Postingan

Menampilkan postingan dari November, 2010

My Luggage Recommendations

Gambar
Next week my father is an agenda for teaching in Gorontalo, Gorontalo is a city on Sulawesi island.  many preparations to be prepared.  such as toiletries, some clothes and do not forget the suitcase to carry all the equipment.  Initially I was confused to find the trunk where but after surfing the internet I found a luggage store site.  in the trunk was the site I can choose different types of baggage.  starting from the trunk of the Hartman luggage , a model from the Tumi luggage or luggage from Rimowa luggage  model.   Each model has a unique baggage.  Some examples of the Hartmann luggage is Wings Luggage Hartman Luggage, Hartmann Luggage Intensity, Tweed Hartmann Luggage, Hartmann Luggage Stratum, Metropolitan Hartmann Luggage, Hartmann Luggage Metropolitan, Hartmann Luggage Vera Wang Signature Collection, Collection Nautralist Hartmann Luggage. Some examples of Rimowa luggage is Rimowa Rimowa Salsa Water, Rimowa Topas Aluminum, Rimowa Salsa Deluxe. Some examples are models of

firesheep http session hijacking from firefox

Gambar
When logging into a website you usually start by submitting your username and password. The server then checks to see if an account matching this information exists and if so, replies back to you with a “cookie” which is used by your browser for all subsequent requests. It’s extremely common for websites to protect your password by encrypting the initial login, but surprisingly uncommon for websites to encrypt everything else. This leaves the cookie (and the user) vulnerable. HTTP session hijacking (sometimes called “sidejacking”) is when an attacker gets a hold of a user’s cookie, allowing them to do anything the user can do on a particular website. On an open wireless network, cookies are basically shouted through the air, making these attacks extremely easy. This is a widely known problem that has been talked about to death, yet very popular websites continue to fail at protecting their users. The only effective fix for this problem is full end-to-end encryption, known on the web