Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page ix Contents Acknowledgments xxiii Introduction xxv Chapter 1 Control Your Email 1 Hack 1: Empty Your Inbox (and Keep It Empty) 3 Why an Empty Inbox? 4 Set Up the Trusted Trio of Folders 4 The Archive Folder 5 The Follow Up Folder 5 The Hold Folder 6 Process Your Messages 6 Keep It Empty 7 Your First Time 7 The Catch 7 Hack 2: Decrease Your Response Time 8 Process Messages in Batches 9 The One-Minute Rule 9 Respond to Task Requests — Before the Task Is Done 9 COPYRIGHTEDDon’t Leave It in Your Inbox MATERIAL 10 Hack 3: Craft Effective Messages 10 Composing a New Message 11 Determine Your Purpose 11 Use an Informative Subject Line 11 Be Succinct 12 Put Your Messages on a Diet 12 Facilitate a Complete Response 13 ix 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page x x Contents Make It Clear Why Everyone Got the Message 14 Don’t Forget the Attachment 14 Replying to a Message 14 Respond to Individual Points Inline 15 Task Requests 15 Lead by Example 16 Don’t Respond in Real Time 16 Get Outside the Inbox 16 Know When Not to Say a Thing 17 Hack 4: Highlight Messages Sent Directly to You 17 Microsoft Outlook: Color Me Blue 18 All Other Email Programs: Create a Not-to-Me Filter 18 Hack 5: Use Disposable Email Addresses 19 Web-Based Public Email Addresses 19 Multi-Domain Email Addresses 19 Hack 6: Master Message Search 20 Search Criteria 20 Saved Search Folders 23 Hack 7: Future-Proof Your Email Address 25 Don’ts 25 Do’s 25 Bottom Line 26 Hack 8: Consolidate Multiple Email Addresses with Gmail 27 Receive Messages for Other Addresses in Your Gmail Inbox 27 Option 1: Set Up Gmail’s POP Mail Fetcher 27 Option 2: Forward Messages to Gmail Automatically 29 Write Messages from Non-Gmail Addresses 30 Hack 9: Script Repetitive Responses 32 Hack 10: Filter Low-Priority Messages (“Bacn”) 35 Filter Bacn 35 Filter CCed Messages 36 References 38 Chapter 2 Organize Your Data 39 Hack 11: Organize Your Documents Folder 41 How to Change the Windows XP Default Home Directory 43 Beyond the Big Six 44 Hack 12: Instantly Retrieve Files Stored on Your Computer 44 Built-in Desktop File Search Features 45 Google Desktop Installation 46 Google Desktop Configuration 46 Files that Google Desktop Indexes 47 Refining Your Search 48 Hack 13: Overhaul Your Filing Cabinet 50 Give Your Paperwork a Spacious Place to Live 50 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page xi Contents xi Limit One File Folder per Hanging Folder 50 Choose a Simple, Logical Naming Scheme 51 Use a Label Maker 51 Purge and Archive 51 Hack 14: Instantly Recall Any Number of Different Passwords 52 Don’t Use the Same Password for Everything 52 Remember 100 Different Passwords with One Rule Set 52 Hack 15: Securely Track Your Passwords 54 One Master Password to Rule All 54 Find and Use Your Passwords with KeePass 58 Hack 16: Tag Your Bookmarks 59 Getting Started with del.icio.us 60 Add a Bookmark 60 Tags, Not Folders 60 Navigating del.icio.us by URL 61 Other del.icio.us Features 62 Hack 17: Organize Your Digital Photos 63 Import Your Photos into Picasa 63 Organize and Label Your Collection 64 Captions 64 Albums 65 Stars 66 Search Your Photos 66 Other Picasa Features 67 Hack 18: Create Saved Search Folders 67 Search Folders in Windows Vista 68 Saved Search Folders in Mac OS 70 Hack 19: Create a Password-Protected Disk on Your PC 70 Set up the Encrypted Volume Location 71 Store and Retrieve Files from the Encrypted Volume 73 Hack 20: Create a Password-Protected Disk on Your Mac 74 Create a New Encrypted Disk Image 75 Access Your Password-Protected Disk 76 Hack 21: Design Your Own Planner 76 Why Build Your Own Planner? 