Why Lifehacker?

Total Page:16

File Type:pdf, Size:1020Kb

Why Lifehacker? 01_050659 ffirs.qxd 11/9/06 9:46 AM Page iii Lifehacker™ 88 Tech Tricks to Turbocharge Your Day Gina Trapani 01_050659 ffirs.qxd 11/9/06 9:46 AM Page ii 01_050659 ffirs.qxd 11/9/06 9:46 AM Page i Lifehacker™ 01_050659 ffirs.qxd 11/9/06 9:46 AM Page ii 01_050659 ffirs.qxd 11/9/06 9:46 AM Page iii Lifehacker™ 88 Tech Tricks to Turbocharge Your Day Gina Trapani 01_050659 ffirs.qxd 11/9/06 9:46 AM Page iv Lifehacker™: 88 Tech Tricks to Turbocharge Your Day Published by Wiley Publishing, Inc. 10475 Crosspoint Boulevard Indianapolis, IN 46256 www.wiley.com Copyright © 2007 by Gawker Media. Published by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN-13: 978-0-470-05065-1 ISBN-10: 0-470-05065-9 Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 1B/SZ/RR/QW/IN No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as per- mitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior writ- ten permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, (317) 572-3447, fax (317) 572-4355, or online at http://www.wiley.com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifically disclaim all warranties, including without limitation warranties of fitness for a particular purpose. No warranty may be created or extended by sales or promotional materials. The advice and strategies con- tained herein may not be suitable for every situation. This work is sold with the understanding that the publisher is not engaged in rendering legal, accounting, or other professional services. If professional assistance is required, the services of a competent professional person should be sought. Neither the publisher nor the author shall be liable for damages arising herefrom. The fact that an organization or Website is referred to in this work as a citation and/or a potential source of further information does not mean that the author or the publisher endorses the information the organization or Website may provide or recommendations it may make. Further, readers should be aware that Internet Websites listed in this work may have changed or disappeared between when this work was written and when it is read. For general information on our other products and services or to obtain technical support, please con- tact our Customer Care Department within the U.S. at (800) 762-2974, outside the U.S. at (317) 572-3993 or fax (317) 572-4002. Library of Congress Cataloging-in-Publication Data Trapani, Gina, 1975- Lifehacker : 88 tech tricks to turbocharge your day / Gina Trapani. p. cm. Includes bibliographical references and index. ISBN-13: 978-0-470-05065-1 (pbk.) ISBN-10: 0-470-05065-9 (pbk.) 1. Computers. 2. Computer software. 3. Internet. I. Title. QA76.5.T6736 2006 004--dc22 2006033473 Trademarks: Wiley, the Wiley logo, and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. All other trademarks are the property of their respective owners. Wiley Publishing, Inc., is not associated with any product or vendor mentioned in this book. Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic books. 