualization 62
63 Inconsistent Archives 63
64 From 64
65 From 65
66 Block non-archival web requests Input Munging Automatic Browsing 66
67 Timestamp filtering Input Munging Automatic Browsing Data Analysis & Visualization 67
68 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 68
69 Validation of Archival Data 69
70 Validation of Archival Data vs. Ground Truth UW NSDI 2012 paper* (and follow-up measurements) provided a taxonomy of web tracking and ground truth data over the last 5 years *Roesner, Franziska, Tadayoshi Kohno, and David Wetherall. "Detecting and defending against third-party tracking on the web." Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation. USENIX Association,
71 Archival trends reflect ground truth trends 71
72 Contributions TrackingExcavator, our Tool Challenges of Retrospective Measurement Validation of Archival Data vs. Ground Truth Measurement Results: A 20 Year Picture of Web Tracking 72
73 Measurement Results 73
74 Measurement Results "Web Tracking has Increased Over Time" 1. Number of trackers 2. Type of tracking employed 3. Coverage of top trackers 74
75 Measurement Results "Web Tracking has Increased Over Time" 1. Number of trackers 2. Type of tracking employed 3. Coverage of top trackers 75
76 76
77 Measurement Results "Web Tracking has Increased Over Time" 1. Number of trackers 2. Type of tracking employed 3. Coverage of top trackers 77
78 78
79 79
80 The power of individual trackers has grown over time. Individual companies know more about your browsing history than they did before. 80
81 google-analytics.com 81
82 Individual companies' choices are important to your privacy Transparency is important 82
83 The "Worst" Days of the Web
84 The Worst Days of the Web accessed Aug
85 The "Worst" Days of the Web Popups enable stronger tracking 85
86 The "Worst" Days of the Web
87 The "Worst" Days of the Web 2004: Internet Explorer starts popup-blocking by default
88 The "Worst" Days of the Web The choices of browser manufacturers, even those unrelated to tracking, 30 third-party popups influence the way trackers behave (top 500 sites) significantly
89 We should study web tracking over time Gomer et al. '13 Roesner, Kohno, and Wetherall '12 Eubank et al. '13 Krishnamurthy and Wills ' Mayer and Mitchell '12 Englehardt et al. ' The Future This Work 89
90 Adam, Anna, Yoshi, & Franzi say: "Thanks!" Insight: Web archives exist (Wayback Machine) Challenges: Web Archives are sometimes 1. incomplete & 2. inconsistent Tool: TrackingExcavator Validation: Comparison of archival measurements to ground truth Measurement Results: A 20 year picture of third party web tracking 90
The Invisible Trail: Third- Party Tracking on the Web
The Invisible Trail: Third- Party Tracking on the Web Franziska Roesner Assistant Professor Computer Science & Engineering University of Washington The Invisible Trail: Third- Party Tracking on the Web
More informationSecurity, Privacy, & User Expectations:
Security, Privacy, & User Expectations: Case Studies in Web Tracking and Application Permissions Franziska Roesner Assistant Professor Computer Science & Engineering University of Washington Security,
More informationThird-Party Tracking on the Web
CSE 484 / CSE M 584: Computer Security and Privacy Third-Party Tracking on the Web Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Web Security. Autumn Tadayoshi (Yoshi) Kohno
CSE 484 / CSE M 584: Computer Security and Privacy Web Security Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,
More informationOn the Change in Archivability of Websites Over Time
Old Dominion University ODU Digital Commons Computer Science Presentations Computer Science 9-23-2013 On the Change in Archivability of Websites Over Time Mat Kelly Old Dominion University Justin F. Brunelle
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Usable Security. Fall Franziska (Franzi) Roesner
CSE 484 / CSE M 584: Computer Security and Privacy Usable Security Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno, Ada Lerner,
More informationIdentifying and Preventing Conditions for Web Privacy Leakage
