SlideShare uma empresa Scribd logo
1 de 16
How to collect your web history using Apple Safari ,[object Object],[object Object]
Collecting your web history ~  We ask that you collect your web activities over a  2-3 day period.  Choosing days when you are most actively working on your research (as opposed to teaching   or service) would be ideal. ~  Please use login information provided in e-mail. ~  You may opt out or pause recording at any time.
Step #1: Select preferences from Safari menu
Step #2: Select “Advanced” tab
Step #3: Select “proxies” tab Click proxies tab
Step #4: Check box titled “Web Proxy (HTTP)”
Step #5: Define proxy settings Enter proxy address & port number Enter user name & password (received via e-mail) Click OK
Step #6: Apply settings Click apply
Step #7: Quit Safari & re-launch
Step #8: Confirm that Safari should remember password Click “allow”
Step #9: Use web regularly
Step #10: Pause or disable proxy at any time Uncheck “Web Proxy” Click OK
Data generated Timestamp (unix) Website viewed
Frequently asked questions ~  The proxy server should not slow down your access beyond possibly a second or two. If a website fails to load, disable the proxy server. ~  Regarding privacy: We will not collect keystrokes. None of your personally identifying information will be recorded.
Frequently asked questions (continued) ~  If using multiple computers, please feel free to use our proxy server for each of them (even at the same time). ~   If you forget the password, or the password does not work, click  “ c ancel ”   when prompted for a password, enter the settings menu, and un-check “Web Proxy ”  box  to disable the proxy server. Please send us an e-mail to receive a new password.
Many thanks for your help! Please contact Monica Bulger  ( [email_address] )  if you have any questions or encounter any difficulties.

Mais conteúdo relacionado

Mais procurados

Host monster info #2
Host monster info #2Host monster info #2
Host monster info #2Lennox Abrams
 
267 The Ultimate Guide to Protecting Your Blog and Digital Life
267 The Ultimate Guide to Protecting Your Blog and Digital Life267 The Ultimate Guide to Protecting Your Blog and Digital Life
267 The Ultimate Guide to Protecting Your Blog and Digital LifeLeslie Samuel
 
4.comment base hacking
4.comment base hacking4.comment base hacking
4.comment base hackingAkhilesh Kant
 
[Easy] LastPass Password Manager Tutorial
[Easy] LastPass Password Manager Tutorial[Easy] LastPass Password Manager Tutorial
[Easy] LastPass Password Manager TutorialAna Uy
 
User Guide of TimeAlly
User Guide of TimeAllyUser Guide of TimeAlly
User Guide of TimeAllyrebellodaniela
 
Wordpress horsepower
Wordpress horsepowerWordpress horsepower
Wordpress horsepowerRoss Johnson
 
How We Localize & Mobilize WP Sites - Pubcon 2013
How We Localize & Mobilize WP Sites - Pubcon 2013How We Localize & Mobilize WP Sites - Pubcon 2013
How We Localize & Mobilize WP Sites - Pubcon 2013Search Commander, Inc.
 
Error Handling in WebRTC
Error Handling in WebRTCError Handling in WebRTC
Error Handling in WebRTCAnant Narayanan
 

Mais procurados (14)

Host monster info #2
Host monster info #2Host monster info #2
Host monster info #2
 
Glory margareth tarongoy_lastpass
Glory margareth tarongoy_lastpassGlory margareth tarongoy_lastpass
Glory margareth tarongoy_lastpass
 
StorageCraft classroom configuration v1.5
StorageCraft classroom configuration v1.5StorageCraft classroom configuration v1.5
StorageCraft classroom configuration v1.5
 
267 The Ultimate Guide to Protecting Your Blog and Digital Life
267 The Ultimate Guide to Protecting Your Blog and Digital Life267 The Ultimate Guide to Protecting Your Blog and Digital Life
267 The Ultimate Guide to Protecting Your Blog and Digital Life
 
4.comment base hacking
4.comment base hacking4.comment base hacking
4.comment base hacking
 
[Easy] LastPass Password Manager Tutorial
[Easy] LastPass Password Manager Tutorial[Easy] LastPass Password Manager Tutorial
[Easy] LastPass Password Manager Tutorial
 
User Guide of TimeAlly
User Guide of TimeAllyUser Guide of TimeAlly
User Guide of TimeAlly
 
