If you have any questions about information security (antivirus, intrusion, cybercrime, data theft, etc.), go to the end of the report and use the comments section. The column answers questions left by readers every Wednesday.
>>> Do Not Track
The Digital Security column commented on the "Do Not Track" feature, which must be activated "factory" in Internet Explorer 10 and is causing controversy . The column made the following statement:
"Do Not Track (DNT), which can be translated as" do not track ", is an option that will be available in all web browsers. If enabled, it causes the browser to inform all websites visited of the Internet user's preference. "
One reader asked the following question:
If enabled, it stops reporting and can not be crawled, right?
No, Francisco. It's strange, but the column is correct: even with Do Not Scan enabled, any information that the browser normally sends to a site will continue to be sent. And yet: one more information will be sent - that the surfer does not want to be tracked. That is, technically, the site actually has a lot more information about the web surfer.
It is entirely up to the site to decide to respect the preference and not store any of the information. There will not be a law forcing websites to respect the preference. It is a self-regulatory initiative of the technology and advertising industry.
"Do not track" is different from "anonymous mode", InPrivate navigation and similar features of web browsers. These modes prevent certain information from being sent to Internet sites, and erase any trace of that activity at the time the browser is closed. Therefore, the anonymous browsing mode prevents some useful resources for Internet users from being used, such as sites that resemble the login.
"Do not Track" seeks, on the other hand, to prevent the widespread and transparent tracking that is mostly done by the internet advertising networks to target ads. As the browser would not change anything in its operation, all the resources of the internet would continue to function without problems and, if the sites respected the Internet user's desire, data more difficult to control, such as those stored by plug-ins, would not be tracked either.
Today, Internet Explorer 9 already includes the "Trace Protection" feature, which allows you to configure a list of sites that will be blocked by IE9. However, this feature, in addition to blocking the crawl, often also blocks the ads themselves - which can cause harm to the internet sites and therefore also to those who use those sites.
>>> Different image in WhatsApp
Yesterday I received from a contact in WhatsApp, an image that when clicking on the "view" button, it changed when it was enlarged. I asked the contact how it was sent, because in the miniature one thing would appear and when clicking on the image, another. He could not explain. Is it possible that this image is embedded in a trojan or malicious code? A hug!
No, you probably do not have to worry about viruses. Viruses in image files are very difficult to create because they depend on a security flaw in the software where the image was opened and sometimes even features of the operating system can prevent such malicious code from working.
Because the code used to render images is usually a shared library, the error would have to be on the system itself. Unfortunately, Android phones have not been upgraded by device makers, and almost all Android installations have security holes that can be exploited by malicious code.
However, a virus that is in an image - even if that is the case - would normally produce a corrupted image. The flaw used would have to be very "good" and the code to exploit it too, in order to result in a legitimate image.
Image thumbnails are usually created automatically, often by the image transmission service itself, and there may be a small error in the system that generates the thumbnails, so that the generated thumbnail is different from the submitted image or vice versa.
>>> Account Lock in Hotmail
I have a cruel question about Microsoft email. On this Wednesday, October 10, 2012, I tried to get into my Live ID email and was blocked. I do not know how this blocking Live works, but I'm starting to think that some virus tried to attack my email and consequently the live ID blocks and leaves some tips to unlock with the code that send to a friend add in the list or fill in the personal data correctly, but as everyone does not know the secret answer among others ends up giving up the account. The question again is: would a virus be the cause of the block in my email ID live?
Web service account blocking - not just Microsoft accounts - can occur for several reasons. The specific behaviors observed by each service are different, but most do not depend on virus activity. It may be a different connection used to access your account, different accesses from the usual and of course repeated and failed attempts to log-in - or a set of these factors.
Another thing that can result in account blocking is the sending of unsolicited messages (spam), either by you or someone who has gained access to your account. This access may have been achieved either through a virus, a phishing attack (cloned page) or because there was a virus on a public computer (such as a lan house or school) that you used to access your account.
What exactly resulted in blocking your account is difficult to determine, but you can access the Microsoft support page ( click here ) to try to recover your account.
The pack of the Digital Security column this week is staying here, but I come back every Wednesday. So, do not forget to leave your question in the comments section below. To the next!