01_050659 ffirs.qxd 11/9/06 9:46 AM Page v For Dad 01_050659 ffirs.qxd 11/9/06 9:46 AM Page vi 01_050659 ffirs.qxd 11/9/06 9:46 AM Page vii About the Author Gina Trapani (http://ginatrapani.org) is an independent web pro- grammer and writer whose work has appeared in Wired magazine, The New York Times, and Time magazine. She is the founding editor of Lifehacker.com, the software and productivity weblog, updated several times daily. A Sun Microsystems–certified Java programmer, Gina builds web sites and Firefox extensions. Born and raised in Brooklyn, New York, she now resides in sunny San Diego, California, with her partner. vii 01_050659 ffirs.qxd 11/9/06 9:46 AM Page viii 01_050659 ffirs.qxd 11/9/06 9:46 AM Page ix Credits Executive Editor Vice President and Executive Carol Long Publisher Joseph B. Wikert Development Editor Maryann Steinhart Project Coordinator Erin Smith Production Editor Rachel Meyers Graphics and Production Specialists Barbara Moore Copy Editor Heather Ryan Michael Koch Quality Control Technician Editorial Manager Laura Albert Mary Beth Wakefield Proofreading and Indexing Production Manager Broccoli Information Management Tim Tate Techbooks Vice President and Executive Anniversary Logo Design Group Publisher Richard Pacifico Richard Swadley ix 01_050659 ffirs.qxd 11/9/06 9:46 AM Page x 02_050659 ftoc.qxd 11/9/06 9:46 AM Page xi Contents Acknowledgments xxi Introduction xxiii Chapter 1 Free Up Mental RAM 1 Hack 1: Email Your Future Self 2 Hack 2: Manage a todo.txt File at the Command Line 5 The Command Line Interface 5 Why Plain Text? 6 Install todo.sh 6 Using todo.sh 8 Create a Sortable, Searchable todo.txt 8 List Tasks with todo.sh 10 Prioritize Tasks 10 More Uses for todo.txt 11 Hack 3: Develop Your (Digital) Photographic Memory 12 Tag Your Photos on Flickr 12 Upload Photos to Flickr from Your Camera Phone 13 Your Photo Reference 14 Hack 4: Install Your Personal Wikipedia 15 What You Need 16 What to Do 16 You’re Ready to Go 18 Brief Wikitext Primer 19 xi 02_050659 ftoc.qxd 11/9/06 9:46 AM Page xii xii Contents Hack 5: Keep an Instiki Wiki Hyperlinked Notebook 20 Installing Instiki 20 You’re Ready to Go 22 Securing and Accessing Your Wiki 25 Hack 6: Take Great Notes 25 Method 1: Symbolize Next Actions 26 Method 2: Split Your Page into Quadrants 26 Method 3: Record and Summarize 26 Create Your Own Custom Note Paper 28 References 28 Chapter 2 Firewall Your Attention 29 Hack 7: Limit Access to Time-Wasting Web Sites 30 Install the Invisibility Cloak 31 Set Which Sites Should Wear the Cloak 32 Customize the Script 33 Hack 8: Permanently Block Time-Wasting Web Sites 35 Windows 36 Mac OS X 36 The Result 36 Hack 9: Reduce Email Interruptions 37 Shut Down Your Email Program 37 Set Your Client to Check for Messages Once an Hour 38 Hack 10: Split Your Work Among Multiple Desktops 39 Windows XP 39 Mac OS X 41 Hack 11: Build a No-fly Zone 42 Set Yourself up to Get into the Zone 42 Make Yourself Inaccessible 42 Work at Quieter Times and in Zoned-Off Spaces 43 Hack 12: Filter Low-Priority Email Messages 43 Filter Low-Priority Messages 44 Filter CC’ed Messages 45 Hack 13: Clear Your Desktop 46 Windows 46 Mac OS X 47 Hack 14: Make Your House a Usable Home 48 Create a Place for Incoming Stuff 48 Put Items You Need to Remember in Your Path 49 Stow Away Stuff You Don’t Use; Put Stuff You Do Within Easy Reach 49 Strategically Place Items to Make Tasks Easy 49 Make Task-Based Centers 50 Leave Writing Material Everywhere 50 Set up an Inbox 50 Collaborate with Housemates 50 02_050659 ftoc.qxd 11/9/06 9:46 AM Page xiii Contents xiii Hack 15: Sentence Stuff to Death Row 51 Hack 16: Drown out Sound with Pink Noise 51 Mac OS X 52 Windows 52 Hack 17: Keep Software from Stealing Focus 52 References 53 Chapter 3 Automate Repetitive Tasks 55 Hack 18: Automatically Back up Your Files 56 