Win7vpn
Win7vpnWin7vpn
Win7vpn
 
How To Use Lastpass
How To Use LastpassHow To Use Lastpass
How To Use Lastpass
 
Attacking Web Proxies
Attacking Web ProxiesAttacking Web Proxies
Attacking Web Proxies
 
Wordpress horsepower
Wordpress horsepowerWordpress horsepower
Wordpress horsepower
 
Getting Started: The Installation
Getting Started: The InstallationGetting Started: The Installation
Getting Started: The Installation
 
How We Localize & Mobilize WP Sites - Pubcon 2013
How We Localize & Mobilize WP Sites - Pubcon 2013How We Localize & Mobilize WP Sites - Pubcon 2013
How We Localize & Mobilize WP Sites - Pubcon 2013
 
Error Handling in WebRTC
Error Handling in WebRTCError Handling in WebRTC
Error Handling in WebRTC
 

Semelhante a Safari instructions

WWW and Web Browser.pptx
WWW and Web Browser.pptxWWW and Web Browser.pptx
WWW and Web Browser.pptxMagdaLo1
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browserYansi Keim
 
How to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdfHow to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdfHost It Smart
 
امتحان النت
امتحان النتامتحان النت
امتحان النتDina El Stohy
 
How to fix the error this site can’t be reached
How to fix the error this site can’t be reachedHow to fix the error this site can’t be reached
How to fix the error this site can’t be reachedPearl Lemon
 
2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guide2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guidegunboundz
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
MarvelSoft email hosting guide
MarvelSoft email hosting guideMarvelSoft email hosting guide
MarvelSoft email hosting guideRanganath Shivaram
 
How to fix err connection reset error
How to fix err connection reset errorHow to fix err connection reset error
How to fix err connection reset errorPearl Lemon
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingOWASP Delhi
 
Defensive programing 101
Defensive programing 101Defensive programing 101
Defensive programing 101Niall Merrigan
 
installing-and-setting-up-your-zap-environment-slides.pdf
installing-and-setting-up-your-zap-environment-slides.pdfinstalling-and-setting-up-your-zap-environment-slides.pdf
installing-and-setting-up-your-zap-environment-slides.pdfMarcelo Cunha
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsJim Kaplan CIA CFE
 

Semelhante a Safari instructions (20)

WWW and Web Browser.pptx
WWW and Web Browser.pptxWWW and Web Browser.pptx
WWW and Web Browser.pptx
 
Its Orientation 2009
Its Orientation 2009Its Orientation 2009
Its Orientation 2009
 
WWW and web browser
WWW and web browserWWW and web browser
WWW and web browser
 
How to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdfHow to Fix the Incorrect Password Issue on RDP.pdf
How to Fix the Incorrect Password Issue on RDP.pdf
 
امتحان النت
امتحان النتامتحان النت
امتحان النت
 
Protect your website
Protect your websiteProtect your website
Protect your website
 
Week8 siri
Week8 siriWeek8 siri
Week8 siri
 
How to fix the error this site can’t be reached
How to fix the error this site can’t be reachedHow to fix the error this site can’t be reached
How to fix the error this site can’t be reached
 
2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guide2 Student Windows Vista Tp Secure Guide
2 Student Windows Vista Tp Secure Guide
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
MarvelSoft email hosting guide
MarvelSoft email hosting guideMarvelSoft email hosting guide
MarvelSoft email hosting guide
 
Cookies and session
Cookies and sessionCookies and session
Cookies and session
 
How to fix err connection reset error
How to fix err connection reset errorHow to fix err connection reset error
How to fix err connection reset error
 
Resources
ResourcesResources
Resources
 
Sessions&cookies
Sessions&cookiesSessions&cookies
Sessions&cookies
 
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 MeetingCombating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
Combating Cyber Crime by Priyanka Tomar @ OWASP Delhi July, 2014 Meeting
 
Resources
ResourcesResources
Resources
 
Defensive programing 101
Defensive programing 101Defensive programing 101
Defensive programing 101
 
installing-and-setting-up-your-zap-environment-slides.pdf
installing-and-setting-up-your-zap-environment-slides.pdfinstalling-and-setting-up-your-zap-environment-slides.pdf
installing-and-setting-up-your-zap-environment-slides.pdf
 
Cyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense MechanismsCyber Security - Boundary Defense Mechanisms
Cyber Security - Boundary Defense Mechanisms
 

Mais de oiisdp2010

The Structure of Political Discussion Networks
The Structure of Political Discussion Networks The Structure of Political Discussion Networks
The Structure of Political Discussion Networks oiisdp2010
 
