Category Archives: Computers

A quick look at the European Cookie Banning Law!

Http Cookies

Http Cookies

Not so long ago, in 2009, the European Commission passed a law regulating the use of cookies for all companies operating in the internet. The deadline for the adoption of the law was May 2011, only 3 of the European Countries embraced such regulation; Denmark, Estonia and UK, which as of realizing it wasn’t really something enforceable gave a “grace” period for companies to adapt to it.

The fact is 92% of websites use cookies for one thing or another, and most probably, all sites you’re visiting are breaking the law. Watch the video at the bottom of the page.

Find here a video from Silktide that briefly illustrates in 2 minutes all the basics of the law you need to know.

cookie, also known as an HTTP cookieweb cookie, or browser cookie, is used for an origin website to send state information to a user‘s browser and for the browser to return the state information to the origin site. The state information can be used for authentication, identification of a user session, user’s preferences, shopping cart contents, or anything else that can be accomplished through storing text data on the user’s computer.

Cookies cannot be programmed, cannot carry viruses, and cannot install malware on the host computer. However, breaches of browser security can allow tracking cookies to be placed which are then used as spyware to track user’s browsing activities—a major privacy concern that prompted European and US law makers to take action. The security of a cookie generally depends on the security of the issuing website and the user’s web browser. If not implemented correctly, a cookie’s data can be intercepted by a hacker to gain unapproved access to the user’s data and possibly to the originating website.

Source: Wikipedia

Find here a video from Silktide that briefly illustrates in 2 minutes all the basics of the law you need to know!

Leave a comment

Filed under Computers, Geek, Society, Video

The First True Cyberweapon -Anatomy of a Virus – Stuxnet

In June 2010, a computer virus called Stuxnet was found in electric plants and industrial complexes all over the world. The latest evolution of computer viruses eventually brought Iran‘s Bushehr Nuclear facility to a halt, in what many label as the first act of cyber ware by the use of the first Cyberweapon, Stuxnet.

 

 

 

computer virus is a computer program that can replicate itself and spread from one computer to another. The term “virus” is also commonly, but erroneously used, to refer to other types of malware, including but not limited to adware and spyware programs that do not have a reproductive ability.

Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by other computers.

Malware includes computer viruses, computer worms, Trojan horses, most rootkits, spyware, dishonest adware and other malicious or unwanted software, including true viruses. Viruses are sometimes confused with worms and Trojan horses, which are technically different. A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system‘s data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves. Some viruses do nothing beyond reproducing themselves.

Source: Source Wikipedia

Watch the Stuxnet – Anatony of a Virus!

 

Leave a comment

Filed under Computers, Society, Video