77 How to Assemble Your D*I*Y Planner 77 D*I*Y Planner Templates and Sizes 78 References 78 Chapter 3 Trick Yourself into Getting Done 79 Hack 22: Make Your To-Do List Doable 80 You Are the Boss of You 81 How to Order Yourself Around 81 Only Put Items on the List that You’re Definitely Doing 81 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page xii xii Contents Break It Down 81 Focus Only on the Next Action 82 Use Specific, Active Verbs 83 Include as Much Information as Possible 83 Keep Your List Short 83 Prioritize Your Tasks 84 Keep Your List Moving 84 Purge and Update Your List Weekly 84 Log Your Completed Tasks 85 Practice Makes Perfect 85 Hack 23: Set up a Morning Dash 85 Get One Thing Done First 86 Park on a Downward Slope 86 Hack 24: Map Your Time 87 Your Ideal Time Map 87 Submaps 88 Your Actual Time Map 89 Hack 25: Quick-Log Your Workday 89 Paper 90 Notepad .LOG File (Windows Only) 90 Quick-Log in a Plain-Text File (Windows Only) 91 QuickLogger 2 Logs Your Time in a Spreadsheet or Text File (Windows) 94 Hack 26: Dash through Tasks with a Timer 96 Do Your First Dash 96 Adjust Your Dash 96 Why Time Constraints Work 97 Timer Software Applications 97 Hack 27: Form New Habits with Jerry Seinfeld’s Chain 99 Hack 28: Control Your Workday 101 Identify and Cut Back on Extra Work 101 Stop Your Time Sinks 102 Make Post-Work Appointments 103 Set Wrap-Up Alerts 103 Hack 29: Turn Tasks into Game Play 103 Make It to the Next Level 104 Collaborate, Compete, and Reward 104 Bribe Yourself 104 Time Yourself 105 References 105 Chapter 4 Clear Your Mind 107 Hack 30: Send Reminders to Your Future Self 108 Hack 31: Build Your Personal Wikipedia 112 What You Need 112 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page xiii Contents xiii Set Up MediaWiki 112 Test-Drive Your Wiki 115 Brief Wikitext Primer 116 Hack 32: Develop Your (Digital) Photographic Memory 117 Tag Your Photos on Flickr 117 Upload Photos to Flickr from Your Camera Phone 118 Your Photo Reference 119 Hack 33: Take Great Notes 121 Method 1: Symbolize Next Actions 121 Method 2: Split Your Page into Quadrants 121 Method 3: Record and Summarize 122 Print Custom Note Paper 123 Hack 34: Organize Your Life with Remember the Milk 124 Managing Tasks 124 Prioritizing Tasks 125 Completing Tasks 125 Managing Lists and Tags 126 Setting Task Reminders 127 Searching Tasks 128 Advanced Search Operators 129 Save Searches in Smart Lists 130 Get Your RTM Tasks Offline 130 More RTM Techniques 131 The Weekly Planner 131 Add Tasks via Email 131 Keyboard Shortcuts 132 View Your RTM Tasks on Your Calendar or Homepage 132 Hack 35: Organize Your Life in Text Files 132 Why Plain Text? 133 Using an Editor to Manage Your Text Files 133 Allocate One Task Per Line 134 Sorting Items 134 Transfer Tasks from One File to Another 135 Using the Command Line to Manage Text Files 135 Introducing todo.sh 136 References 136 Chapter 5 Firewall Your Attention 139 Hack 36: Limit Visits to Time-Wasting Web Sites 140 Install and Configure LeechBlock 141 Visiting a Blocked Site 142 Adding Sites to the Block List 143 Make It Difficult to Disable LeechBlock 143 Hack 37: Permanently Block Time-Wasting Web Sites 144 Windows 145 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page xiv xiv Contents Mac OS X 145 The Result 146 Hack 38: Reduce Email Interruptions 146 Shut Down Your Email Program 147 Set Your Email Program to Check for Messages Once an Hour 147 Hack 39: Split Your Work Among Multiple Desktops 148 Windows Vista and XP 149 Windows XP 150 Mac OS X 10.4 (Tiger) 150 Mac OS X 10.5 (Leopard) 152 Hack 40: Build a No-Fly Zone 153 Set Yourself Up to Get into the Zone 153 Make Yourself Inaccessible 154 Work at Quieter Times and in Zoned-Off Spaces 154 Hack 41: Clear Your Desktop 155 Windows 155 Mac OS X 156 Hack 42: Make Your House a Usable Home 157 Create a Place for Incoming Stuff 157 Put Items You Need to Remember in Your Path 158 Stow Away Stuff You Don’t Use; Put Stuff You Do Within Easy Reach 158 Strategically Place Items to Make Tasks Easy 158 Make Task-Based Centers 159 Leave Writing Material Everywhere 159 Set Up an Inbox 159 Collaborate with Housemates 159 Hack 