Identifying and Preventing Conditions for Web Privacy Leakage Craig E. Wills Computer Science Department Worcester Polytechnic Institute Worcester, MA 01609 1 Position Statement Beyond tracking and proposals
More informationSecurity and Privacy. SWE 432, Fall 2016 Design and Implementation of Software for the Web
Security and Privacy SWE 432, Fall 2016 Design and Implementation of Software for the Web Today Security What is it? Most important types of attacks Privacy For further reading: https://www.owasp.org/index.php/
More informationPrivate Information Leakage on the Mobile Web
Private Information Leakage on the Mobile Web Amanda Kirk, Stephen Rice, Zach Azar, Yipu Wang amankirk@cs.du.edu, steprice@cs.du.edu, ZachAzar@cs.du.edu, yipu.wang@du.edu 11/18/13 COMP 4704: Foundations
More informationCryptography: Symmetric Encryption [continued]
CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption [continued] Fall 2016 Ada (Adam) Lerner lerner@cs.washington.edu Thanks to Franzi Roesner, Dan Boneh, Dieter Gollmann,
More informationIowa IDEA Supported Browsers and Settings Updated 2/9/2009
Iowa IDEA Supported Browsers and Settings Updated 2/9/2009 The Iowa IDEA applications are supported on the following platforms and browsers: Macintosh OS 10.4 with Firefox Versions 3.0 and newer Windows
More informationLearning Center Computer and Security Settings
Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record
More informationOrigin Policy Enforcement in Modern Browsers
Origin Policy Enforcement in Modern Browsers A Case Study in Same Origin Implementations Frederik Braun Frederik Braun (Ruhr-Uni Bochum/Mozilla) Origin Policy Enforcement June 21, 2013 1 / 32 Table of
More informationControl What You Include! Server- Side Protec7on against Third Party Web Tracking. Dolière Francis Somé, Nataliia Bielova, Tamara Rezk Privaski 2017
Control What You Include! Server- Side Protec7on against Third Party Web Tracking Dolière Francis Somé, Nataliia Bielova, Tamara Rezk Privaski 2017 thanks to eprivacy direc7ve 2009 bcc.co.uk emp.bcci.co.uk
More informationThe Internet Archive and The Wayback Machine
The Internet Archive and The Wayback Machine The Internet Archive (IA) is a non-profit that was founded in 1996 to build an Internet library. Its primary purpose is to support a free and open internet
More informationHybrid informa-on flow monitoring against Web Tracking
Hybrid informa-on flow monitoring against Web Tracking Nataliia Bielova (Inria INDES) with Frederic Besson and Thomas Jensen (Inria CELTIQUE) Security and Privacy Workshop LabEx 18 December 2013 Web Tracking
More informationCryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes
CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes Fall 2016 Adam (Ada) Lerner lerner@cs.washington.edu Thanks
More informationFP-TESTER: Automated Testing of Browser Fingerprint Resilience
FP-TESTER: Automated Testing of Browser Fingerprint Resilience Antoine Vastel, Walter Rudametkin, Romain Rouvoy To cite this version: Antoine Vastel, Walter Rudametkin, Romain Rouvoy. FP-TESTER: Automated
More informationComputer Security and the Internet of Things
Computer Security and the Internet of Things Tadayoshi Kohno Computer Science & Engineering University of Washington At USENIX Enigma, January 2016 The Internet of Things Door Locks Thermostats Furnaces
More informationInternet Explorer 9.x and Above for Windows
Internet Explorer 9.x and Above for Windows Page Setup From the File. dropdown menu, select 'Page Setup'. On the Page Setup screen: Set all margins to the minimum allowed. If you enter 0 for all margins,
More informationCryptography [Symmetric Encryption]
CSE 484 / CSE M 584: Computer Security and Privacy Cryptography [Symmetric Encryption] Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin,
More informationCryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes
CSE 484 / CSE M 584: Computer Security and Privacy Cryptography: Symmetric Encryption (finish), Hash Functions, Message Authentication Codes Spring 2016 Franziska (Franzi) Roesner franzi@cs.washington.edu
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Anonymity Mobile. Autumn Tadayoshi (Yoshi) Kohno