What You’ll Need 56 Configure the Backup System 57 Off-Site Backup 61 Hack 19: Automatically Defragment Your Hard Drive 62 Hack 20: Automatically Empty Your Digital Junk Drawer 65 Hack 21: Automatically Download Music, Movies, and More 69 Install and Run Wget 69 Mirror an Entire Web Site 70 Resume Partial Downloads on an Intermittent Connection 71 Automatically Download New Music from the Web 72 Automate wget Downloads on Windows 72 Hack 22: Automatically Email Yourself File Backups 73 Set up the Email Script 73 More on Emailing Yourself Backups 75 Hack 23: Automatically Reboot and Launch Applications 76 Automatically Reboot Your Computer 76 Automatically Launch Software or Documents 77 Automatically Start a Web Browsing Session 78 Hack 24: Automatically Log Your Progress in a Spreadsheet 79 References 81 Chapter 4 Streamline Common Tasks 83 Hack 25: Search the Web in Three Keystrokes 84 Hack 26: Quick-Launch Software Applications 85 Windows: Essential, Built-In Keyboard Shortcuts 86 Windows: Define Your Own Keyword Shortcuts 87 Mac OS X: Quicksilver Keyboard Commander 89 Hack 27: Save Time with Text Substitution 90 AutoHotkey Hotstring 90 Personalize the Script 92 Hack 28: Text Message Efficiently 95 What You Can Do with SMS 95 Quick Start Guide for SMS Beginners 96 Save Your Thumbs 96 SMS from Your Computer 96 Hack 29: Batch Resize Photos 97 02_050659 ftoc.qxd 11/9/06 9:46 AM Page xiv xiv Contents Hack 30: Send and Receive Money on Your Cell Phone 98 PayPal Mobile 99 Send Money to an Email Address 100 PayPal Alternative 101 Hack 31: Bypass Free Site Registration with BugMeNot 101 Hack 32: Speed up Web Pages on a Slow Internet Connection 103 Configure Your Web Browser for a Slow Connection 103 Block and Disable Bandwidth Hogs 105 Use Tabs to Load Pages While You Work 105 Work Offline
Recommended publications
  • PDF-Xchange Viewer
    PDF-XChange Viewer © 2001-2011 Tracker Software Products Ltd North/South America, Australia, Asia: Tracker Software Products (Canada) Ltd., PO Box 79 Chemainus, BC V0R 1K0, Canada Sales & Admin Tel: Canada (+00) 1-250-324-1621 Fax: Canada (+00) 1-250-324-1623 European Office: 7 Beech Gardens Crawley Down., RH10 4JB Sussex, United Kingdom Sales Tel: +44 (0) 20 8555 1122 Fax: +001 250-324-1623 http://www.tracker-software.com [email protected] Support: [email protected] Support Forums: http://www.tracker-software.com/forum/ ©2001-2011 TRACKER SOFTWARE PRODUCTS II PDF-XChange Viewer v2.5x Table of Contents INTRODUCTION...................................................................................................... 7 IMPORTANT! FREE vs. PRO version ............................................................................................... 8 What Version Am I Running? ............................................................................................................................. 9 Safety Feature .................................................................................................................................................. 10 Notice! ......................................................................................................................................... 10 Files List ....................................................................................................................................... 10 Latest (available) Release Notes .................................................................................................
