SlideShare uma empresa Scribd logo
Digitalks #15 Sicherheit im Netz Martin Leyrer
Themenübersicht ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
http://www.flickr.com/photos/57402879@N00/362127198/
Pestizide (Virenschutz) ,[object Object],[object Object],[object Object],[object Object]
http://www.flickr.com/photos/moritzbernoully/3411252063/
Brandmauern (Firewalls) ,[object Object],[object Object],[object Object],[object Object],[object Object]
http://www.flickr.com/photos/disaster_area/3640293101/
Service (Aktualisierungen) ,[object Object],[object Object],[object Object],[object Object]
http://www.flickr.com/photos/smoovey/3297533849/
Wer lauscht mit (Verschlüsselung) ,[object Object],[object Object],[object Object]
 
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Last year, my novel Makers was published and syndicated free as a series of 81 blog-posts on Tor.com. Tor had the insanely creative people at Idiots' Books produce 81 interlocking, tesselating illustrations, one for each installment, and made a sweet little Flash toy that let you play with making your own meta-illo by moving the tiles around. ... READ CAREFULLY. By reading this email, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED  agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies ("BOGUS AGREEMENTS") that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkwMgeAACgkQkCbbvh/CN6+LDQCgg9F8dQ8AzuqU/fiPo7LNYF4K +C8AniOh2ec0Z/S26UYgmbYvK3J57b+X =fFi4 -----END PGP SIGNATURE-----
http://www.flickr.com/photos/newbirth/4484884179/
Krümelmonster ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
http://www.flickr.com/photos/parmiter/2505803867/
Passwörter ,[object Object],[object Object]
Vertrauen Sie mir, ich weiß was ich tue!
 
 
Vertrauen Delivered-To: leyrer@gmail.com Received: by 10.204.10.132 with SMTP id p4cs3051bkp; Mon, 7 Jun 2010 22:52:17 -0700 (PDT) Received: by 10.231.196.220 with SMTP id eh28mr818375ibb.198.1275976335525; Mon, 07 Jun 2010 22:52:15 -0700 (PDT) Return-Path: <abkor@gci-net.com> Received: from weblinux04.bighost.com.br (weblinux04.bighost.com.br [200.219.245.41]) by mx.google.com with SMTP id f19si7825272ibj.96.2010.06.07.22.52.14; Mon, 07 Jun 2010 22:52:15 -0700 (PDT) Received-SPF: neutral (google.com: 200.219.245.41 is neither permitted nor denied by domain of abkor@gci-net.com) client-ip=200.219.245.41; Authentication-Results: mx.google.com; spf=neutral (google.com: 200.219.245.41 is neither permitted nor denied by domain of abkor@gci-net.com) smtp.mail=abkor@gci-net.com Date: Tue, 8 Jun 2010 02:44:09 +0300 To: <leyrer@gmail.com> From: Facebook <noreply@facebookmail.com> Subject: You have deactivated your Facebook account (56289) Message-ID: <0ddb107362ec20c90100798d78335f1e@www.facebook.com> X-Priority: 3 MIME-Version: 1.0 Content-Type: text/html; charset=&quot;UTF-8&quot; Content-Transfer-Encoding: 7bit
Temporäre E-Mail ,[object Object],[object Object],http://www.flickr.com/photos/cobalt/247564799/
„Anonym“ Online ,[object Object],[object Object],[object Object]
 
http://www.flickr.com/photos/98469445@N00/327471676/
Die Kunst der Täuschung ,[object Object],[object Object],[object Object]
Practical Cryptography ,[object Object],[object Object],[object Object]
Little Brother ,[object Object],[object Object],[object Object],[object Object]
Danke für die Aufmerksamkeit! ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Semelhante a Digitalks #15 - Sicherheit im Netz

BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
Jakub Kałużny
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ Superweek
Phil Pearce
 
Comment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mienComment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mien
Julien Dereumaux
 
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
guest441c58b71
 
New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)
msz
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talk
kieranjacobsen
 
Blackhat Analytics 3 @ superweek - Do be evil: Force awakens
Blackhat Analytics 3 @  superweek - Do be evil: Force awakensBlackhat Analytics 3 @  superweek - Do be evil: Force awakens
Blackhat Analytics 3 @ superweek - Do be evil: Force awakens
Phil Pearce
 
New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)
msz
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)
Security B-Sides
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
Priyanka Aash
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Benedek Menesi
 
Chrome Extensions: Masking risks in entertainment
Chrome Extensions: Masking risks in entertainmentChrome Extensions: Masking risks in entertainment
Chrome Extensions: Masking risks in entertainment
Eduardo Chavarro
 