CSE 484 / CSE M 584: Computer Security and Privacy Anonymity Mobile Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,
More informationSome example UW security lab projects, related to emerging technologies. Tadayoshi Kohno CSE 484, University of Washington
Some example UW security lab projects, related to emerging technologies Tadayoshi Kohno CSE 484, University of Washington Wireless Implantable Medical Devices Computation and wireless capabilities lead
More informationLearning Center Computer and Security Settings
Learning Center Computer and Security Settings Learning Center Computer Settings Please Note: To allow your computer to communicate most effectively with the Learning Center, and update your training record
More informationAutoresponder Guide. David Sharpe
David Sharpe There are two autoresponders that I personally use and recommended AWeber and Sendlane. AWeber AWeber is a great service to use if you already have a website you are using. You can easily
More informationThe Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists
The Ad Wars: Retrospective Measurement and Analysis of Anti-Adblock Filter Lists Umar Iqbal The University of Iowa Zubair Shafiq The University of Iowa Zhiyun Qian University of California-Riverside ABSTRACT
More informationDelete Browsing History
Delete Browsing History Occasionally trading partners will need to clear or delete their browsing history, cookies and website data in order for their computers to be compatible with the USVI Medicaid
More informationWeb scraping and social media scraping introduction
Web scraping and social media scraping introduction Jacek Lewkowicz, Dorota Celińska University of Warsaw February 23, 2018 Motivation Definition of scraping Tons of (potentially useful) information on
More informationLecture 9a: Sessions and Cookies
CS 655 / 441 Fall 2007 Lecture 9a: Sessions and Cookies 1 Review: Structure of a Web Application On every interchange between client and server, server must: Parse request. Look up session state and global
More informationInternet Explorer 6 and 7 Users
Internet Explorer 6 and 7 Users How and Why to Clear Your Cache Often referred to as the cache, the Temporary Internet Files folder contains a kind of travel record of the items you have seen, heard, or
More informationManual Html A Href Javascript Window Open In New
Manual Html A Href Javascript Window Open In New _a href="foracure.org.au" target="_blank" style="width: 105px," /a_ You might consider opening a new window with JavaScript instead, cf. to the accepted
More informationRecommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc
Recommended Browser Settings for Self Service Applications Revised: 10/10/2013 vmc This document describes the steps to configure the common web browsers for use with the City of Boise s webbased applications.
More informationYou Are Being Watched Analysis of JavaScript-Based Trackers
You Are Being Watched Analysis of JavaScript-Based Trackers Rohit Mehra IIIT-Delhi rohit1376@iiitd.ac.in Shobhita Saxena IIIT-Delhi shobhita1315@iiitd.ac.in Vaishali Garg IIIT-Delhi vaishali1318@iiitd.ac.in
More informationBrowser Support Internet Explorer
Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device
More informationPuma Energy elearning Hub. How To Guide for Staff Includes FAQs and Troubleshooting Guide
Puma Energy elearning Hub How To Guide for Staff Includes FAQs and Troubleshooting Guide How To Guide for Staff Welcome to the elearning Hub. This How To Guide will highlight the steps you need to take
More informationPrevention Of Cross-Site Scripting Attacks (XSS) On Web Applications In The Client Side
www.ijcsi.org 650 Prevention Of Cross-Site Scripting Attacks (XSS) On Web Applications In The Client Side S.SHALINI 1, S.USHA 2 1 Department of Computer and Communication, Sri Sairam Engineering College,
More informationWorld Journal of Engineering Research and Technology WJERT
wjert, 2017, Vol. 3, Issue 2, 168-177 Original Article ISSN 2454-695X WJERT www.wjert.org SJIF Impact Factor: 4.326 ANALYSIS OF THE PERFORMANCE OF FEW WEBSITES OF THE GOVERNMENT OF BANGLADESH Nazmin Akter*,
More informationAn Introduction to Google Chrome