43: Sentence Stuff to Death Row 160 Hack 44: Drown out Distracting Sounds with Pink Noise 161 ChatterBlocker (Windows and Mac) 161 Noise (Mac OS X Only) 162 References 162 Chapter 6 Streamline Common Tasks 163 Hack 45: Search the Web in Three Keystrokes 164 Run a Search with Keyboard Shortcuts 165 Hack 46: Command Your Windows PC from the Keyboard 167 Built-in Windows Keyboard Shortcuts 168 Launch Documents and Applications from Vista’s Search Box 169 Quickly Run Programs and Open Files with Launchy 170 Hack 47: Command Your Mac from the Keyboard 171 Basic File and Application Launching with Quicksilver 171 Advanced Quicksilver Actions 172 38363ftoc.qxd:WileyRed 1/31/08 12:22 AM Page xv Contents xv Hack 48: Reduce Repetitive Typing with Texter for Windows 174 Set Up Texter Hotstrings 174 Adding Hotstrings 174 Choosing the Right Hotstring Trigger 176 Configuring Bundles 176 More Texter Features 177 Hack 49: Reduce Repetitive Typing with TextExpander for Mac 178 Configure TextExpander Snippets 178 Adding New Snippets 178 Set the Text Expansion Delimiter 179 Managing Snippet Groups 181 Advanced TextExpander Usage 181 Hack 50: Text-Message Efficiently 182 What You Can Do with SMS 183 Quick-Start Guide for SMS Beginners 183 Save Your Thumbs 184 SMS from Your Computer 184 Hack 51: Batch-Resize Photos 185 Hack 52: Send and Receive Money on Your Cell Phone 186 PayPal Mobile 187 Send Money to an Email Address 188 PayPal Alternative 189 Hack 53: Bypass Free Site Registration with BugMeNot 189 Hack 54: Speed Up Web Pages on a Slow Internet Connection 191 Configure Your Web Browser for a Slow Connection 191 Block and Disable Bandwidth Hogs 193 Use Tabs to Load Pages While You Work 194 Work Offline Whenever Possible 194 Hack 55: Securely Save Web Site Passwords 195 Hack 56: Become a Scheduling Black Belt
Recommended publications
  • On the Incoherencies in Web Browser Access Control Policies
    On the Incoherencies in Web Browser Access Control Policies Kapil Singh∗, Alexander Moshchuk†, Helen J. Wang† and Wenke Lee∗ ∗Georgia Institute of Technology, Atlanta, GA Email: {ksingh, wenke}@cc.gatech.edu †Microsoft Research, Redmond, WA Email: {alexmos, helenw}@microsoft.com Abstract—Web browsers’ access control policies have evolved Inconsistent principal labeling. Today’s browsers do piecemeal in an ad-hoc fashion with the introduction of new not have the same principal definition for all browser re- browser features. This has resulted in numerous incoherencies. sources (which include the Document Object Model (DOM), In this paper, we analyze three major access control flaws in today’s browsers: (1) principal labeling is different for different network, cookies, other persistent state, and display). For resources, raising problems when resources interplay, (2) run- example, for the DOM (memory) resource, a principal is time changes to principal identities are handled inconsistently, labeled by the origin defined in the same origin policy and (3) browsers mismanage resources belonging to the user (SOP) in the form of <protocol, domain, port> [4]; but principal. We show that such mishandling of principals leads for the cookie resource, a principal is labeled by <domain, to many access control incoherencies, presenting hurdles for > web developers to construct secure web applications. path . Different principal definitions for two resources are A unique contribution of this paper is to identify the com- benign as long as the two resources do not interplay with patibility cost of removing these unsafe browser features. To do each other. However, when they do, incoherencies arise. For this, we have built WebAnalyzer, a crawler-based framework example, when cookies became accessible through DOM’s for measuring real-world usage of browser features, and used “document” object, DOM’s access control policy, namely the it to study the top 100,000 popular web sites ranked by Alexa.