    [Show full text]
  • Lookeen Desktop Search
    Lookeen Desktop Search Find your files faster! User Benefits Save time by simultaneously searching for documents on your hard drive, in file servers and the network. Lookeen can also search Outlook archives, the Exchange Search with fast and reliable Server and Public Folders. Advanced filters and wildcard options make search more Lookeen technology powerful. With Lookeen you’ll turn ‘search’ into ‘find’. You’ll be able to manage and organize large amounts of data efficiently. Employees will save valuable time usually Find your information in record spent searching to work on more important tasks. time thanks to real-time indexing Lookeen desktop search can also Search your desktop, Outlook be integrated into Outlook The search tool for Windows files and Exchange folders 10, 8, 7 and Vista simultaneously Ctrl+Ctrl is back: instantly launch Edit and save changes to Lookeen from documents in Lookeen preview anywhere on your desktop Save and re-use favorite queries and access them with short keys View all correspondence with individuals or groups at the push of a button Create one-click summaries of email correspondences Start saving time and money immediately For Companies Features Business Edition Desktop search software compatible with Powerful search in virtual environments like Compatible with standard and virtual Windows 10, 8, 7 and Vista Citrix and VMware desktops like Citrix, VMware and Terminal Servers. Simplified roll out through exten- Optional add-in to Microsoft Outlook 2016, Simple, user friendly interface gives users a sive group directives and ADM files. 2013, 2010, 2007 or 2003 and Office 365 unified view over multiple data sources Automatic indexing of all files on the hard Clear presentation of search results drive, network, file servers, Outlook PST/OST- Enterprise Edition Full fidelity preview option archives, Public Folders and the Exchange Scans additional external indexes.
    [Show full text]
  • Interaction Design Patterns Und Videolernumgebungen
    Niels Seidel Interaction Design Patterns und CSCL-Scripts für Videolernumgebungen Interaction Design Patterns und CSCL-Scripts für Videolernumgebungen Dem Wissenschaftlichen Rat des Internationalen Hochschulinstitutes Zittau eingereichte DISSERTATION zur Erlangung des akademischen Grades doctor rerum politicarum (Dr. rer. pol.) vorgelegt von Niels Seidel geboren am 7. Oktober 1981 in Löbau Gutachter: Prof. Dr. rer. pol. habil. Thorsten Claus (TU Dresden) Prof. Dr. rer. pol. habil. Bärbel Fürstenau (TU Dresden) Prof. Dr. rer. nat. Christian Kohls (TH Köln) Einreichung: Zittau, den 10. November 2016 Disputation: Dresden, den 26. Februar 2018 Niels Seidel Interaction Design Patterns und CSCL-Scripts für Videolernumgebungen Zusammenfassung In den letzten Jahren haben Lernvideos im Bereich des informellen und formellen Lernens an Bedeutung gewonnen. Inwieweit Lernende bei der Nutzung von Videos unterstützt werden und Lehrende didaktische Szenarien umsetzen können, hängt jedoch von der eingesetzten Vi- deolernumgebung ab. Es ist Anliegen der vorliegende Arbeit, Prinzipien des User Interface Designs sowie Komponenten und Mechanismen videobasierter Lehr-Lern-Szenarien in Bezug auf Videolernumgebungen zu identifizieren, zu beschreiben und technisch zu realisieren. Das Ziel dieser Forschungsarbeit besteht darin, Gestaltungsprinzipien in Form von Interaction De- sign Patterns zu erarbeiten und computergestützte videobasierte Lehr-Lern-Szenarien mit Hilfe von CSCL-Scripts durch eine geeignete Spezifikation und Formalisierung zu realisieren. Für die Erarbeitung der Interaction Design Patterns wurden 121 Videolernumgebungen hin- sichtlich 50 Kategorien in einer Inhaltsanalyse empirisch untersucht und dokumentiert. Unter Berücksichtigung ähnlicher Patterns aus thematisch verwandten Pattern Languages und den Erfahrungen aus der Implementierung und dem Einsatz von Videolernumgebungen entstan- den 45 Interaction Design Patterns für verbreitete Lösungen für wiederkehrende Probleme bei der Gestaltung und Entwicklung von Videolernumgebungen.
