
Deep packet inspection Bij deep packet inspection (DPI) wordt elektronisch dataverkeer tussen zender en ontvanger inhoudelijk geanalyseerd. Dit gaat verder dan de inspectie van afzender- en ontvangeradres zoals routers dat voor het verder leiden van de gegevens noodzakelijkerwijs moeten doen. Het internet functioneert doordat gegevens in gestandaardiseerde brokstukken worden verdeeld, verpakt en verstuurd. De inhoud van de pakketjes speelt voor het functioneren van het internet als zodanig geen rol. Als er geen gebruik wordt gemaakt van deep packet inspection wordt er tijdens de reis van de gegevens alleen naar het IP-adres en het poortnummer gekeken. Bij deep packet inspection daarentegen wordt ook de inhoud van de pakketjes bekeken en op basis van de inhoud kunnen de pakketjes dan verschillend behandeld worden: geweigerd, gekopieerd naar een andere ontvanger of met een andere prioriteit worden doorgestuurd.
Escape your search engine Filter Bubble! DuckDuckGo does not collect or share personal information. That is our privacy policy in a nutshell. The rest of this page tries to explain why you should care. Last updated on 04/11/12. Removed ", which gets sent to my personal email." in last paragraph as our feedback is now handled by multiple team members via desk.com. Before that, on 03/11/12.
Les data en forme Cette semaine dans la veille des journalistes de données d'OWNI, la data flirte avec l'art, les sondages, le Do It Yourself, les Jeux Olympiques et la défense des femmes. Commençons notre voyage data de la semaine par une destination inhabituelle : l’Afghanistan. The Asian Foundation mène depuis sept ans une étude d’opinion sur la perception, par la population afghane, des changements politiques et des évolutions dans leur vie quotidienne. En 2011, elle a interviewé 6 348 citoyens afghans, dans les 34 provinces du pays. L’application interactive “Visualizing Afghanistan” permet de naviguer dans les résultats de cette étude, par trois entrées : chronologique (de 2006 à 2011), thématique (l’utilisateur peut sélectionner les questions en haut à droite) et cartographique, en accédant au détail des réponses par région. Une granularité particulièrement révélatrice et utile pour mettre les données en perspective.
Report Phishing Sites US-CERT collects phishing email messages and website locations so that we can help people avoid becoming victims of phishing scams. You can report phishing to us by sending email to phishing-report@us-cert.gov. What Is Phishing? Phishing is an attempt by an individual or group to solicit personal information from unsuspecting users by employing social engineering techniques. Phishing emails are crafted to appear as if they have been sent from a legitimate organization or known individual. DuckDuckGo: Escape your search engine filter bubble "But here's why some people probably don't like personalization: It's invisible. There is nothing on the results page that tells you whether your results are personalized or not." Sorry, this is just not the case: we do provide indication on Google's search results page for personalized results.
Jonathan Harris, poète des data Si vous pensiez que des mots aussi barbares que "datamining", "base de données" ou "ontologies" ne pouvaient pas créer de la beauté et de la poésie, c’est que vous ne connaissez pas encore Jonathan Harris. Harris est un artiste des données. Du haut de ses 31 ans, il a déjà à son actif une vingtaine de projets visibles sur son site, number27. Alors qu’il travaillait sur un projet de visualisation de l’actualité, 10×10, il croisé Upendra Shardanand, CEO de Daylife, une plateforme de publication pour sites d’actu. Searching the Searchers with SearchAudit Searching the Searchers with SearchAudit John P. John, Fang Yu, Yinglian Xie, Martin Abadi, and Arvind Krishnamurthy August 2010 Search engines not only assist normal users, but also provide information that hackers and other malicious entities can exploit in their nefarious activities.
Search more securely with encrypted Google web search Update June 25, 2010: Since we introduced our encrypted search option last month, we’ve been listening closely to user feedback. Many users appreciate the capability to perform searches with better protection against snooping from third parties. We’ve also heard about some challenges faced by various school districts, and today, we want to inform you that we’ve moved encrypted search from to The site functions in the same way. For more information on this change, please read on here. As people spend more time on the Internet, they want greater control over who has access to their online communications. Many Internet services use what are known as Secure Sockets Layer (SSL) connections to encrypt information that travels between your computer and their service.
Dark Web Terrorism Research : Research : Artificial Intelligence Laboratory : Eller College of Management : The University of Arizona The Dark Web Project and Forum Portal As part of its Dark Web project, the Artificial Intelligence Lab has for several years collected international jihadist forums. These online discussion sites are dedicated to topics relating primarily to Islamic ideology and theology. The Lab now provides search access to these forums through its Dark Web Forum Portal, and in its beta form, the portal provides access to 28 forums, which together comprise nearly 13,000,000 messages. The Portal also provides statistical analysis, download, translation and social network visualization functions for each selected forum.
Leave Google Behind Smartphone Forensics: Cracking BlackBerry Backup Passwords « Advanced Password Cracking – Insight BlackBerry dominates the North American smartphone market, enjoying almost 40 per cent market share. A 20 per cent worldwide market share isn’t exactly a bad thing, too. The total subscriber base for the BlackBerry platform is more than 50 million users. Today, we are proud to present world’s first tool to facilitate forensic analysis of BlackBerry devices by enabling access to protected data stored on users’ BlackBerries. One of the reasons of BlackBerry high popularity is its ultimate security. How Dropbox sacrifices user privacy for cost savings Note: This flaw is different than the authentication flaw in Dropbox that Derek Newton recently published. Summary Dropbox, the popular cloud based backup service deduplicates the files that its users have stored online. This means that if two different users store the same file in their respective accounts, Dropbox will only actually store a single copy of the file on its servers.
Google Agonizes on Privacy as Advertising World Vaults Ahead Panopticlick