    [Show full text]
  • Practical Web Privacy with Firefox
    Practical Web Privacy with Firefox Chuck Willis [email protected] Live-OWASP DC 2007 September 6, 2007 About Me Principal Consultant with MANDIANT in Alexandria, VA • Full spectrum information security company: Professional Services Government Services Education Software • Services include Application Security, Network Security, Incident Response, and Computer Forensics • Offices in Alexandria, VA, NYC, and other locations Member of OWASP-DC / Maryland Chapter See more on my web site www.securityfoundry.com 1 Privacy on the Web Web sites use a variety of techniques to gather data on users These techniques can be thwarted with the proper configuration of your web browser This presentation will describe information gathering techniques and ways to prevent them using the Firefox web browser Emphasis will be on techniques with minimal impact on the web surfing experience 2 Agenda Cookies Scripts and other Active Content Referer Header Google IP Address Tracking and Geolocation History and Cache Snooping Site Registrations Privacy at a Public Hotspot 3 Cookies Third Party Cookies Issue: When visiting a web site that imports content from another site, the third party site can set and receive cookies to track users Solution: • Disable third party cookies • This is set by changing Network.cookie. cookieBehavior to 1 in about:config • Only the site appearing in the URL will be sent cookies • This is the same setting that used to appear in the UI for Firefox 1.5 and below as allowing cookies "for the originating site
    [Show full text]
  • The Smart Girl's Guide to Privacy
    SHELVE IN: COMPUTERS/GENERAL The whirlwind of social media, online dating, and mobile apps can guide to privACY THE SMART GIRL’s make life a dream—or a nightmare. For every trustworthy website, violet blue there are countless jerks, bullies, and scam artists who want to harvest your personal information for their own purposes. But you can fight back, right now. In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will teach you how to: • Delete personal content from websites • Use website and browser privacy controls effectively • Recover from and prevent identity theft • Figure out where the law protects you—and where it doesn’t • Set up safe online profiles • Remove yourself from people-finder websites Even if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to VIOLET BLUE help you cut through the confusion and start protecting your the smart Privacy online life. Violet Blue is an investigative tech reporter for ZDNet, CNET, Engadget, and CBS News, girl’s guide and an award-winning sex writer and columnist. She is also a member of the Internet Press Guild and an advisor for Without My Consent. She currently maintains a sexuality blog at tinynibbles.com and can be found on Twitter, @violetblue. to privacy $17.95 ($20.95 CDN) practical tips for staying safe online www.nostarch.com THE FINEST IN GEEK ENTERTAINMENT ™ the smart girl’s guide to privacy the smart girl’s guide to privacy practical tips for staying safe online violet blue The Smart Girl’s Guide to Privacy.