    [Show full text]
  • Towards the Ontology Web Search Engine
    TOWARDS THE ONTOLOGY WEB SEARCH ENGINE Olegs Verhodubs [email protected] Abstract. The project of the Ontology Web Search Engine is presented in this paper. The main purpose of this paper is to develop such a project that can be easily implemented. Ontology Web Search Engine is software to look for and index ontologies in the Web. OWL (Web Ontology Languages) ontologies are meant, and they are necessary for the functioning of the SWES (Semantic Web Expert System). SWES is an expert system that will use found ontologies from the Web, generating rules from them, and will supplement its knowledge base with these generated rules. It is expected that the SWES will serve as a universal expert system for the average user. Keywords: Ontology Web Search Engine, Search Engine, Crawler, Indexer, Semantic Web I. INTRODUCTION The technological development of the Web during the last few decades has provided us with more information than we can comprehend or manage effectively [1]. Typical uses of the Web involve seeking and making use of information, searching for and getting in touch with other people, reviewing catalogs of online stores and ordering products by filling out forms, and viewing adult material. Keyword-based search engines such as YAHOO, GOOGLE and others are the main tools for using the Web, and they provide with links to relevant pages in the Web. Despite improvements in search engine technology, the difficulties remain essentially the same [2]. Firstly, relevant pages, retrieved by search engines, are useless, if they are distributed among a large number of mildly relevant or irrelevant pages.
    [Show full text]
  • An Activity Based Data Model for Desktop Querying (Extended Abstract)?
    An activity based data model for desktop querying (Extended Abstract)? Sibel Adalı1 and Maria Luisa Sapino2 1 Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180, USA, [email protected], 2 Universit`adi Torino, Corso Svizzera, 185, I-10149 Torino, Italy [email protected] 1 Introduction With the introduction of a variety of desktop search systems by popular search engines as well as the Mac OS operating system, it is now possible to conduct keyword search across many types of documents. However, this type of search only helps the users locate a very specific piece of information that they are looking for. Furthermore, it is possible to locate this information only if the document contains some keywords and the user remembers the appropriate key- words. There are many cases where this may not be true especially for searches involving multimedia documents. However, a personal computer contains a rich set of associations that link files together. We argue that these associations can be used easily to answer more complex queries. For example, most files will have temporal and spatial information. Hence, files created at the same time or place may have relationships to each other. Similarly, files in the same directory or people addressed in the same email may be related to each other in some way. Furthermore, we can define a structure called “activities” that makes use of these associations to help user accomplish more complicated information needs. Intu- itively, we argue that a person uses a personal computer to store information relevant to various activities she or he is involved in.
    [Show full text]
  • Using Context to Enhance File Search
    Connections: Using Context to Enhance File Search Craig A. N. Soules, Gregory R. Ganger Carnegie Mellon University ABSTRACT Attribute-based naming allows users to classify each file Connections is a file system search tool that combines tradi- with multiple attributes [9, 12, 37]. Once in place, these at- tional content-based search with context information gath- tributes provide additional paths to each file, helping users ered from user activity. By tracing file system calls, Con- locate their files. However, it is unrealistic and inappropri- nections can identify temporal relationships between files ate to require users to proactively provide accurate and use- and use them to expand and reorder traditional content ful classifications. To make these systems viable, they must search results. Doing so improves both recall (reducing false- automatically classify the user's files, and, in fact, this re- positives) and precision (reducing false-negatives). For ex- quirement has led most systems to employ search tools over ample, Connections improves the average recall (from 13% hierarchical file systems rather than change their underlying to 22%) and precision (from 23% to 29%) on the first ten methods of organization. results. When averaged across all recall levels, Connections The most prevalent automated classification method to- improves precision from 17% to 28%. Connections provides day is content analysis: examining the contents and path- these benefits with only modest increases in average query names of files to determine attributes that describe them. time (2 seconds), indexing time (23 seconds daily), and in- Systems using attribute-based naming, such as the Seman- dex size (under 1% of the user's data set).