Taming botnets
Taming botnetsTaming botnets
Taming botnets
f00d
 
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic AnalysisLife Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Positive Hack Days
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
Zoltan Balazs
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
Felipe Prado
 
Javascript Security
Javascript SecurityJavascript Security
Javascript Security
jgrahamc
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
Microsoft Argentina y Uruguay [Official Space]
 
20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
University of Twente
 
Weird new tricks for browser fingerprinting
Weird new tricks for browser fingerprintingWeird new tricks for browser fingerprinting
Weird new tricks for browser fingerprinting
Roel Palmaers
 

Semelhante a Digitalks #15 - Sicherheit im Netz (20)

BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.BSides London 2015 - Proprietary network protocols - risky business on the wire.
BSides London 2015 - Proprietary network protocols - risky business on the wire.
 
Blackhat Analytics 2 @ Superweek
Blackhat Analytics 2  @ SuperweekBlackhat Analytics 2  @ Superweek
Blackhat Analytics 2 @ Superweek
 
Comment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mienComment pirater le site de mon concurrent.. et securiser le mien
Comment pirater le site de mon concurrent.. et securiser le mien
 
Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8Cracking Into Embedded Devices - HACK.LU 2K8
Cracking Into Embedded Devices - HACK.LU 2K8
 
New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)New or obscure web browsers 4x3 (rcsi draft 6)
New or obscure web browsers 4x3 (rcsi draft 6)
 
The Boring Security Talk
The Boring Security TalkThe Boring Security Talk
The Boring Security Talk
 
Blackhat Analytics 3 @ superweek - Do be evil: Force awakens
Blackhat Analytics 3 @  superweek - Do be evil: Force awakensBlackhat Analytics 3 @  superweek - Do be evil: Force awakens
Blackhat Analytics 3 @ superweek - Do be evil: Force awakens
 
New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)New or obscure web browsers (4x3 draft 5)
New or obscure web browsers (4x3 draft 5)
 
Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)Smashing the stats for fun (and profit)
Smashing the stats for fun (and profit)
 
HTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implicationsHTTP cookie hijacking in the wild: security and privacy implications
HTTP cookie hijacking in the wild: security and privacy implications
 
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical GuideProtecting Microsoft Teams from Cyber Security Threats - a Practical Guide
Protecting Microsoft Teams from Cyber Security Threats - a Practical Guide
 
Chrome Extensions: Masking risks in entertainment
Chrome Extensions: Masking risks in entertainmentChrome Extensions: Masking risks in entertainment
Chrome Extensions: Masking risks in entertainment
 
Taming botnets
Taming botnetsTaming botnets
Taming botnets
 
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic AnalysisLife Cycle And Detection Of Bot Infections Through Network Traffic Analysis
Life Cycle And Detection Of Bot Infections Through Network Traffic Analysis
 
Ransomware - what is it, how to protect against it
Ransomware - what is it, how to protect against itRansomware - what is it, how to protect against it
Ransomware - what is it, how to protect against it
 
INSECURE Magazine - 35
INSECURE Magazine - 35INSECURE Magazine - 35
INSECURE Magazine - 35
 
Javascript Security
Javascript SecurityJavascript Security
Javascript Security
 
Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)Seguridad Corporativa Con Internet Explorer 8(1)
Seguridad Corporativa Con Internet Explorer 8(1)
 
20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna20170926 Inter-Actief Lunchtalk Jair Santanna
20170926 Inter-Actief Lunchtalk Jair Santanna
 
Weird new tricks for browser fingerprinting
Weird new tricks for browser fingerprintingWeird new tricks for browser fingerprinting
Weird new tricks for browser fingerprinting
 

Mais de Martin Leyrer

Feed me, Seymour! Supplemental User Data For IBM Connections Profiles
Feed me, Seymour!  Supplemental User Data For IBM Connections ProfilesFeed me, Seymour!  Supplemental User Data For IBM Connections Profiles
Feed me, Seymour! Supplemental User Data For IBM Connections Profiles
Martin Leyrer
 
Look Mum, No Passwords!
Look Mum, No Passwords!Look Mum, No Passwords!
Look Mum, No Passwords!
Martin Leyrer
 
The Circle of Life
The Circle of LifeThe Circle of Life
The Circle of Life
Martin Leyrer
 
The latest, ultimative final ver­sion, current release, approved, last minute...
The latest, ultimative final ver­sion, current release, approved, last minute...The latest, ultimative final ver­sion, current release, approved, last minute...
The latest, ultimative final ver­sion, current release, approved, last minute...
Martin Leyrer
 