    [Show full text]
  • Low Tech Hacking: Street Smarts for Security Professionalsen
    Low Tech Hacking Street Smarts for Security Professionals Jack Wiles Dr. Terry Gudaitis Jennifer Jabbusch Russ Rogers Sean Lowther Neil Wyler, Technical Editor AMSTERDAM • BOSTON • HEIDELBERG • LONDON NEW YORK • OXFORD • PARIS • SAN DIEGO SAN FRANCISCO • SINGAPORE • SYDNEY • TOKYO Syngress is an imprint of Elsevier Acquiring Editor: Chris Katsaropoulos Development Editor: Mstt Cater Project Manager: Paul Gottehrer Designer: Russell Purdy Syngress is an imprint of Elsevier 225 Wyman Street, Waltham, MA 02451, USA # 2012 Elsevier, Inc. All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or any information storage and retrieval system, without permission in writing from the publisher. Details on how to seek permission, further information about the Publisher’s permissions policies and our arrangements with organizations such as the Copyright Clearance Center and the Copyright Licensing Agency, can be found at our website: www.elsevier.com/permissions. This book and the individual contributions contained in it are protected under copyright by the Publisher (other than as may be noted herein). Notices Knowledge and best practice in this field are constantly changing. As new research and experience broaden our understanding, changes in research methods or professional practices, may become necessary. Practitioners and researchers must always rely on their own experience and knowledge in evaluating and using any information
    [Show full text]
  • Hacking Firefox : More Than 150 Hacks, Mods, and Customizations
    01_596500 ffirs.qxd 6/30/05 2:34 PM Page iii Hacking Firefox™ More Than 150 Hacks, Mods, and Customizations Mel Reyes 01_596500 ffirs.qxd 6/30/05 2:34 PM Page ii 01_596500 ffirs.qxd 6/30/05 2:34 PM Page i Hacking Firefox™ 01_596500 ffirs.qxd 6/30/05 2:34 PM Page ii 01_596500 ffirs.qxd 6/30/05 2:34 PM Page iii Hacking Firefox™ More Than 150 Hacks, Mods, and Customizations Mel Reyes 01_596500 ffirs.qxd 6/30/05 2:34 PM Page iv Hacking Firefox™: More Than 150 Hacks, Mods, and Customizations Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2005 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-7645-9650-6 ISBN-10: 0-7645-9650-0 Manufactured in the United States of America 10987654321 1B/SR/QX/QV/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions.
    [Show full text]
  • Pro Blogger's Black Book
    Pro Blogger’s Black Book This compilation was created about a year ago, and I simply never got around to releasing it. It is possible that some of the listings in this document have expired in the last year, but it is still a pretty useful directory. - David Risley Advertising! 4 Article Directories! 9 Blog Tools! 11 Call Centers! 14 Collaboration / Conferencing! 14 Content – Multimedia! 19 Content Written! 20 Customer Relationship Management! 23 Customer Service! 27 E – Commerce! 28 Email Marketing! 30 Facebook Applications! 32 Finance! 32 Free Classifieds! 35 Fulfilment Resource! 37 Fun! 37 Government! 38 Graphic Design! 39 Blog Marketing Academy - Page 1 Hosting/Domains! 44 Idea Management! 48 IP Address! 49 iPhone Applications! 49 Latest Resources! 50 Marketing Blogs! 52 Marketing Resources! 54 Media Buys! 61 Membership Sites! 64 Multimedia Tools & Apps! 64 Music! 66 News! 67 Online Apps! 68 Outsourcing! 72 Printing! 75 Productivity Tools and Resources! 76 Products To Sell! 81 Project Management! 85 Public Domain! 89 Public Relations! 90 Research Keyword! 93 Research Niche! 95 Blog Marketing Academy - Page 2 Search Resources! 97 SEO Resources! 100 Shopping! 106 Software! 111 Stock Images! 115 Testing and Tracking! 117 Travel! 121 URL Shortener! 125 Video Sites! 126 Video Tools! 130 Web Design and Development! 131 Work Resources! 137 Blog Marketing Academy - Page 3 Advertising Adap.tv – http://adap.tv Offers the OneSource online video ad management platform that provides a complete, end-to-end solution to increase advertising revenue and grow streams. AdEngage - http://adengage.com AdEngage allows webmasters to earn money selling ad space and allows advertisers to easily place ads on hundreds of websites.
