My Web Markups - sara ghatta
to provide a variety of location-based services. F
Location Services & Privacy - Apple Support
When you Tweet from a third-party application or mobile device, it should be clear which type of data will be included in your Tweet
Application developers are required to be up-front and obvious about whether your exact coordinates, or just the place, will be included in your Tweet
tag your precise location
If you have chosen to attach location information to your Tweets, your selected location label is displayed underneath the text of the Tweet.
nclude both the location label of your choice and your device's precise location (latitude and longitude), which can be found via API
Tweet location FAQs
analytics tags is to provide data from the user's browser DOM
, browser metadata
Analytics tags send information back to a marketing information database;
Protect the file upload from CSRF attacks
secure file upload implementation:
malicious files in a way to
to upload their photo, their CV, or a video showcasing a pro
File upload is becoming a more and more essential part of any application
ile content can contain malicious, inappropriate, or illegal data.
File Upload - OWASP Cheat Sheet Series
he <script> tag,
Input Validation - OWASP Cheat Sheet Series
nto two serial signals
Thunderbolt is the brand name of a hardware interface developed by Intel (in collaboration with Apple) that allows the connection of external peripherals to a computer.
Thunderbolt (interface) - Wikipedia
It typically infects computers through email, file sharing sites, and unprotected downloads
nd encrypt files it has permission to write to.
mapped network drives,
It not only encrypts files on the local machine
What is Ransomware | Attack Types, Protection & Removal | Imperva
the master password or recovery key may be used to decrypt the files instead.
FileVault - Wikipedia
continue to use your system while the encryption takes place
It may take a while to fully encrypt your drive, but when FileVault is enabled you can
if the drive is removed from your computer, this encryptions should prevent any access to the data
This enables a 128-bit AES encryption routine on the boot drive, in which the operating system, applications, and all data on the drive are encrypted
FileVault, which is Apple’s full-disk encryption technology
Built-in options for encrypting data on your Mac | MacIssues
While keychain information
There are numerous ways that a thief can get into your Mac,
How to secure and lock down your Mac | MacIssues
now, such as a password and user name
extra verification layer w
Working within the cloud, Imperva Web Application Firewall (WAF) blocks malicious requests at the edge of your network. This includes preventing malware injection attempts by compromised insiders in addition to reflected XSS attacks deriving from a phishing episode.
messages resemble their legitimate
have a misspelled domain name or extra subdomains.
by creating a sense
attackers will usually try to push users into actio
designing phishing messages to mimic actual emails from a spoofed organization.
reflected XSS attack
hijack the user’s session cookie
original password to gain access to secured areas o
both new and existing passwords
The attacker, monitoring the page, hijacks the
A spoofed emai
An organization succumbing to such an attack typically sustains severe financial losses
corporate or governmental
For individuals, this includes unauthorized purchases, the stealing of funds, or identify theft.
the freezing of the system as part of a ransomware attack or the revealing of sensitive information.
which can lead to the installation of malware
The recipient is then tricked into clicking a malicious link,
dupes a victim into opening an email, instant message, or text message.
social engineering attack
steal user data, including login credentials and credit card numbers
What is phishing | Attack techniques & scam examples | Imperva
Decryption occurs in the background as you use your Mac, and only while your Mac is awake and plugged in to AC power.
Any new files that you create are automatically encrypted as they are saved to your startup disk.
only while your Mac is awake
iCloud FileVault recovery, you can create a local recovery key
FileVault recovery key with
your iCloud account
ncryption occurs in the background as you use your Mac
ncryption occurs in the background as you use your Ma
Use FileVault to encrypt the startup disk on your Mac - Apple Support
End-to-end encryption ensures that the data is only available decrypted at the end points
when sending e-mails (with most providers).
recognizable in the browser by the https protocol
End-to-end encryption for confidential meetings at Zoom and Webex - Data protection - Under the radar
the PSTN network involves more than just telephone poles and your grandparents’ house phone.
expensive copper wiring.
“POTS” (plain old telephone service)
public switched telephone network)
Towers, switching centers, satellites, cable, and yes, even cellular networks are all part of POTS.
