Spying and security on the Internet Some tricks to know.

Slides:



Advertisements
Similar presentations
The Internet.
Advertisements

B: STUDENT DRIVE MOVE INSTRUCTIONS. Using Internet Explorer: From your computers desktop, double click on the Internet Explorer icon. (Internet Explorer.
Enabling Secure Internet Access with ISA Server
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Firewall Ercan Sancar & Caner Sahin. Index History of Firewall Why Do You Need A Firewall Working Principle Of Firewalls Can a Firewall Really Protect.
Master’s course Bioinformatics Data Analysis and Tools Lecture 6: Internet Basics Centre for Integrative Bioinformatics.
LBSC 690: Session 2 FTP, “Hello World!” HTML Jimmy Lin College of Information Studies University of Maryland Monday, September 17, 2007.
1 Web Content Delivery Reading: Section and COS 461: Computer Networks Spring 2007 (MW 1:30-2:50 in Friend 004) Ioannis Avramopoulos Instructor:
Browser and Basics Tutorial 1. Learn about Web browser software and Web pages The Web is a collection of files that reside on computers, called.
Computer Network (MASQ/NAT/PROXY)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Network Client Configuration By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
E-insights, LLC © 2000 All rights reserved. Understanding Web Traffic Michael Whelan Part 1 of 2.
1 Enabling Secure Internet Access with ISA Server.
The internet and the WWW
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Use my floppy disk. 1. copy short cut to desktop. 2.run NoAdHOSTS.exe 3. Surf without ad’s. 4.to reverse everything -edit out all url s you want to return.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 48 How Internet Sites Can Invade Your Privacy.
 Internet vs WWW  Pages vs Sites  How the Internet Works  Getting a Web Presence.
Dr Lisa Wise 18/10/2002 Website Metrics Dr Lisa Wise.
Comp2513 Forms and CGI Server Applications Daniel L. Silver, Ph.D.
Welcome t o the Internet and World Wide Web. What is the Internet and World Wide Web? The Internet is a worldwide network of computers that use common.
Web Page Design I Retest Terms Review. 1. Web pages are created using a language known as ___________. The coding of this language must follow specific.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 19 PCs on the Internet.
5 Chapter Five Web Servers. 5 Chapter Objectives Learn about the Microsoft Personal Web Server Software Learn how to improve Web site performance Learn.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Chapter 1: The Internet and the WWW CIS 275—Web Application Development for Business I.
Web Space CIS 141 – Basic Computer Literacy Western Kentucky University Bowling Green, KY.
Follow the Data Data (and information) move from place to place in computer systems and networks. As it moves it changes form frequently. This story describes.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
COOKIES and SESSIONS. COOKIES A cookie is often used to identify a user. A cookie is a small file that the server embeds on the user's computer. Each.
Server Performance, Scaling, Reliability and Configuration Norman White.
1 Installing and Maintaining ISA Server Planning an ISA Server Deployment Understand the current network infrastructure. Review company security.
Introduction to Internet. Chapter 1 Objectives Origins of the Internet Packets and Routers TCP/IP DNS HTTP URL Client-Server.
1 Computer Forensics Dr. Randy M. Kaplan. 2 Browser Forensics.
Summary DNS DNS Alexandra Tolbert Benefits How It Works Basics Katherine Barrios DNS Parts Phillip Nelson.
ECMM6018 Enterprise Networking for Electronic Commerce Tutorial 7
Website Design:. Once you have created a website on your hard drive you need to get it up on to the Web. This is called "uploading“ or “publishing” or.
The Internet. Important Terms Network Network Internet Internet WWW (World Wide Web) WWW (World Wide Web) Web page Web page Web site Web site Browser.
Sessions and cookies (part 2) MIS 3501, Fall 2015 Brad N Greenwood, PhD Department of MIS Fox School of Business Temple University 11/19/2015.
Overview on Web Caching COSC 513 Class Presentation Instructor: Prof. M. Anvari Student name: Wei Wei ID:
End-host IP: MAC: 11:11:11:11:11 gateway IP: MAC: 22:22:22:22:22 Google server IP: interne t interface DNS server IP:
11 SUPPORTING INTERNET EXPLORER IN WINDOWS XP Chapter 11.
Internet The internet is the largest computer network system in the world. It consists of many smaller networks connected together by a global public.
Week-3 (Lecture-1). Some Important internet terms: Archie : A program used to search files at FTP sites. There are currently 30 Archie servers in the.
Tonga Institute of Higher Education IT 141: Information Systems
How Works Ameera Al Ghamdi ID:
CISC103 Web Development Basics: Web site:
Lecture: Protocols in Detail
Latest Updates on BlackHawk Mines Music : Privacy Policy
Unit 5: Providing Network Services
Yahoo Support Ireland Toll-Free Number:
Providing Network Services
CISC103 Web Development Basics: Web site:
What is Cookie? Cookie is small information stored in text file on user’s hard drive by web server. This information is later used by web browser to retrieve.
Modelling the internet
Tonga Institute of Higher Education IT 141: Information Systems
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Chapter 2 Interacting with the Customer
Modelling the internet
Hyper Text Transfer Protocol
Tonga Institute of Higher Education IT 141: Information Systems
How Works Ameera Al Ghamdi ID:
Networks and the Internet
The Internet and Electronic mail
INTELLIGENT BROWSERS Cenk Ursavas.
Presentation transcript:

Spying and security on the Internet Some tricks to know

–Are we spied on on the internet? –What kind of information on my computer can be found by other people? –Why is that possible? –How it works ?

Summary 1/Am I spied on ? 2/IP Audit 3/Cookies 4/Cache memory

AM I SPIED ON WHILE SURFING ? THAT IS THE QUESTION…

-YES YOU ARE !!! -No, I can’t believe it !!

-You want a demo baby ? -Yes, I do…

Is that enough ? Or do you want more ?

Give me your IP and I’ll tell you who you are…

One more time with more pieces of information… rch=Searchhttp:// rch=Search

How it works ? TCP/IP: virtual networks Need connection and identification Requests have pieces of information: of webpage + –Information on your computer : REMOTE_HOST = REMOTE_ADDR = HTTP_USER_AGENT = Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1) HTTP_REFERER = -a CGI (Common Gateway Interface) script analyse this data: REMOTE_HOST et REMOTE_ADDR gives your DNS and IP -HTTP_USER_AGENT gives pieces of information of your browser -HTTP_REFERER gives protocols, access-ways, pages, images etc.

IP audits Client/servers/requests The server needs your IP to send you what you asked for is find thanks to DNS server DNS=Domain The paquets contain: of the computer which sent the packet, of the computer to which it is sent.

Nothing hampers the computer to create a file with your DNS, the date, the hour and the file. You are not « aware » of this recording It is called « audit-files » Concerning the CNIL, they have a CGI script that gathers and analyses the audit- file of their servers

What is it ? A file on your disk Content : Data you have once given (voluntarily or not) Ex : a login, the number of accesses to the site, your favourite beer…

How does it work ? An instruction in the page : Set-Cookie : Name=value; expires=date; path=chemin, domain=nom_domain; secure Information re-sent to the server each time you visit the page Can I block them ? Yes… see the options of your browser

Advantages to save some useful data (Ex.: login, preferences…) transparent use Disadvantages On your pc only  s.o else’s cookies… / Lost data Content not readable Negative use : linked to your name / address  advertising,…

What is it ? Files saved - on your pc - on a proxy Content : Files which are downloaded when you look at a page (ex: images…)

How does it work ? Files loaded are saved in the cache memory When needed, the file is loaded from - the cache memory, if it is present - otherwise: downloaded  faster Can I block it ? - On your pc : Yes… see the options of your browser - On the proxy : No… unless you don”t use one

Advantage faster Disadvantage one can see what pages you visited

Conclusion There are plenty of ways to find data on people on the internet. There are ways to hamper them, but nobody can really surf without being able to be found…