    [Show full text]
  • Dtsearch Desktop/Dtsearch Network Manual
    dtSearch Desktop dtSearch Network Version 7 Copyright 1991-2021 dtSearch Corp. www.dtsearch.com SALES 1-800-483-4637 (301) 263-0731 Fax (301) 263-0781 [email protected] TECHNICAL (301) 263-0731 [email protected] 1 Table of Contents 1. Getting Started _____________________________________________________________ 1 Quick Start 1 Installing dtSearch on a Network 7 Automatic deployment of dtSearch on a Network 8 Command-Line Options 10 Keyboard Shortcuts 11 2. Indexes __________________________________________________________________ 13 What is a Document Index? 13 Creating an Index 13 Caching Documents and Text in an Index 14 Indexing Documents 15 Noise Words 17 Scheduling Index Updates 17 3. Indexing Web Sites _________________________________________________________ 19 Using the Spider to Index Web Sites 19 Spider Options 20 Spider Passwords 21 Login Capture 21 4. Sharing Indexes on a Network _________________________________________________ 23 Creating a Shared Index 23 Sharing Option Settings 23 Index Library Manager 24 Searching Using dtSearch Web 25 5. Working with Indexes _______________________________________________________ 27 Index Manager 27 Recognizing an Existing Index 27 Deleting an Index 27 Renaming an Index 27 Compressing an Index 27 Verifying an Index 27 List Index Contents 28 Merging Indexes 28 6. Searching for Documents _____________________________________________________ 29 Using the Search Dialog Box 29 Browse Words 31 More Search Options 32 Search History 33 i Table of Contents Searching for a List of Words 33 7.
    [Show full text]
  • Comparison of Indexers
    Comparison of indexers Beagle, JIndex, metaTracker, Strigi Michal Pryc, Xusheng Hou Sun Microsystems Ltd., Ireland November, 2006 Updated: December, 2006 Table of Contents 1. Introduction.............................................................................................................................................3 2. Indexers...................................................................................................................................................4 3. Test environment ....................................................................................................................................5 3.1 Machine............................................................................................................................................5 3.2 CPU..................................................................................................................................................5 3.3 RAM.................................................................................................................................................5 3.4 Disk..................................................................................................................................................5 3.5 Kernel...............................................................................................................................................5 3.6 GCC..................................................................................................................................................5
    [Show full text]
  • List of Search Engines
    A blog network is a group of blogs that are connected to each other in a network. A blog network can either be a group of loosely connected blogs, or a group of blogs that are owned by the same company. The purpose of such a network is usually to promote the other blogs in the same network and therefore increase the advertising revenue generated from online advertising on the blogs.[1] List of search engines From Wikipedia, the free encyclopedia For knowing popular web search engines see, see Most popular Internet search engines. This is a list of search engines, including web search engines, selection-based search engines, metasearch engines, desktop search tools, and web portals and vertical market websites that have a search facility for online databases. Contents 1 By content/topic o 1.1 General o 1.2 P2P search engines o 1.3 Metasearch engines o 1.4 Geographically limited scope o 1.5 Semantic o 1.6 Accountancy o 1.7 Business o 1.8 Computers o 1.9 Enterprise o 1.10 Fashion o 1.11 Food/Recipes o 1.12 Genealogy o 1.13 Mobile/Handheld o 1.14 Job o 1.15 Legal o 1.16 Medical o 1.17 News o 1.18 People o 1.19 Real estate / property o 1.20 Television o 1.21 Video Games 2 By information type o 2.1 Forum o 2.2 Blog o 2.3 Multimedia o 2.4 Source code o 2.5 BitTorrent o 2.6 Email o 2.7 Maps o 2.8 Price o 2.9 Question and answer .