What Is the Public Switched Telephone Network (PSTN)?
Next generation Wi-Fi® security for personal and enterprise networks
stronger protections for users against password guessing attempts by third parties
The 192-bit security suite ensures a consistent combination of cryptographic tools are deployed across
such as government or finance
providing additional protections for networks transmitting sensitive data
192-bit cryptographic strength
Protected Management Frames
isallow outdated legacy protocols
atest security methods
Personal and WPA3-Enterprise.
cryptographic strength for highly sensitive data
enhance Wi-Fi protections in personal and enterprise networks
introduces Wi-Fi CERTIFIED WPA3™, the next generation of Wi-Fi
Wi-Fi Alliance® introduces Wi-Fi CERTIFIED WPA3™ security | Wi-Fi Alliance
Wi-Fi Alliance is launching configuration, authentication, and encrypt
Wi-Fi Alliance® introduces security enhancements | Wi-Fi Alliance
transferred to a Google server in the USA
time in the settings of the app
You can allow or revoke this function at any time
we have no influence on this data collection and are not responsible for it.
we collect the following additional personal data
if you do not log in to use the website
so-called location-based services
In order to be able to offer you these functions of the app, we collect your location data using GPS and your IP address in anonymized form, if you allow this via the settings in your mobile device.
VVS data protection declaration • VVS: Verkehrs- und Tarifverbund Stuttgart
CPS applications (focusing on modern mobile applications
recently finished European R&D projects in CPS and IoT
modern design tools
issues and challenges of their development,
with issues and challenges of CPS and IoT
Promotion and facilitation of international contacts and collaboration
Dissemination, exchange and discussion of advanced knowledge and project results
dvanced training o
design methodologies and design tools
Cyber Physical + Systems
high reliability, security a
modern mobile applications
r low energy consumption,
, free participation in CPSIoT 2021 and MECO 2021 sessions.
lectures, demonstrations, practical hands-on
SS-CPSIoT’2021 – Embeddedcomputing.me
QR code has become a focus of advertising strategy,
commercial tracking applications
it was designed to allow high-speed component scanning
QR code - Wikipedia
organize the world’s information
How Our Business Works - Google
A third-party content provider can track you across websites to advertise products and services.
Change Privacy preferences in Safari on Mac - Apple Support
You can simply move the files from the Creative Cloud Files folder on your computer to an alternate location.
Export personal assets out of your teams or enterprise account using the instructions above (based on storage location
such as a Creative Cloud plan for individuals you’ve purchased or a Creative Cloud free membership you’ve signed up for.
If you wish to move your personal content from Creative Cloud for teams or enterprise storage to a personal Creative Cloud account (registered under a different email address
registered under a different email address
Until your personal content is moved out, the administrator of your Adobe account may access and control it in Creative Cloud and Document Cloud for teams and enterprise storage.
not limited to a business or any other commercial entity, government entity, non-profit organization, or educational institution
s) from an organization or group
“Entitlement” (which is defined as the right to use, access, and consume the Software and Services)
uch as Creative Cloud for Teams, Creative Cloud for Enterprise, or Docume
f there is any conflict between the terms in the General Terms and the Additional Terms, then the Additional Terms govern in relation to that Service or Software.
For customers in Australia, Adobe Systems Software Ireland Limited is acting as an authorized agent of Adobe Systems Pty Ltd. and is entering into this contract in its capacity as agent for Adobe Systems Pty Ltd. You may have additional rights under your local law.
s Software Ireland Limited, and the Terms are governed by the law of Ireland.
You must be 13 or older to register for an individual Adobe ID. Schools that participate in the primary and secondary education named user offering may issue a child under 13 an enterprise-level Adobe ID, consistent with the Primary and Secondary Education Additional Terms.
eneral Terms”), a
detect, prevent, or otherwise address fraud, security, legal, or technical issue
ail address with that account
f you do not want a Business to access, use, remove, retain, or control an account or profile, then do not use a Business ema
take control over the account and any Content therein whether stored, uploaded, or imported before
roll your account into the Business’s account.
