Tuesday, August 30, 2011

EU data protection exacerbate dispute over cookies

EU data protection exacerbate dispute over cookies

The "Article 29" group of European Data Protection Supervisor rejects the recommendations from industry associations for behavior-driven advertising and the associated use of cookies. The proposal of the Internet Advertising Bureau (IAB ) and the European Advertising Standards Alliance (EASA ) allow it only to insert via an opt-out of opposition to the recording of user behavior, wrote the chairman of the Association, Jacob Kohnstamm, in a recently published letter (PDF file) of the two organizations. The new EU privacy regulations however, demanded an "informed consent" in a prosecution of online activities with cookies.

That every surfer who the "tracking" does not contradict explicitly endorse this already, Kohnstamm holds for illusory. A real choice for an intelligible description of the existing facilities will be using the opt-out notice at the border is not given by banner ads. The explanation of the economy that a website operator to work normally with different marketing networks, and would have to obtain consent for all, not considered valid by the head of the group. The legislation clearly relate to each ad network. An agreement to set each Webkrümels on the hard drive is certainly not necessary. A single opt-in applies to the entire marketing partners. In addition, a central activation site for behavioral advertising is conceivable.

The 2008 adopted EU Directive on Privacy and Electronic Communications regulates, among other things, access to information stored about the user on hard disks or USB sticks, by third parties. Manipulation of files stored on the equipment of a subscriber or user, are permitted in May, according to the in force regulation only if the person has "on the basis of clear and comprehensive information" given his consent. Procedures are still excluded, whose "sole purpose of carrying out the transmission of a communication over an electronic communications network" in order for a specifically desired service can be provided.

The method is to "be as user friendly as possible," according to the e-privacy directive. If it is technically feasible and effective, it said, could the consent of the user "can be expressed by using the appropriate settings of a browser or other application." Even to this paragraph, the EU data protection have taken a position. Their interpretation by the request is done only satisfied if the default refuse to accept cookies and users would be informed in general about the browser files. The manufacturer of the navigation tools have improved, although the administrative options in the past year. By default, however, would still accept cookies.

The EU privacy advocates continue to criticize that, under the industry standard just a small graphic notes in a banner on the opt-out opportunity. This solution will not bring the average user to click on the icon and additional information on a website linked to is not currently available in German translation website to obtain . The success of Enlightenment there was also confusing, since they are not serious notes on the implications for the privacy of users and the profile building with unique cookie identification numbers. At a meeting in September, both sides now want to talk about how to proceed.

The error is, if it goes wrong

The error is, if it goes wrong
Computer not be wrong. As long as the world does exactly what it should.
And that makes them so often. If not, does this have to do with a yellow
rabbit.

Let's call it simply the yellow rabbit effect. As you walk in the
morning from the house or sits at home on the desk, and then instead of
the usual downloads happen suddenly and unexpectedly large, flashy
things. Things that we all really expect more, but then the surprise
when they happen.
No, not that God can not. We wish him all the best. Rather the things
that nobody would come. The things that sound more like a joke, just as
the American fondness for fizzy drinks from Bin Laden. - If anyone
should remember him, the guy that the Pakistani cricket balls their
children were never returned. That's him.
Back to the Internet. Suppose that a shark would bite through an
Internet cable, or someone steals the warehouse with Google servers,
where all search results are stored for German websites. Or cosmic rays
are suddenly the evil of defenseless small extinguisher in front of him
spinning disks.
It all sounds stupid, OK upgrade, but for precisely such cases, Google
eats itself and fully aware that one studies the luxury of a very
unlikely but possible event and the preparations for it. And in fact
everything that has nothing to do with data and servers, but it has an
undeniable effect on her. Sure would be a little weird before. But what
if, and then give no more? Exactly. Google.
Also very unlikely it may be that my wife bought a Windows machine as
their next computer. But it is not really care what operating system you
are using their laptop or smart phone in hand, after a short time one
could keep the unit well for a medium sized yellow rabbit. By the time
he makes it now because once again muttering to himself and lands on the
keyboard, I leave out of sheer will to survive the room.
I think the more courageous message that you want to have in Windows 8
now developed a foolproof copy a file to a folder. Just wait, guys, your
phone number I give to my wife. And then we just look even know if they
are not yet a turning place, even such simple and seemingly driven by
twenty-five years to really break-resistant routines such as copying
files into madness.
The yellow bunny is everywhere. Watch out, soon he'll come to you.

Hazardous ActiveX component from F-Secure

Hazardous ActiveX component from F-Secure

A vulnerability in F-Secure Anti-Virus and Internet Security System can
be infected by visiting a specially crafted Web page with malicious
code, the manufacturer warns. Vulnerable versions are respectively the
2010 and the current 2011th Also, version 9 of the F-Secure Protection
Service (Consumer and Business) is vulnerable.

The vulnerability is located in the ActiveX module fsresh.dll and is
thus only users of Internet Explorer and browsers based on it. Through
the gap may allow an attacker to overwrite the error handling routine
and so own shellcode. Has discovered the vulnerability, security expert
Anil Aphal who has already released an exploit.

Remedy creates a patch, the F-Secure for several days on the automatic
update function of the distributed programs. Users of affected programs
should therefore ensure that their system is supplied with the latest
updates.

