Cookies are short reports that are sent and stored on the hard drive of the user's computer through your browser when it connects to a web. Cookies can be used to collect and store user data while connected to provide you the requested services and sometimes tend not to keep. Cookies can be themselves or others.
There are several types of cookies:
Technical cookies that facilitate user navigation and use of the various options or services offered by the web as identify the session, allow access to certain areas, facilitate orders, purchases, filling out forms, registration, security, facilitating functionalities (videos, social networks, etc..).
Customization cookies that allow users to access services according to their preferences (language, browser, configuration, etc..).
Analytical cookies which allow anonymous analysis of the behavior of web users and allow to measure user activity and develop navigation profiles in order to improve the websites.
So when you access our website, in compliance with Article 22 of Law 34/2002 of the Information Society Services, in the analytical cookies treatment, we have requested your consent to their use. All of this is to improve our services. We use Google Analytics to collect anonymous statistical information such as the number of visitors to our site. Cookies added by Google Analytics are governed by the privacy policies of Google Analytics. If you want you can disable cookies from Google Analytics.
However, please note that you can enable or disable cookies by following the instructions of your browser.
How many times have you seen an alert similar to one of the below while trying to connect to the café or airport WiFi to check email or login to a secure website?
How many times have your just ignored the alert, and clicked OK to continue?
If you clicked OK without understanding or caring about the meaning of the alert, unfortunately you are not alone. And this is one reason why hackers have such an easy time compromising systems, infecting them with malware, and stealing or encrypting their sensitive data. But how can they do that?
If you receive a certificate error such as above, there are several reasons that you need to be very careful in what you do next. In any of these cases if you click OK and continue to the site, the passwords you send could be seen and you may infect your computer with malware that could steal or destroy your data.
Some Reasons you may see a Certificate Error:
The website’s certificate has been revoked (probably a fraudulent site!)
The website’s address does not match the address (could be the company is using the same certificate for several websites)
The website’s certificate is out of date (caution)
The website’s certificate is not from a trusted source (use caution - many phishing and malware sites use fake certificates)
Think of a website’s certificate as its form of identity. If a family member asked to borrow your car keys, you might hand them the keys. But if a stranger asked to borrow your car keys, would you let them?
Your computer identifies the site you are visiting by comparing its certificate creator’s signature with its own local copy in something called a Certificate Trust List (CTL).
Certificate security is achieved via a chain-of-trust:
Subordinate Authorities create certificates for websites, etc., and in the process they also sign the certificates they create
Your computer’s Certificate Trust List has a copy of the valid certificate creator’s signatures and compares it to the copy presented to you by the website
That’s just a very high level view of what’s going on, but when you visit an authentic website the basic premise of chain-of-trust security is simply this:
The website’s certificate was created by someone you trust… or more specifically, someone your computer trusts. Anyone can easily make their own fake certificate, give it a name such as ‘starbucks.com’, and pose as Starbucks to unsuspecting web or Wi-Fi users connecting to their rogue wireless access point.
Your computer’s own Certificate Trust List is your silent defender – making sure that any secure website you visit is actually the one your computer knows & trusts.
However if you bypass the warning your computer provides, you are now in potentially dangerous territory!
Last weekend I took part in the biggest Swiss Blockchain Hackathon SBHACK19, and our team won twice! BlockByte won in agriculture vertical. BlockByte won First prize among 39 teams together with Velove team. 200+ hackers, 20+ countries, 39 teams, 7 verticals (Agriculture & Food, eGovernment, Mobility, Finance, Intelligent Parcel, Supply Chain) , 57 coaches, 6211 messages in Slack, 20 million lines of code written in just 42 hours! Many interesting solutions have been developed in the fields of intelligent parcels, finance, …
"Blockchain révolution" est un programme de 7 semaines dont l'objectif est de décrypter les enjeux technologiques et anthropologiques autour de la technologie issue de la monnaie digitale décentralisée bitcoin. Le programme fait intervenir des figures marquantes, 15 interviews d'experts, tout au long de la série pour que vous bénéficiez de l'expertise optimale. Cette série vous est offerte par l'ETNA et le Groupe SII. Mashup Blockchain Comprendre l'intérêt du Blockchain et de Blockchain Révolution en moins de deux minutes avec le …
I would like to wish all our readers Happy Holidays, Season's Greetings, Merry Christmas or whatever you say in your part of the world. It's been a productive - and at times challenging - year here, and we're really excited about our plans for 2015. Wherever you are, and whatever you're doing today, enjoy yourselves and thank you for being a part of waltercedric.com! …
CedThumbnails has been updated to version 2.6.0 and contains 4 new features and correct 1 bug for Joomla 2.5. For existing users the update will display in the Extensions Manager under Updates. If you do not have this currently installed, you can click the link below and install like you are use to via the Extensions Manager. …