The Inherent Creepiness of Technology and the Betrayal of Privacy

We all should worry about how technology has not taken over our planet but also our lives. It would seem there are advantages to technology. As I shall demonstrate in this report, but this isn’t the case. Modern technology is not quite as positive as it appears. It is a lot more sinister than it looks. People aren’t aware of some of technology’s background effects that could be dangerous or harmful .

So much appears to be happening beyond our control and also that’s from our perspective. It’s much worse compared to the Brave New World which Huxley described ago. It’s a world that watches us but pries into our lives when we least expect it. Our systems and information are passing back and forth without bothering to tell us that they’re doing. They are parsing and analyzing it to ascertain the significance of what we do and say.

Technology is but currently invading our lives.

Here are a few methods that technology does this.

When you utilize your smartphone to have a photograph •, it auto-uploads with no your understanding or permission to Facebook.

• Your e-mail through suppliers like Yahoo, Google or Microsoft is much less safe as it might appear. There’s absolutely not any way for any you to know your email is processed. There are no tools.

At nighttime, you might hear the tricky drive on your PC. The monitor is flickering though it is not being used by anybody. Is there somebody actually there or not?

• Bars in cities have installed cameras which create inferences about them and watch their clientele. Then this info is used by them if they should.

Generation wearable computers like google Glass may start when you’re on the internet, in which you’re looking tracking. That information will be offered to others and advertisers that are currently seeking a window.

About where you’re without your knowing Your phone may listen. Is that? Maybe you would prefer a discount coupon to get the shop of the team. All this might be refined in the background.

We must be certain we save ourselves from these technologies that are currently invading our lives and discovering who we are without our knowing it. We all should take center and be sure we’re careful with our technologies. Shut them. Brother may stop from collecting information and watching you and spreading it.

Read More »

Secure Your Web Application Like Your Own House

A simple way to look at web application security is by picturing your residence. It’s a front door, a rear door, windows, quite a few rooms, a roof, boundary fences and distinct access routes. Only the terminology differs.

The Front Door.
The front door of any web application is the login page and, unsurprisingly, it’s the principal point of attack. A login page will consist of edit boxes to form a user name and password along with a button to ship these to your server to authenticate your access to the remainder of the web application. Some login pages may offer a captcha to be certain you’re a human being and not a mock-up of the exact same form on another server. The mock-up form will cycle via variants of consumer names and passwords until it increases access to the program. This is referred to as cross-site forgery and is comparable to your burglar forging the secrets into your residence.

Captchas are jumbled pictures of scrambled letters and figures that make it impossible for an automatic script to read. Regrettably, as the scripts become adept in reading these pictures, the captcha images will need to become more complicated and more difficult for people to read. This causes frustration for the end-user as they’ve repeated failed attempts at gaining access to their accounts since the captcha was unreadable. The answer for this is to replace the captcha using a secure token. The secure token is generated my joining the user name, password and any other user info available with a distinctively generated key. This concatenation is then encrypted and stored as a hidden field in the form, thus rendering it impossible for any mock-up form to generate a successful login effort.

The Windows and Back Door.
What are the windows of a web program? I don’t mean that the operating system on the server. I’m speaking about possible areas of each page that may be broken to make a forced entry. These regions are edit boxes and text areas which allow a user to type information. An attacker will use edit boxes and text areas to input commands that the database understands. If the software isn’t written securely then it’s extremely simple to disrupt the database when it’s saving the information, so it will execute the commands provided by the attacker. Normal attacks could lead to the database being destroyed, data being stolen or consumer information being compromised. This sort of attack is called SQL injection.

Boundary Fences.
The border fences of a web page are any links, editable locations and the most important URL address. The URL of this page itself and hyperlinks embedded in the page can be copied and modified from the other website so that controls can be executed from the server. Javascript code can be inserted to editable regions to drive data to be submitted to a rogue website or to acquire control of the user’s browser. Database commands may also be inserted into the primary URL address. These attacks are referred to as cross-site scripting (XSS) strikes since they are scripts that direct the consumer to an attacker’s own internet website. XSS attacks can be used to steal a user’s botanical session identifier and use it in order to boost the degree of access of some other account they’ve already created.

To stop cross-site scripting, the computer software must scan all of editable places for code and also incorporate a secure token in each and every URL and link. Just as gaps and holes in fences should be shut. All secure pages should check for the occurrence of an authenticated user.

Read More »