http://www.lifenet.orgOn Apr 21, 2004, at 8:08 PM, Tony LaFemina wrote:
> Henri Yandell wrote: > >> Cookies are useful for remembering passwords, if the site itself >> offers to >> remember them and not the browser, or just to remember who you are. >> >> They're also quite essential in maintaining a stateful session with a >> server so that you don't have to tell it who you are every time you >> hit a >> button. There are other ways to do this, but cookies are the preferred >> approach. >> >> I think it's rare to store information in a cookie. Usually it would >> just >> contain an id to represent you. >> >> I like the old Camino browser which forces you to agree to let a site >> set >> cookies in the future. That way you can block the advert sites and >> allow >> the site you really went to. >> >> Hen >> >> > Hi Henri > > You may not be one of them, but I think there are a few on the list > that are security conscious. I never understood the reasoning behind > it since a computer is probably one of the most insecure devices you > could possibly own, unless you only use it for personal use and have > no link to the outside world. > > I think it's safe to assume everyone on the list has an internet > connection of some sort. That alone makes it insecure to some extent. > For those that spend most of their time on the internet, I believe > security is totally out the window. On another note, for those of you > using any version of the new OS, I was led to believe that the OS runs > programs at odd hours, for whatever reason, if your Mac is always left > on. Maybe I'm stupid, but what's the need for that? Does the OS need > assurances from Apple in order to be on its best behavior? > > As far as cookies go, you mention storing passwords. Why would any > security conscious person want somebody or something else storing that > kind of information? You also mention a cookie remembering who you > are. If that were the case, why bother storing passwords? There's > still too much I don't know, to willingly toss around private > information without knowing what's going on. For those on the list who > may not be aware of it, information happens to be a hot commodity. I > for one, believe there are people in critical areas of business and > government that wouldn't lose a nights sleep over selling lists of > valuable information to eager buyers. > > -- > Tony LaFemina > When you want to do more than just buy software > http://hometown.aol.com/visitmacland/index.html > mailto:remacs at optonline.net > > > > > > | The next meeting of the Louisville Computer Society will > | be April 27. The LCS Web page is <http://www.kymac.org>. > | List posting address: <mailto:macgroup at erdos.math.louisville.edu> > | List Web page: <http://erdos.math.louisville.edu/macgroup> > > Hi Tony, I'm reminded of an encounter I had with an older woman who was adamantly opposed to online shopping. She felt it was too insecure and didn't want to give her personal information to some anonymous website. I reminded her that the website had several technologies built-in to help confirm her identity, to make sure no one else could read the transaction and to make sure the transaction was completed as securely as possible, but she would have none of it. Finally I asked her, "So you aren't willing to trust a website, which uses a secure form of the web protocol with 128-bit encryption so no one can capture your data, but you will hand your credit card to some anonymous 17-year-old cashier at Wal-Mart without hesitation?" Security is diametrically opposed to convenience. Increasing availability inherently reduces security and vice-versa. Cookies and similar technologies are like the concierge in a nice hotel who, remembering you from a previous visit, welcomes you by name when you arrive. It's somewhat flattering to know that you are remembered and acknowledged when you walk through the doors, even though thousands or millions have passed through since your last visit. We don't tend to mind that sort of security breach because it makes us feel good, but we tend to get worried when it becomes digital. Big Brother complex - who's looking over my shoulder? I see a time in the near future when all communication via the 'Net is encrypted with something like a VPN connection (Virtual Private Network - encryption of data between two points, shared over a public, insecure connection). Computers are getting beefy enough to handle the overhead required for software encryption and the technology is dropping lower and lower in price. Cisco makes a VPN concentrator which provides up to 400 VPN connections for less than $3000. Up to 400 people can connect simultaneously (provided you have the bandwidth for them) with encrypted connections right into your facility, over whatever internet connection they have. Connecting from home over cable? Fine. Sitting in a wireless hot-spot surfing and sipping cappuccino? No problem. Connecting from your hotel anywhere in the world? Piece of cake. The entire data tunnel from you to your office is encrypted so that no one can hijack your data. Very nice technology, and soon, I predict, the software will be as commonplace as your web browser or email client. Regarding the late night antics of the Mac OS, yes, they need to run. Your system has scheduled tasks that will run in the wee hours of the night to clean up, organize, toss out and file away data that might cause problems in the future on your system. It's your system's housekeeping routines, scheduled in the late night or early morning to keep from hindering the majority of Mac users. The processes are a little intensive, and you will notice a speed hit when they are running. Better 3AM than 3PM to run these tasks. Let 'em run... your system will thank you! -- Bryan C. Forrest Macintosh Specialist & Asst. Network Admin LifeNet | The next meeting of the Louisville Computer Society will | be April 27. The LCS Web page is <http://www.kymac.org>. | List posting address: <mailto:macgroup at erdos.math.louisville.edu> | List Web page: <http://erdos.math.louisville.edu/macgroup>