Debugging IBM Connections for the Impatient Admin - Social Connections VII
Debugging IBM Connections for the Impatient Admin - Social Connections VIIDebugging IBM Connections for the Impatient Admin - Social Connections VII
Debugging IBM Connections for the Impatient Admin - Social Connections VII
Martin Leyrer
 
ICON UK 2014 - Look mum, no passwords!
ICON UK 2014 - Look mum, no passwords!ICON UK 2014 - Look mum, no passwords!
ICON UK 2014 - Look mum, no passwords!
Martin Leyrer
 
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Martin Leyrer
 
Social Conndections VI -- Debugging IBM Connections During Install And Operation
Social Conndections VI -- Debugging IBM Connections During Install And OperationSocial Conndections VI -- Debugging IBM Connections During Install And Operation
Social Conndections VI -- Debugging IBM Connections During Install And Operation
Martin Leyrer
 
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013"Was, SSH kann auch das?" @ Linuxwochen Wien 2013
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013
Martin Leyrer
 
Was, SSH kann auch das?
Was, SSH kann auch das? Was, SSH kann auch das?
Was, SSH kann auch das?
Martin Leyrer
 
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...
Martin Leyrer
 
Laconi.ca & Identi.ca Einführung & Setup
Laconi.ca & Identi.ca Einführung & SetupLaconi.ca & Identi.ca Einführung & Setup
Laconi.ca & Identi.ca Einführung & Setup
Martin Leyrer
 
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz Edition
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz EditionEffiziente Fehlersuche In Web 2.0 Anwendungen - Graz Edition
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz Edition
Martin Leyrer
 
Open Source und Free Software unter Windows
Open Source und Free Software unter WindowsOpen Source und Free Software unter Windows
Open Source und Free Software unter Windows
Martin Leyrer
 
Effiziente Fehlersuche in Web 2.0 Anwendungen
Effiziente Fehlersuche in Web 2.0 AnwendungenEffiziente Fehlersuche in Web 2.0 Anwendungen
Effiziente Fehlersuche in Web 2.0 Anwendungen
Martin Leyrer
 

Mais de Martin Leyrer (15)

Feed me, Seymour! Supplemental User Data For IBM Connections Profiles
Feed me, Seymour!  Supplemental User Data For IBM Connections ProfilesFeed me, Seymour!  Supplemental User Data For IBM Connections Profiles
Feed me, Seymour! Supplemental User Data For IBM Connections Profiles
 
Look Mum, No Passwords!
Look Mum, No Passwords!Look Mum, No Passwords!
Look Mum, No Passwords!
 
The Circle of Life
The Circle of LifeThe Circle of Life
The Circle of Life
 
The latest, ultimative final ver­sion, current release, approved, last minute...
The latest, ultimative final ver­sion, current release, approved, last minute...The latest, ultimative final ver­sion, current release, approved, last minute...
The latest, ultimative final ver­sion, current release, approved, last minute...
 
Debugging IBM Connections for the Impatient Admin - Social Connections VII
Debugging IBM Connections for the Impatient Admin - Social Connections VIIDebugging IBM Connections for the Impatient Admin - Social Connections VII
Debugging IBM Connections for the Impatient Admin - Social Connections VII
 
ICON UK 2014 - Look mum, no passwords!
ICON UK 2014 - Look mum, no passwords!ICON UK 2014 - Look mum, no passwords!
ICON UK 2014 - Look mum, no passwords!
 
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
Social Connections VI -- Customizing Connections Profiles to Provide a Compan...
 
Social Conndections VI -- Debugging IBM Connections During Install And Operation
Social Conndections VI -- Debugging IBM Connections During Install And OperationSocial Conndections VI -- Debugging IBM Connections During Install And Operation
Social Conndections VI -- Debugging IBM Connections During Install And Operation
 
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013"Was, SSH kann auch das?" @ Linuxwochen Wien 2013
"Was, SSH kann auch das?" @ Linuxwochen Wien 2013
 
Was, SSH kann auch das?
Was, SSH kann auch das? Was, SSH kann auch das?
Was, SSH kann auch das?
 
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...
Accessible Websites With Lotus Notes/Domino, presented at the BLUG day event,...
 