The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)oiisdp2010
 
Digital gaming, racial and ethnic identity, and social justice
Digital gaming, racial and ethnic identity, and social justice Digital gaming, racial and ethnic identity, and social justice
Digital gaming, racial and ethnic identity, and social justice oiisdp2010
 
e-Harmony Study
e-Harmony Study e-Harmony Study
e-Harmony Study oiisdp2010
 
Citizens and Governments on the Internet
Citizens and Governments on the InternetCitizens and Governments on the Internet
Citizens and Governments on the Internetoiisdp2010
 
Online Social Networks
Online Social NetworksOnline Social Networks
Online Social Networksoiisdp2010
 
Virtual ethnography SDP 2010
Virtual ethnography SDP 2010 Virtual ethnography SDP 2010
Virtual ethnography SDP 2010 oiisdp2010
 
Industrial Organisation Off and On the Internet
Industrial Organisation Off and On the InternetIndustrial Organisation Off and On the Internet
Industrial Organisation Off and On the Internetoiisdp2010
 
Presentation Literacy: Skills for Effective Communication
Presentation Literacy: Skills for Effective CommunicationPresentation Literacy: Skills for Effective Communication
Presentation Literacy: Skills for Effective Communicationoiisdp2010
 

Mais de oiisdp2010 (9)

The Structure of Political Discussion Networks
The Structure of Political Discussion Networks The Structure of Political Discussion Networks
The Structure of Political Discussion Networks
 
The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)The Oxford Internet Survey (OxIS)
The Oxford Internet Survey (OxIS)
 
Digital gaming, racial and ethnic identity, and social justice
Digital gaming, racial and ethnic identity, and social justice Digital gaming, racial and ethnic identity, and social justice
Digital gaming, racial and ethnic identity, and social justice
 
e-Harmony Study
e-Harmony Study e-Harmony Study
e-Harmony Study
 
Citizens and Governments on the Internet
Citizens and Governments on the InternetCitizens and Governments on the Internet
Citizens and Governments on the Internet
 
Online Social Networks
Online Social NetworksOnline Social Networks
Online Social Networks
 
Virtual ethnography SDP 2010
Virtual ethnography SDP 2010 Virtual ethnography SDP 2010
Virtual ethnography SDP 2010
 
Industrial Organisation Off and On the Internet
Industrial Organisation Off and On the InternetIndustrial Organisation Off and On the Internet
Industrial Organisation Off and On the Internet
 
Presentation Literacy: Skills for Effective Communication
Presentation Literacy: Skills for Effective CommunicationPresentation Literacy: Skills for Effective Communication
Presentation Literacy: Skills for Effective Communication
 

Safari instructions

  • 1.
  • 2. Collecting your web history ~ We ask that you collect your web activities over a 2-3 day period. Choosing days when you are most actively working on your research (as opposed to teaching or service) would be ideal. ~ Please use login information provided in e-mail. ~ You may opt out or pause recording at any time.
  • 3. Step #1: Select preferences from Safari menu
  • 4. Step #2: Select “Advanced” tab
  • 5. Step #3: Select “proxies” tab Click proxies tab
  • 6. Step #4: Check box titled “Web Proxy (HTTP)”
  • 7. Step #5: Define proxy settings Enter proxy address & port number Enter user name & password (received via e-mail) Click OK
  • 8. Step #6: Apply settings Click apply
  • 9. Step #7: Quit Safari & re-launch
  • 10. Step #8: Confirm that Safari should remember password Click “allow”
  • 11. Step #9: Use web regularly
  • 12. Step #10: Pause or disable proxy at any time Uncheck “Web Proxy” Click OK
  • 13. Data generated Timestamp (unix) Website viewed
  • 14. Frequently asked questions ~ The proxy server should not slow down your access beyond possibly a second or two. If a website fails to load, disable the proxy server. ~ Regarding privacy: We will not collect keystrokes. None of your personally identifying information will be recorded.
  • 15. Frequently asked questions (continued) ~ If using multiple computers, please feel free to use our proxy server for each of them (even at the same time). ~ If you forget the password, or the password does not work, click “ c ancel ” when prompted for a password, enter the settings menu, and un-check “Web Proxy ” box to disable the proxy server. Please send us an e-mail to receive a new password.
  • 16. Many thanks for your help! Please contact Monica Bulger ( [email_address] ) if you have any questions or encounter any difficulties.