An Introduction to Google Chrome Box is an online file sharing and cloud content management service and it provides features such as: Getting Google Chrome 1. To get started with Google Chrome, you have
More informationSmart Browser: A framework for bringing intelligence into the browser
Smart Browser: A framework for bringing intelligence into the browser Demiao Lin, Jianming Jin, Yuhong Xiong HP Laboratories HPL-2010-1 Keyword(s): smart browser, Firefox extension, XML message, information
More informationRichard Anderson University of Washington Seattle, USA
Computing and Financial Services for the Poor: The UW Digital Financial Services Research Group Richard Anderson University of Washington Seattle, USA Financial services for the poor Improved access to
More informationFirmware Update Procedure by HTTP Server (FIRMWARE1/FIRMWARE2/FIRMWARE3/FIRMWARE4) Rev.5.0
Firmware Update Procedure by HTTP Server (FIRMWARE1/FIRMWARE2/FIRMWARE3/FIRMWARE4) Rev.5.0 Read This Manual Before Attempting Firmware Update This manual describes the procedure for updating firmware of
More informationHTML5 Tracking Techniques in Practice
Bachelor thesis Computer Science Radboud University HTML5 Tracking Techniques in Practice Author: Ivar Derksen 4375408 First supervisor/assessor: Dr. Ir. Erik Poll e.poll@cs.ru.nl Second assessor: Fabian
More informationGetting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi
WIN1044 August 2007 Getting Started with Firefox 2.0 For Windows 2000/XP Author: Ryan McCalla Revised by Mitchell Ochi Introduction... 1 System Requirements... 1 Where to Get It... 1 Installation... 2
More informationSite Audit SpaceX
Site Audit 217 SpaceX Site Audit: Issues Total Score Crawled Pages 48 % -13 3868 Healthy (649) Broken (39) Have issues (276) Redirected (474) Blocked () Errors Warnings Notices 4164 +3311 1918 +7312 5k
More informationIowa IDEA Supported Browsers and Settings July 1, 2013 Release
Iowa IDEA Supported Browsers and Settings July 1, 2013 Release The Iowa IDEA applications are supported on the following platforms and browsers: Macintosh OS 10.6 or newer and: o Firefox Versions 16.0.x
More informationWeb Security: Web Application Security [continued]
CSE 484 / CSE M 584: Computer Security and Privacy Web Security: Web Application Security [continued] Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,
More informationThis guide will walk you through the steps for installing and using wget on Windows.
Wget Windows Guide This guide will walk you through the steps for installing and using wget on Windows. The Eye is currently sponsored by 10gbps.io. Check out their services, they re awesome. :) Quick
More informationCS 120 Digital Literacy, Chapter 5: p
CS 120 Digital Literacy, Chapter 5: p. 287-344 CS 120, Digital Literacy, Ch 5, p.1 Browsing & Searching the Internet: Web browser a software program that is used to display web pages. IE, Safari, Firefox,
More informationAdding a RSS Feed Custom Widget to your Homepage
Adding a RSS Feed Custom Widget to your Homepage The first, and often hardest, task is to decide which blog or news source you wish to bring into your Avenue course. Once you have selected a blog or news
More informationEditor Guide. There are three ways to create, edit and delete an article within SOCS. They are Central Services, SOCS Wiki s and Easy Edit.
Editor Guide There are three ways to create, edit and delete an article within SOCS. They are Central Services, SOCS Wiki s and Easy Edit. Central Services Select Editor from left-hand side navigation
More informationWeb Security: Loose Ends
CSE 484 / CSE M 584: Computer Security and Privacy Web Security: Loose Ends Spring 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Yoshi Kohno,
More informationLET S TALK MONEY. Fahad Pervaiz. Sam Castle, Galen Weld, Franziska Roesner, Richard Anderson
LET S TALK MONEY Fahad Pervaiz Sam Castle, Galen Weld, Franziska Roesner, Richard Anderson Unbanked Population Branchless Banking Bank/Financial Institute Bank of America, Standard Chartered Bank Telecommunication
More informationURLs excluded by REP may still appear in a search engine index.
