Privacy on the Internet
| |

As the protocols used for e-mail, HTTP uses broadcast of its messages clearly, making it vulnerable to even novices attackers. A simple solution to ensure the privacy of navigation is using an extension protocol called HTTP Secure or HTTPS. Addresses … Read More

Proxy servers
| |

There are increasingly many companies which, along with the use of a firewall equipment, use for HTTP proxy servers. They are designed to be intermediate between the client and the web server, making connections on their behalf. Usually they contain … Read More

Web browsers
| |

In terms of investigations, it should be noted that the accessed links are generally temporarily stored in the client programs. This feature called History – history of navigated pages, and can be a very useful tool for research pages that … Read More

Web address – URL
| |

Generally, the transfer begins with a request that the client makes to the server as a result of a user action such as entering an address or clicking on a link. The addresses are also denominated as URL, acronym for … Read More

HTTP
| |

Hyper Text Transport Protocol (HTTP) is the core of traffic on the World Wide Web (or WWW) on the Internet or private networks, and is basically a very simple protocol. It establishes a connection, and it asks for a document, … Read More

Spamming
| |

Spamming is the act of sending large numbers of unsolicited electronic messages (usually of a commercial nature). Although there are several methods, the most used is based on e-mail. Spam in the form of text messages may also target mobile … Read More

e-Mail
| |

E-mail is probably the service that has contributed most to the increase in popularity of the Internet so great, still one of the main reasons that people connect to this network. The key to success lies right in its features: … Read More