Laconi.ca & Identi.ca Einführung & Setup
Laconi.ca & Identi.ca Einführung & SetupLaconi.ca & Identi.ca Einführung & Setup
Laconi.ca & Identi.ca Einführung & Setup
 
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz Edition
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz EditionEffiziente Fehlersuche In Web 2.0 Anwendungen - Graz Edition
Effiziente Fehlersuche In Web 2.0 Anwendungen - Graz Edition
 
Open Source und Free Software unter Windows
Open Source und Free Software unter WindowsOpen Source und Free Software unter Windows
Open Source und Free Software unter Windows
 
Effiziente Fehlersuche in Web 2.0 Anwendungen
Effiziente Fehlersuche in Web 2.0 AnwendungenEffiziente Fehlersuche in Web 2.0 Anwendungen
Effiziente Fehlersuche in Web 2.0 Anwendungen
 

Último

Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 

Último (20)

Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 

Digitalks #15 - Sicherheit im Netz

  • 1. Digitalks #15 Sicherheit im Netz Martin Leyrer
  • 2.
  • 4.
  • 6.
  • 8.
  • 10.
  • 11.  
  • 12. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Last year, my novel Makers was published and syndicated free as a series of 81 blog-posts on Tor.com. Tor had the insanely creative people at Idiots' Books produce 81 interlocking, tesselating illustrations, one for each installment, and made a sweet little Flash toy that let you play with making your own meta-illo by moving the tiles around. ... READ CAREFULLY. By reading this email, you agree, on behalf of your employer, to release me from all obligations and waivers arising from any and all NON-NEGOTIATED agreements, licenses, terms-of-service, shrinkwrap, clickwrap, browsewrap, confidentiality, non-disclosure, non-compete and acceptable use policies (&quot;BOGUS AGREEMENTS&quot;) that I have entered into with your employer, its partners, licensors, agents and assigns, in perpetuity, without prejudice to my ongoing rights and privileges. You further represent that you have the authority to release me from any BOGUS AGREEMENTS on behalf of your employer. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org iEYEARECAAYFAkwMgeAACgkQkCbbvh/CN6+LDQCgg9F8dQ8AzuqU/fiPo7LNYF4K +C8AniOh2ec0Z/S26UYgmbYvK3J57b+X =fFi4 -----END PGP SIGNATURE-----
  • 14.
  • 16.
  • 17. Vertrauen Sie mir, ich weiß was ich tue!
  • 18.  
  • 19.  
  • 20. Vertrauen Delivered-To: leyrer@gmail.com Received: by 10.204.10.132 with SMTP id p4cs3051bkp; Mon, 7 Jun 2010 22:52:17 -0700 (PDT) Received: by 10.231.196.220 with SMTP id eh28mr818375ibb.198.1275976335525; Mon, 07 Jun 2010 22:52:15 -0700 (PDT) Return-Path: <abkor@gci-net.com> Received: from weblinux04.bighost.com.br (weblinux04.bighost.com.br [200.219.245.41]) by mx.google.com with SMTP id f19si7825272ibj.96.2010.06.07.22.52.14; Mon, 07 Jun 2010 22:52:15 -0700 (PDT) Received-SPF: neutral (google.com: 200.219.245.41 is neither permitted nor denied by domain of abkor@gci-net.com) client-ip=200.219.245.41; Authentication-Results: mx.google.com; spf=neutral (google.com: 200.219.245.41 is neither permitted nor denied by domain of abkor@gci-net.com) smtp.mail=abkor@gci-net.com Date: Tue, 8 Jun 2010 02:44:09 +0300 To: <leyrer@gmail.com> From: Facebook <noreply@facebookmail.com> Subject: You have deactivated your Facebook account (56289) Message-ID: <0ddb107362ec20c90100798d78335f1e@www.facebook.com> X-Priority: 3 MIME-Version: 1.0 Content-Type: text/html; charset=&quot;UTF-8&quot; Content-Transfer-Encoding: 7bit
  • 21.
  • 22.
  • 23.  
  • 25.
  • 26.
  • 27.
  • 28.

Notas do Editor

  1. Some flash LSO-cookie properties in short... - they are never expiring - staying on your computer for an unlimited time. - by default they offer a storage of 100 KB (compare: Usual cookies 4 KB). - browsers are not aware of those cookies, LSO&apos;s usually cannot be removed by browsers. - via Flash they can access and store highly specific personal and technical information (system, user name, files,...). - ability to send the stored information to the appropriate server, without user&apos;s permission. - flash applications do not need to be visible - there is no easy way to tell which flash-cookie sites are tracking you. - shared folders allow cross-browser tracking, LSO&apos;s work in every flash-enabled application - the company doesn&apos;t provide a user-friendly way to manage LSO&apos;s, in fact it&apos;s incredible cumbersome. - many domains and tracking companies make extensive use of flash-cookies.