Robots Exclusion Protocol Guide The Robots Exclusion Protocol (REP) is a very simple but powerful mechanism available to webmasters and SEOs alike. Perhaps it is the simplicity of the file that means it
More informationAnalysis and Design of Enhanced HTTP Proxy Cashing Server
Analysis and Design of Enhanced HTTP Proxy Cashing Server C. Prakash (Department of Mathematics, BHU) Chandu.math.bhu@gmail.com Abstract A proxy acts as a middle person specialists between its customers
More informationThe New Rules of SEO: Crafting Content That Dances to Google s Algorithm
PR News: Social Shake-Up Boot Camp The New Rules of SEO: Crafting Content That Dances to Google s Algorithm Jack Michelman Director of Business Development About Status Labs Founded in 2012, Status Labs
More informationCLIENT NAME. Origin Eight Optimize Your Digital Impact. Digital Impact Analysis Report
Origin Eight Optimize Your Digital Impact CLIENT NAME Digital Impact Analysis Report Prepared by Seth Viebrock and team, seth@origineight.net Origin Eight 1010 West Lake Street, Suite 100-116, Minneapolis,
More informationProvenance: Information for Shared Understanding
Provenance: Information for Shared Understanding M. David Allen June 2012 Approved for Public Release: 3/7/2012 Case 12-0965 Government Mandates Net-Centric Data Strategy mandate: Is the source, accuracy
More informationCrawling. CS6200: Information Retrieval. Slides by: Jesse Anderton
Crawling CS6200: Information Retrieval Slides by: Jesse Anderton Motivating Problem Internet crawling is discovering web content and downloading it to add to your index. This is a technically complex,
More informationCS 161 Computer Security
Paxson Spring 2011 CS 161 Computer Security Discussion 6 March 2, 2011 Question 1 Cross-Site Scripting (XSS) (10 min) As part of your daily routine, you are browsing through the news and status updates
More informationSawmill TECH TIPS help for Web, Security, & Data Professionals
Sawmill TECH TIPS help for Web, Security, & Data Professionals TECH TIPS # 2 Welcome to Sawmill TECH TIPS #2 Sawmill Tech Tips is a regular newsletter designed to help you make the most of Sawmill Reporting
More informationGetting started now with Rational Performance Tester 9.1.0
Getting started now with Rational Performance Tester 9.1.0 Rational Performance Tester Contents iii Contents Chapter 1: Start with Rational Performance Tester...5 Start now... 6 Chapter 2: Performance
More informationOWASP AppSec Research The OWASP Foundation New Insights into Clickjacking
New Insights into Clickjacking Marco `embyte` Balduzzi iseclab @ EURECOM embyte@iseclab.org AppSec Research 2010 Joint work with Egele, Kirda, Balzarotti and Kruegel Copyright The Foundation Permission
More informationNewsletters We may send out newsletters to our customers providing them with articles and information which we believe may be of interest to you.
BODY INTERACT PRIVACY POLICY Body Interact and its owner company Take The Wind, Lda. recognizes that our customers value their right to privacy and want to be assured that any personal information that
More informationDo Not Track Compromise Proposal
Do Not Track Compromise Proposal Unofficial Draft 06 June 2012 Editors: Peter Eckersley, Electronic Frontier Foundation Tom Lowenthal, Mozilla Jonathan Mayer, Stanford University This document is licensed
More informationRepublicbank.com Supported Browsers and Settings (Updated 03/12/13)
Republicbank.com Supported Browsers and Settings (Updated 03/12/13) We support the Internet Explorer 8.0 & 9.0. If you are using Internet Explorer 7.0 or earlier you will need to update your browser. Click
More informationProxying. Why and How. Alon Altman. Haifa Linux Club. Proxying p.1/24
Proxying p.1/24 Proxying Why and How Alon Altman alon@haifux.org Haifa Linux Club Proxying p.2/24 Definition proxy \Prox"y\, n.; pl. Proxies. The agency for another who acts through the agent; authority
More informationSite Audit Virgin Galactic