    [Show full text]
  • An Intensive Analysis of Security and Privacy Browser Add-Ons
    An intensive analysis of security and privacy browser add-ons Nikolaos Tsalis1, Alexios Mylonas2, Dimitris Gritzalis1 1 Information Security & Critical Infrastructure Protection (INFOSEC) Laboratory Dept. of Informatics, Athens University of Economics & Business 76 Patission Ave., Athens, GR-10434, Greece 2 Faculty of Computing, Engineering and Sciences, Staffordshire University Beaconside, Stafford, ST18 0AD, United Kingdom {ntsalis, dgrit}@aueb.gr, [email protected] Abstract. Browsers enable the user to surf over the Internet and access web sites that may include social media, email service, etc. However, such an activity in- corporates various web threats (e.g. tracking, malicious content, etc.) that may imperil the user’s data and any sensitive information involved. Therefore, web browsers offer pre-installed security controls to protect users from these threats. Third-party browser software (i.e. add-ons) is also available that enhances these pre-installed security controls, or substitutes them. In this paper, we examine the available security controls that exist in modern browsers to reveal any gaps in the offered security protection. We also study the available security and privacy add- ons and observe whether the above mentioned gaps (i.e. when a security control is unavailable) are covered or need to be revisited. Keywords: Web browser security, privacy, add-ons, user protection, malware, phishing, controls 1 Introduction Web browsing activities (e.g. e-commerce, online banking, social media, etc.) are ac- companied by web threats that pose a direct risk towards the user, such as phishing attacks, malicious software, tracking sensitive information etc. [1]. When a user selects one of the popular web browsers (i.e.
    [Show full text]
  • Password Management Strategies for Online Accounts
    Password Management Strategies for Online Accounts Shirley Gaw Edward W. Felten Department of Computer Science Center for Information Technology Policy Princeton University Wilson School of Public and International Affairs Princeton, NJ USA Department of Computer Science [email protected] Princeton University Princeton, NJ USA [email protected] ABSTRACT passwords to prevent dictionary attacks. As bad as pass- Given the widespread use of password authentication in on- words are, users will go out of the way to make it worse. If line correspondence, subscription services, and shopping, you ask them to choose a password, they'll choose a lousy there is growing concern about identity theft. When peo- one. If you force them to choose a good one, they'll write it ple reuse their passwords across multiple accounts, they in- on a Post-it and change it back to the password they changed crease their vulnerability; compromising one password can it from the last month. And they'll choose the same pass- help an attacker take over several accounts. Our study of word for multiple applications." [22] In short, poor password 49 undergraduates quanti¯es how many passwords they had practices undermine the system. and how often they reused these passwords. The majority Many projects focus on developing new technology around of users had three or fewer passwords and passwords were these poor practices without studying them. In contrast, reused twice. Furthermore, over time, password reuse rates this paper broadly looks at password practices, quantifying increased because people accumulated more accounts but password reuse and also surveying the contributing factors did not create more passwords.