Business Email Domains.
all Content in your personal account or personal profile
you maintain sole access and control over
f you are a Business User with Entitlements from multiple Businesses, you may have separate Business Profiles associated with each Business. As a Business User, you may have different agreements with or obligations to a Business, which may affect your Business Profile or your Content.
. Adobe is not responsible for any violation by you of such agreements or obligations
ess Profile and all Content therein
Adobe may provide such Business with the ability to access, use, remove, retain, and control your Busin
t is strongly recommended to research if the framework you are using has an option to achieve CSRF protection by default before trying to build your custom token generating system.
Cross-Site Request Forgery Prevention - OWASP Cheat Sheet Series
unts for you.
Mute, block, and report accounts for yo
Twitter / Authorize an application
ata from cookies stored on your device, including cookie IDs and settings.
other devices that are nearby or on your network
: information such as the name of your mobile operator or ISP, language, time zone, mobile phone number, IP address, connection speed and, in some cases, information about
information you allow us to receive through device settings you turn on, such as access to your GPS location, camera or photos.
Bluetooth signals, and information about nearby Wi-Fi access points, beacons, and cell towers.
Things others do and information they provide about you.
authentication information; and billing, shipping and contact
includes payment information, such as your credit or debit card number a
s when you make a purchase in a game or make a donation),
nancial transactions (such
We collect information about how you use our Products
SMS log history
such as an address book or call log or
Data with special protections:
You can choose to provide information in your Facebook profile fields or Life Events about your religious views, political views, who you are "interested in," or your health. This and other information (such as racial or ethnic origin, philosophical beliefs or trade union membership) is subject to special protections under EU law.
prevent them from causing further harm.
cookies to detect computers infected with malware
Our ‘csrf’ cookie, for example, helps us prevent cross-site request forgery attacks.
by enabling us to identify computers that are used to create large numbers of fake Facebook accounts.
Cookies help us fight spam and phishing attacks
if you tell us that your account has been hacked. This includes, for example, our ‘sb’ and ‘dbln’ cookies, which enable us to identify your browser securely.
Cookies also help us remember your browser so you do not have to keep logging in to Facebook and so you can more easily log in to Facebook via third-party apps and websites.
determine when you’re logged
While the cookies that we use may change from time to time as we improve and update the Facebook Products, we use them for the following purposes:
which are deleted when you close your browser, and persistent cookies, which stay on your browser until they expire or you delete them.
cookies that we use include session cookies
providing a safer experience
improve the Facebook Products
personalising content, tailoring and measuring ads
identifiers associated with your devic
Cookies are used to store and receive identifiers and other information on computers, phones and other devices
t is strongly recommended to research if the framework you are using has an option to achieve CSRF protection by default before trying to build your custom token generating system
function via the victim's browser, without the victim's knowledge
cookies including session cookies
esult in a transfer of funds
Cross-Site Request Forgery Prevention - OWASP Cheat Sheet Series
and what is the valid syntax of a DNS name.
CNAME records relate, what names are legal in what parts of the DNS,
class and type, and the issue of canonical names, what they are, how
issue of differing TTLs for DNS records
multi-homed DNS server should use when replying to a query
RFC 2181 - Clarifications to the DNS Specification
same name space
different protocol families
etworks and applications
name space to be useful in dissimilar
The DNS tags all data with a class as well as the type, so
RFC 1034 - Domain names - concepts and facilities
when advertising to other providers, the ISP only needs to advertise 172.16.0.0/16.
This allows for the summarization of the domains to be done at the higher
left-most contiguous mask bits that are set to one.
length of the mask.
an IP network is represented by a prefix,
Classless Interdomain Routing (CIDR) was introduced in order to improve both address space utilization and routing scalability in the Internet
IP Addressing and Subnetting for New Users - Cisco
you can let us know if the place is closed, inappropriate, a duplicate, a home, or should be marked private.