Site Audit 27 Virgin Galactic Site Audit: Issues Total Score Crawled Pages 59 % 79 Healthy (34) Broken (3) Have issues (27) Redirected (3) Blocked (2) Errors Warnings Notices 25 236 5 3 25 2 Jan Jan Jan
More informationNonlinear Kinematics and Compliance Simulation of Automobiles
Abaqus Technology Brief TB-10-KC-1 Revised: December 2010 Nonlinear Kinematics and Compliance Simulation of Automobiles Summary In the automobile industry, kinematics and compliance (K&C) testing is used
More informationWeb Programming Paper Solution (Chapter wise)
Introduction to web technology Three tier/ n-tier architecture of web multitier architecture (often referred to as n-tier architecture) is a client server architecture in which presentation, application
More informationEDGE, MICROSOFT S BROWSER
EDGE, MICROSOFT S BROWSER To launch Microsoft Edge, click the Microsoft Edge button (it s the solid blue E) on the Windows Taskbar. Edge Replaces Internet Explorer Internet Explorer is no longer the default
More informationWeb Data mining-a Research area in Web usage mining
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 13, Issue 1 (Jul. - Aug. 2013), PP 22-26 Web Data mining-a Research area in Web usage mining 1 V.S.Thiyagarajan,
More informationCookie Security. Myths and Misconceptions. David Johansson OWASP London 30 Nov. 2017
Cookie Security Myths and Misconceptions David Johansson OWASP London 30 Nov. 2017 About Me David Johansson (@securitybits) Security consultant with 10 years in AppSec Helping clients design and build
More informationWeb Security [SSL/TLS and Browser Security Model]
CSE 484 / CSE M 584: Computer Security and Privacy Web Security [SSL/TLS and Browser Security Model] Fall 2017 Franziska (Franzi) Roesner franzi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann,
More informationHTTP Reading: Section and COS 461: Computer Networks Spring 2013
HTTP Reading: Section 9.1.2 and 9.4.3 COS 461: Computer Networks Spring 2013 1 Recap: Client-Server Communication Client sometimes on Initiates a request to the server when interested E.g., Web browser
More informationRev
Rev. 1.1.7 Copyright Notice Copyright 2010-2013 Telinta Inc. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without the
More informationBrowser Guide for PeopleSoft
Browser Guide for PeopleSoft Business Process Guide For Academic Support Specialists (Advisors) TABLE OF CONTENTS PURPOSE...2 INTERNET EXPLORER 7...3 GENERAL TAB...4 SECURITY TAB...6 PRIVACY TAB...10 CONTENT
More informationReport Exec Enterprise Browser Settings. Choose Settings Topic
Report Exec Enterprise Browser Settings Choose Settings Topic Overview... 2 Technical Support... 2 Windows OS... 2 Microsoft Internet Explorer... 2... 2 Trusted Sites... 3 Browsing History... 3 Temporary
More informationTxEIS on Internet Explorer 8
TxEIS on Internet Explorer 8 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,
More informationFirefox for Android. Reviewer s Guide. Contact us:
Reviewer s Guide Contact us: press@mozilla.com Table of Contents About Mozilla 1 Move at the Speed of the Web 2 Get Started 3 Mobile Browsing Upgrade 4 Get Up and Go 6 Customize On the Go 7 Privacy and
More informationReading How the Web Works
Reading 1.3 - How the Web Works By Jonathan Lane Introduction Every so often, you get offered a behind-the-scenes look at the cogs and fan belts behind the action. Today is your lucky day. In this article
More information1 Introduction. 2 Web Architecture
1 Introduction This document serves two purposes. The first section provides a high level overview of how the different pieces of technology in web applications relate to each other, and how they relate
More informationEnd User Monitoring. AppDynamics Pro Documentation. Version Page 1
End User Monitoring AppDynamics Pro Documentation Version 4.1.5 Page 1 End User Monitoring....................................................... 4 Browser Real User Monitoring.............................................