    [Show full text]
  • Exposing Security and Privacy Liabilities in Modern Browsers
    Exposing security and privacy liabilities in modern browsers Nikolaos Tsalis March 2017 Exposing security and privacy liabilities in modern browsers Nikolaos Tsalis A dissertation submitted for the partial fulfillment of a Ph.D. degree March 2017 ii Supervising Committee: 1. Dimitris Gritzalis, Professor, Athens University of Economics & Business (Chair) 2. Theodoros Apostolopoulos, Professor, Athens University of Economics & Business 3. Ioannis Marias, Assistant Professor, Athens University of Economics & Business Examination Committee: 1. Dimitris Gritzalis, Professor, Athens University of Economics & Business 2. Theodoros Apostolopoulos, Professor, Athens University of Economics & Business 3. Ioannis Marias, Associate Professor, Athens University of Economics & Business 4. Vasileios Katos, Professor, Bournemouth University, United Kingdom 5. Ioannis Stamatiou, Associate Professor, University of Patra 6. Panos Kotzanikolaou, Assistant Professor, University of Piraeus 7. Alexios Mylonas, Lecturer, Bournemouth University, United Kingdom iii Exposing security and privacy liabilities in modern browsers Copyright © 2017 by Nikolaos Tsalis Department of Informatics Athens University of Economics and Business 76 Patission Ave., Athens GR-10434, Greece All rights reserved. No part of this manuscript may be reproduced or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the author. iv "Η έγκριση διδακτορικής διατριβής υπό του Τμήματος Πληροφορικής του Οικονομικού Πανεπιστημίου Αθηνών δεν υποδηλοί αποδοχή των γνωμών του συγγραφέως.” (Ν. 5343/ 1932, άρθρο. 202) v Acknowledgements First and foremost, I would like to thank my Ph.D. supervisor Prof. Dimitris Gritzalis. We met back in 2008, while I was on my second year of undergraduate studies. I had selected Information Systems Security as an optional module without too much thought, as I was certain from the beginning that this was the field I would like to excel and purchase a career in.
    [Show full text]
  • Instructables.Com
    Home Sign Up! Explore Community Submit All Art Craft Food Games Green Home Kids Life Music Offbeat Outdoors Pets Photo Ride Science Tech How To Make Firefox The Most Useful Web Browser There Is by heyzuphowsitgoin on March 5, 2008 Table of Contents License: General Public License (gpl) . 2 Intro: How To Make Firefox The Most Useful Web Browser There Is . 2 step 1: Getting Firefox . 2 step 2: Speed 'er Up! . 3 step 3: Still Movin' Fast! . 3 step 4: MORE MEMORY . 3 step 5: Adding The Themes . 3 step 6: Adding Addons . 4 step 7: Adding Search Engines . 4 step 8: Done . 4 Related Instructables . 4 Advertisements . 5 Comments . 5 http://www.instructables.com/id/How-To-Make-Firefox-The-Most-Useful-Web-Browser-Th/ License: General Public License (gpl) Intro: How To Make Firefox The Most Useful Web Browser There Is If you are already not convinced that firefox is better than everything out there, here are a few tips and tweaks that will make you want to switch. If you are using firefox, maybe you still didn't know about these. step 1: Getting Firefox Just download and install firefox... Works with just about every operating system there is... But don't get the beta, there aren't as many themes and plugins for those http://www.mozilla.com/en-US/firefox/ http://www.instructables.com/id/How-To-Make-Firefox-The-Most-Useful-Web-Browser-Th/ step 2: Speed 'er Up! Do this if you have high speed internet, it won't work as well if you are using dial-up.
    [Show full text]
  • Technical and Market Failures in Human Authentication on the Web
    The password thicket: technical and market failures in human authentication on the web Joseph Bonneau Sören Preibusch Computer Laboratory Computer Laboratory University of Cambridge University of Cambridge [email protected] [email protected] Abstract We report the results of the first large-scale empirical analysis of password implementations deployed on the Internet. Our study included 150 websites which offer free user accounts for a variety of purposes, including the most popular destinations on the web and a random sample of e-commerce, news, and communication websites. Although all sites evaluated relied on user-chosen textual passwords for authentication, we found many subtle but important technical variations in im- plementation with important security implications. Many poor practices were commonplace, such as a lack of encryption to protect transmitted passwords, storage of cleartext passwords in server databases, and little protection of passwords from brute force attacks. While a spectrum of imple- mentation quality exists with a general co-occurrence of more-secure and less-secure implementa- tion choices, we find a surprising number of inconsistent choices within individual sites, suggesting that the lack of a standards is harming security. We observe numerous ways in which the technical failures of lower-security sites can compromise higher-security sites due to the well-established ten- dency of users to re-use passwords. Our data confirms that the worst security practices are indeed found at sites with few security incentives, such as newspaper websites, while sites storing more sensitive information such as payment details or user communication implement more password se- curity.
    [Show full text]