    [Show full text]
  • Warming up to User-Generated Content
    Chicago-Kent College of Law Scholarly Commons @ IIT Chicago-Kent College of Law All Faculty Scholarship Faculty Scholarship January 2008 Warming Up to User-Generated Content Edward Lee IIT Chicago-Kent College of Law, [email protected] Follow this and additional works at: https://scholarship.kentlaw.iit.edu/fac_schol Part of the Intellectual Property Law Commons Recommended Citation Edward Lee, Warming Up to User-Generated Content, 2008 U. Ill. L. Rev. 1459 (2008). Available at: https://scholarship.kentlaw.iit.edu/fac_schol/358 This Article is brought to you for free and open access by the Faculty Scholarship at Scholarly Commons @ IIT Chicago-Kent College of Law. It has been accepted for inclusion in All Faculty Scholarship by an authorized administrator of Scholarly Commons @ IIT Chicago-Kent College of Law. For more information, please contact [email protected], [email protected]. LEE.DOC 9/3/2008 4:50:06 PM WARMING UP TO USER-GENERATED CONTENT Edward Lee* Conventional views of copyright law almost always operate from the “top down.” Copyrights are understood as static and fixed by the Copyright Act. Under this view, copyright holders are at the center of the copyright universe and exercise considerable control over their exclusive rights, with the expectation that others seek prior permission for all uses of copyrighted works outside of a fair use. Though pervasive, this conventional view of copyright is wrong. The Copyright Act is riddled with gray areas and gaps, many of which persist over time, because so few copyright cases are ever filed and the majority of those filed are not resolved through judgment.
    [Show full text]
  • Ileak: a Lightweight System for Detecting Inadvertent Information Leaks
    iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Vasileios P. Kemerlis, Vasilis Pappas, Georgios Portokalidis, and Angelos D. Keromytis Network Security Lab Computer Science Department Columbia University, New York, NY, USA {vpk, vpappas, porto, angelos}@cs.columbia.edu Abstract—Data loss incidents, where data of sensitive nature Most research on detecting and preventing information are exposed to the public, have become too frequent and have leaks has focused on applying strict information flow control caused damages of millions of dollars to companies and other (IFC). Sensitive data are labeled and tracked throughout organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by an application’s execution to detect their illegal propaga- user negligence, misconfiguration of software, or inadequate tion (e.g., their transmission over the network). Approaches understanding of an application’s functionality. This paper such as Jif [6] and JFlow [7] achieve IFC by introducing presents iLeak, a lightweight, modular system for detecting extensions to the Java programming language, while others inadvertent information leaks. Unlike previous solutions, iLeak enforce it dynamically [8], or propose new operating system builds on components already present in modern computers. In particular, we employ system tracing facilities and data (OS) designs [9]. Fine-grained IFC mechanisms require that indexing services, and combine them in a novel way to detect sensitive data are labeled by the user beforehand, but as data leaks. Our design consists of three components: uaudits are the amount of data stored in desktops continuously grows, responsible for capturing the information that exits the system, locating documents and files containing personal data be- while Inspectors use the indexing service to identify if the comes burdensome.
    [Show full text]
  • Case Studies
    ® 3rd party developer case studies click on the icons below to view a category Technical and Medical Documentation Information Management Financial, Trade and News Legal Recruiting and Staffing Non-Profit and Education General Developer Tools and Resources International Language Developer Tools International and Other Government Forensics, Intelligence and Security The Smart Choice for Text Retrieval ® since 1991 dtSearchUntitled Document Technical and Medical Documentation Case Studies Spar Aerospace enlists dtSearch for aircraft contract. Spar Aerospace, a subsidiary of L-3 Communications, is a leading aviation services company. Spar had a contract to update the maintenance publications for an aircraft fleet, both on the Web and on laptop replications in the field. “Search requirements for this project were extensive and stringent. We investigated most of the ‘high end’ search engines out there. We decided to use dtSearch ... I have been very impressed by the dtSearch support organization ... Answers are always appropriate, straight forward, clear and unambiguous.” From Computerworld Canada: “Aviation firm earns wings with new text search ... Spar chose dtSearch Corp.’s text-search product, dtSearch Web, to serve the information up in an easily indexed manner online.” For “‘a requirement that we have to run this thing on stand-alone PCs,’ ... Spar signed on for dtSearch Publish.” Contegra Systems succeeds in “boosting support and service with better search and navigation” through dtSearch web-based implementation for Otis Elevator.
    [Show full text]