Reporting issues with places – Help Center
you may also label your Tweet with the name of a specific business, landmark, or other point of interest
Enabling this feature allows Twitter to show the location you are Tweeting from as part of your Tweet.
he Tweet may also include your precise location (i.e., the GPS coordinates from which you Tweeted), which can be found through the Twitter API, in addition to the location label you select
These locations are provided by Foursquare and
add a general location label
You can choose to add a location to your Tweets using Twitter for
How to add your location to a Tweet
research findings, ideas, developments and applications in the broader areas of Computer and Communications.
provide a common forum for researchers, scientists, and students from all over the world to
IEEE ICCC 2021丨Chengdu, China
build a future for myself.
Yes, in any case.
When successful Arabs come to Germany to study or work, the fear becomes less and less.
You just have to understand that people are scared.
I only speak German or French with friends there. Then all listen to us and smile at us
I stopped making calls in Arabic on the train
can tell that people are getting a little anxious because they think that I might be planning an attack.
Not at all at university!
remind themselves what racism, hatred and anger against foreigners can lead to. Fortunat
Wherever I'm happy and can achieve my goals, that's where I stay.
I like that everything is well organized. Everything has it's time. Sometimes it's stressful, but it's still good. I really learned from the Germans to be well organized
A friend is even really annoyed with me because I have to stop constantly to greet people.
Working while studying is not the norm in Tunisia either.
The move to Germany was against ... Wow! Huge! I had to learn everything: cooking, cleaning, housekeeping.
was able to live with my mother because I studied in my hometown
when I arrived I could only say "Hello".
Radio, television, talking to people on the street and yes, flirting too, all helped me. And of course I read a lot.
I got an engineering degree in T
Finding a job in Germany would have been difficult because I had no work experience in Tunisia
market in Tunisia was difficult
That upset me: he works at the airport and doesn't speak English to foreigners and tourists ?! That was totally disappointing.
he refused to speak Engl
to speak English to me.
In der Bahn spreche ich jetzt Deutsch | News | 23.01.2018 | Für Studierende | Universität Stuttgart
new talent is deterred
Talents are lost
Projects remain unfinished
Creative potential remains unused
Insecurity, feelings of powerlessness Loss of self-confidence, self-blame Psychological impairments to mental illnesses "Victim blaming" Breaks in the curriculum vitae (discontinuation of studies, doctorate or professional career) Costs (e.g. legal advice, relocation, therapy)
Universität ohne Diskriminierung | Universität Stuttgart
The adjective “racist” in itself embodies an injustice and thus expresses the rejection of racial ideology historically intended by the fathers and mothers of the Basic Law more clearly. However, “for racist reasons” is not optimal from an anti-discrimination point of view:
nti-discrimination law aspects must be taken into account in order not to undermine protection
The inhuman term 'race' i
'race' in the Basic Law should be replaced.
Anti-Discrimination Agency - News - Anti-Discrimination Agency to replace the “race” term in the Basic Law
Article 3 in
I think striking the word 'race' is an essential step."
"breed," used for animals.
The word "Rasse" in German, rendered as "race" in the official translation of German law, is described in the German Duden dictionary as dated and potentially discriminatory
Following the anti-racism protests triggered by the police killing of George Floyd in the US
′Race′ has no place in the German constitution — or does it? | Germany| News and in-depth reporting from Berlin and beyond | DW | 13.06.2020
Green CPS and IoT
of CPS and IoT,
her R&D projects
publish and disc
Conference together with CPS&IoT’2020 Summer School constitute a premier Europe based conference event in CPS and IoT
he main Databases or Digital Libraries as IEEE xPlore, SCOPUS, WoS, et
Selected conference papers will be invited for publication as extended journal papers in the journal Microprocessors and Microsystems
Contemporary Cyber-Physical Systems (CPS) are smart compound systems engineered through seamless integration of embedded information processing sub-systems and physical sub-system
CPSIoT’2021 – Embeddedcomputing.me
metrics-based measurement and visualisation
We help policymakers
improve your own cyber health
What We Do
latency that depend on the number of other users sharing the service concurrently,
network's global system for mobile communications (GSM).
s a packet oriented mobile data standard on the 2G and 3G cellular communication
General Packet Radio Service (GPRS)
Most GPRS mobile devices are Class B.