More informationNortheastern University Systems Security Lab
Northeastern University Systems Security Lab Why is CSP Failing? Trends and Challenges in CSP Adoption Symposium on Research in Attacks, Intrusions and Defenses (RAID) Gothenburg, Sweden, September 2014
More informationWebsite privacy policy 25 May 2018
Website privacy policy 25 May 2018 This privacy notice tells you about the information we collect from you when you use our website. In collecting this information, we are acting as a data controller and,
More informationDEALER RESOURCE CENTER TUTORIAL
DEALER RESOURCE CENTER TUTORIAL Please review the General System Requirements and Navigation rules below before proceeding. System Requirements Internet Access is required; the faster, the better. It is
More informationApps, Trackers, Privacy, and Regulators A Global Study of the Mobile Tracking Ecosystem
Apps, Trackers, Privacy, and Regulators A Global Study of the Mobile Tracking Ecosystem Abbas Razaghpanah, Rishab Nithyanand, Narseo Vallina-Rodriguez, Srikanth Sundaresan, Mark Allman, Christian Kreibich,
More informationWorldNow Producer. Requirements Set-up
WorldNow Producer Requirements Set-up Table of Contents Introduction... 3 1. System Requirements... 3 2. Set-up Producer URL as a 'Trusted Site' (Internet Explorer only)... 4 3. Enable JavaScript in your
More informationCSE 484 / CSE M 584: Computer Security and Privacy. Web Security. Autumn Tadayoshi (Yoshi) Kohno
CSE 484 / CSE M 584: Computer Security and Privacy Web Security Autumn 2018 Tadayoshi (Yoshi) Kohno yoshi@cs.washington.edu Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, Ada Lerner, John Manferdelli,
More informationAdministrative. Web crawlers. Web Crawlers and Link Analysis!
Web Crawlers and Link Analysis! David Kauchak cs458 Fall 2011 adapted from: http://www.stanford.edu/class/cs276/handouts/lecture15-linkanalysis.ppt http://webcourse.cs.technion.ac.il/236522/spring2007/ho/wcfiles/tutorial05.ppt
More informationInstructions for Configuring Your Browser Settings and Online Security FAQ s
Instructions for Configuring Your Browser Settings and Online Security FAQ s General Settings The following browser settings and plug-ins are required to properly access Digital Insight s webbased solutions.
More informationNET 311 D INFORMATION SECURITY
1 NET 311 D INFORMATION SECURITY Networks and Communication Department TUTORIAL 6 :Securing Your Windows 8 System 4 Steps to secure your windows 8 system 2 1. Configure Windows 8 Settings. 2. Installing
More informationGoogle chrome incognito window
Google chrome incognito window Click on Chrome's main menu button, represented by three vertically placed dots and located in the upper right corner of the browser window. When the drop-down menu appears,
More informationPRIVACY POLICY Let us summarize this for you...
PRIVACY POLICY Let us summarize this for you... We promise to never sell your personal information. This site collects usage information to provide a better web experience for our users. If you purchase
More informationKona ALL ABOUT FILES
Kona ALL ABOUT FILES February 20, 2014 Contents Overview... 4 Add a File/Link... 5 Add a file via the Files tab... 5 Add a file via a conversation, task, or event... 6 Add a file via a comment... 7 Add
More informationdevice management The following policies can be applied to Knox container of Samsung devices. [Android OS, Samsung Only(Knox2+)]
Knox container device management policy The following policies can be applied to Knox container of Samsung devices. System group Screen capture Clipboard Share list Google account synchronization App crash
More informationIPFS Data Storage Blueprint
AEGEUS IPFS Data Storage Blueprint When you have IPFS, you can start looking at everything else in one specific way and you realize that you can replace it all Juan Benet V2.0 September 2018 1 Contents
More informationGetting Started with Authoring in Claro
Getting Started with Authoring in Claro dominknow s Claro is a new breed of web- based authoring and publishing software designed for teams. This short guide helps you get started quickly as an author
More informationSite Audit Boeing
Site Audit 217 Boeing Site Audit: Issues Total Score Crawled Pages 48 % 13533 Healthy (3181) Broken (231) Have issues (9271) Redirected (812) Errors Warnings Notices 15266 41538 38 2k 5k 4 k 11 Jan k 11
More informationLuther Consulting, LLC August 2015 All rights reserved. Enabling Pop-ups in EvaluationWeb
Luther Consulting, LLC August 2015 All rights reserved. Enabling Pop-ups in EvaluationWeb Contents Enabling Pop-ups in EvaluationWeb... 3 Internet Explorer (Version 9 or later):... 4 Firefox Windows...
More information