"The Internet makes anyone a terrorist"

"The Internet makes anyone a terrorist"
The Internet facilitates access to the most extreme views of all kinds -
and these can be estimated by the criminologist, Rudolf Egg then seem
normal. "So exotic is a hobby and so extreme political views should be
not, as she tells no one in the Internet", the criminal psychologist
said in an interview with Reuters. "There is nothing that is so bizarre
that it is not there."
The Internet enables access to opinions and attitudes that would get in
other ways just very difficult, said the head of Criminology in
Wiesbaden, a research and documentation establishing the federal and
state governments. "This greater availability creates the appearance of
normality."
For example, the so-called Cannibal of Rotenburg on the Internet have
found dozens of people that had similar preferences, while people with
cannibalistic tendencies were previously left alone. The man had
castrated a man in 2001, killed and eaten parts of the body - five years
later he was sentenced to life imprisonment.
"You feel the Internet in emotions, attitudes and political views are no
longer so alone," said Egg. "The Internet makes anyone but just for
criminals or terrorists," said Egg. "What really are the causes, why
does someone in such a way must be explained differently."
The process was supposed to be against Islamic terrorists from the
Frankfurt airport, which radicalized the Internet, begins on Wednesday
in Frankfurt. The 21-year-old is charged with about half a year ago
killed two U.S. soldiers and two others seriously injured, who were on
their way to a deployment to Afghanistan. The individual offender should
have seen the night before a propaganda video for the jihad, rape in the
alleged American soldiers Muslim women.

Airplay competition: Mobostick of HSTI

Airplay competition: Mobostick of HSTI
Even though it looks like this: The "Mobostick" the Canadian
manufacturer HSTI is neither USB memory stick or USB wireless adapter,
but basically a wireless-enabled mini-computer. On a player he is,
however, presents itself as a USB mass storage, the contents of an
associated app from your smartphone Adroid be shared and streamed.
According to the manufacturer of the virtual Mobostick content can, for
example via the USB port of TVs, PS3 and XBox consoles, DVD / Blu-ray
players, Google TV Boxeb, conventional stereo systems and car radios,
and digital picture frames, and docking stations are playing. Mobostick
to support Android devices in version 1.6 of all major vendors such as
Motorola, Asus, HTC, Samsung, Sony and Acer.
Unlike Apple's airplay, the entire contents of the shared folder - ie
not only movies, photos, music and all other files - for wireless
transmission via WiFi (up to 130 Mbps) are available. The device is
offered in Germany by Flashtex for nearly 90 €. An expanded version
called "wireless media streaming Stick" (around 100 €) should also iMacs
and NAS devices can operate.

Linux: New Kernel with long-term support

Linux: New Kernel with long-term support

After lengthy discussions on the mailing list of Linux kernel developer
Greg Kroah-Hartman will continue each year elect one kernel version to
the Long Term kernel. He should then be provided over two years with
updates. All the other kernels are as usual only to shortly after the
release of the successor will be maintained. When Long Term kernel wants
Kroah-Hartman select kernel versions, which have proven particularly
well or that are used for example in major Linux distributions.

Currently, five versions of the kernel as a Long Term kernel maintained
by different maintainers: 2.6.27 and 06/02/32 to 06/02/35. Greg
Kroah-Hartman is responsible for 2.6.32, but will adjust their care in
half a year.

Worm spreads via Remote Desktop feature of Windows

Worm spreads via Remote Desktop feature of Windows
The AV vendor F-Secure warns of Morto the pest, which spreads through
the remote desktop server (RDP server) of Windows. The worm takes
advantage of any security holes in Windows. It scans IP address ranges
to the RDP port 3389 and tried the answering machines at a login as
Administrator with a list of frequently used passwords.
The worm primarily affects Windows servers, since the purpose of active
RDP often remote and is accessible via the Internet. For the home user
versions of Windows, the RDP server will be included only in the
higher-priced versions (starting at 7 Professional) and have also
activated by hand. In addition, the port is accessible only from the
outside in this case, if the router port forwarding has been explicitly
set. If this is not the case, the requests can only be made from other
infected computers in the home network.
To insinuate themselves permanently in the system, the worm then sets a
drive A: to \, which can RDP as a network share to be addressed. On
release he finally placed the file a.dll who cares about the further
infection. In the further course of infection, among other places Morto
cache.txt the \ windows \ system32 \ sens32.dll and \ Windows \ Offline
Web Pages \.
On the infected computer, the worm takes care of its distribution, which
could be observed among other things, the Internet Storm Center, a
massive increase in traffic on the RDP port. In addition brings the pest
with typical bot functions. He contacted a number of domains to be there
to pick up new commands and components. A detailed analysis of Morto
Microsoft has released.
The worm is first noticed the middle of last week. Microsoft TechNet
forums, reports accumulated by fully patched systems, which explains the
unusually high traffic on port 3389. Morto at this time was still not
recognized by any virus scanner.
Meanwhile Morto is detected by the scanners from Micosoft and F-Secure,
the other major AV vendors are likely to be pulled along. To prevent the
bot in the first on to the system, one should protect passwords hard to
guess with computers accessible via RDP.