GPRS service is suspended and resumed automatically after the GSM service (voice call or SMS) has concluded.
ce (voice, SMS)
GPRS service and GSM service (
due to a radio noise induced pause).
The TCP restores any packets lost
GPRS will store and forward the IP packets to the phone even during handover.
X.25 connections are typically used for applications like wireless payment terminals, although it has been removed from the standard. X.25 can still be supported over PPP, or even over IP, but this requires either a network-based router to perform encapsulation or software built into the end-device/terminal; e.g., user equipment (UE).
not supported by mobile phone operators but if a cellula
"Always on" internet access
When TCP/IP is used, each phone can have one or more IP addresses allocated
wireless application protocol (WAP)
Point-to-point (P2P) service: i
inter-networking with the Internet (IP)
This allows an IP address to be
dynamically assigned (using IPCP rather than DHCP) to the mobile equipment.
if a cellular phone is used as a modem for a connected computer, PPP may be used to tunnel IP to the phone
Internet Protocol (IP). In practice, built-in mobile browsers use IPv4 before IPv6 is widespread
The GPRS core network allows 2G, 3G and WCDMA mobile networks to transmit IP packets to external networks such as the Internet.
General Packet Radio Service - Wikipedia
They do so to unify their followers, attract new sympathisers, and further their objectives.
Like many state and other non-state actors, terrorist groups manipulate the global pandemic in their radical narratives.
How Europe's terrorists take advantage of the pandemic
Academic Reading - section 1 | Take IELTS
As we pursue the connected future, however, we must place equivalent—if not greater—focus on the security of those connections, devices, and applications.
we must place equivalent
upgrades to your smartphone
software updates much like the current
software network, future upgrades will be
Because 5G is the conversion to a mostly all-
For political purposes,
cyber vulnerabilities of software, the tougher part of the real 5G “race” is to retool how we secure the most important network of the 21st century and the ecosystem of devices and applications that sprout from that network
Why 5G requires new approaches to cybersecurity
cords by service providers will also work to ensure his anonymity
he can be sure that the lack of uniformity in maintaining on-line communication re
im and his activities
services in other geographical locations so as to ensure additional distance between him a
f he takes advantage of the easy access to Internet
The launderer can easily use fictitious identities in setting up his presence on the web.
perhaps located in an offshore area, which contain criminal proceeds. The launderers' company then invoices the credit card company, which, in turn, forwards the payment for the service rendered. The launderers' company may then justify these income payments for a service rendered.
or debit cards tied to accounts under
The launderer then uses those services and charges them for using credi
one method of laundering money through the Int
nternet would be to establish a company offering services payable through the Internet
The Effect of Internet Banking upon Money Laundering
especially in light of the new mediums
in tackling the money laundering issue.
the Council of Europe and the European Union
power of the criminals and organised crime groups involved
strategies should be directed towards undermining the economic
domestically and internationally
declining relevance of territorial boundaries
extent of the global network of terrorist financing
the actual growing threat is that of drug trafficking
is designed so that only you can access this information and only on devices where you’re signed in to iCloud
iCloud Keychain uses end-to-end encryption
No one else, not even Apple, can access end-to-end encrypted information.
iCloud protects your information by encrypting it when it’s in transit, storing it in iCloud in an encrypted format, and using secure tokens for authentication.
Apple ID & Privacy - Apple Support
secure tokens for authentication
n. Otherwise, your data is still encrypted in storage and transmission but is not encrypted end-to-end
End-to-end encryption for Health data
using secure tokens for authentication
iCloud security overview - Apple Support
he most general purpose of this report is to identify customers who are involved in money laundering, fraud, or terrorist funding.
Anti-Money Laundering (AML)
A financial institution must send complete and accurate SARs and contain all SAR related cyber information, such as IP addresses, virtual wallet information, and cyber incident information.
SAR is part of anti-money laundering laws and regulations that have become much stricter since 2001
uch as IP addresses,
These staff can also access information such as Internet Protocol (IP) addresses
Anti-Money Laundering and Cybersecurity | Sanction Scanner
ut you can always outs
ttel about a single argument it goes lik
How to Write a Note That You Will Actually Understand • Zettelkasten Method