Tuesday, April 26, 2011

Beware! You are being tracked online

You simply surf the web and can avoid other sites that use tools from Facebook, Twitter, Google and others that give you more social experience - That's impossible. Whenever you visit a site having a Like button, data including the address of the site you are visiting is sent to Facebook. No matter you are logged in or not, they have all the information they would need with your Facebook identity. With privacy issues at the vanguard of technology news, it is vital to note that these social media tools track user's behavior. 
Beware! You are being tracked online


In computing, the web browsing history means the list of web pages a user has visited recently and associated data such as page title and time of visit, which is recorded by web browser software as standard for a certain period of time. Apart from the web browser software itself, third-party services can also record a user's web browsing history. The worrying part of third-party tracking of your daily surfing is that there are many things companies can do with this information that isn't so beneficial to its users.

Banner ads are the ones that can track your browsing history. Each advert sets a cookie in your browser, and when you visit another site with ads served by the same provider, this cookie will be sent back with the referring URL. For instance, if you visit facebook.com the tracking cookie will be set in your browser. Even after visiting Facebook, the tracking cookie will still be sent to Facebook when any Like buttons are loaded on other sites. How to avoid that?

A user can avoid that by deleting all Facebook cookies from the browser, or even surf in his browser's incognito/anonymous mode. Apart from that there are some other ways which can be effective in this regard.

Disconnect, an open-source browser add-on developed by a former Google engineer, Brian Kennish can block third-party tracking scripts from major data gatherers like Google, Facebook, Yahoo! and Twitter. It blocks tracker scripts from collecting information from the user, such as Facebook Like buttons or those auto-login sites, and de-personalizes the user's searches on Google. A user can also use other computers as proxies to hide their IP address from the web sites they visit or the other computers they communicate with on the Internet.

Since web browsers play an ever more central role in our use of computers, and even becoming the only way to interact with a machine, it?s obvious that the subject of privacy keeps coming up. And with privacy comes along the topic of how we are tracked on the web. While registering or doing business with a Web site, the user should always review its privacy policy to see how it will use your information. You should never do business with any site that doesn't have a clearly stated privacy policy.


Ref. from : SiliconIndia

Friday, April 22, 2011

Virtual Private Network Architectures



 In the present economy, service provider profitability hinges on moving beyond a focus on transport to delivering value-added services. The market for managed virtual private network (VPN) services is expected to reach $5.3 billion by 2006, according to research firms IDC and Ovum. Managed VPN services can include e-commerce, IP telephony, managed security, remote site backup, application hosting, and multimedia applications. The type and deployment of a VPN architecture—Multiprotocol Label Switching (MPLS), IP Security (IPSec), or a combination of these—influence the service provider’s market coverage, service offerings, and revenue.

This white paper compares MPLS- and IPSec-based VPN architectures. It begins by explaining the evolution of the two distinct VPN technologies, and the general goals for VPN architectures. Next, it presents the relative strengths of MPLS- and IPSec-based VPNs and explains where service providers can deploy each architecture for optimum advantage. The white paper concludes with a brief description of the integrated IPSec-to-MPLS VPN solution from Cisco Systems, which takes advantage of the respective strengths of the two architectures.

Two VPN Architectures?

In recent years, two Internet Engineering Task Force (IETF) working groups have been established, focusing on three important components of VPNs—Internet security, label
switching standardization, and quality of service (QoS). In the IETF’s Routing Area, the MPLS working group is developing mechanisms to support higher-layer resource reservation, QoS and definition of host behaviors. Concurrently, in the IETF’s Security Area, the IPSec working group is concentrating on the protection of the network layer by designing cryptographic security mechanisms that can flexibly support combinations of authentication, integrity, access control, and confidentiality. The IETF has left the issue of integrating MPLS and IPSec to the discretion of networking vendors. As a result, two VPN architectures have emerged—one based heavily on MPLS and the other on IPSec. MPLS and IPSec-based VPNs are complementary rather than mutually exclusive. Service providers can increase their service footprint and gain other competitive advantages by using the strengths of the two architectures.

Essential Attributes of VPNs
The service goal of VPNs is to provide customer connectivity over a shared infrastructure, with the same policies enjoyed in a private network. A VPN solution must protect against intrusion and tampering, deliver mission-critical data in a reliable and timely manner, and be manageable. Following are essential attributes of VPN architectures.

Scalability:
A service provider’s VPN deployments might range from small office configurations through the largest enterprise implementations,spread across the globe. The VPN architecture must adapt to meet customers’ ever-changing bandwidth and connectivity needs. In today’s fiercely competitive, dynamic market environment, service providers must be able to deploy and provision large service requests rapidly. This requires the ability to scale the VPN to accommodate unplanned growth and changes driven by customer demand. Service providers that have the potential to support tens of thousands of VPNs over the same network maximize their revenue and profit potential.

Security
It is essential that the VPN protect sensitive data so that it remains confidential. Security mechanisms used in VPNs include tunneling, encryption, traffic separation, packet authentication, user authentication, and access control.

QoS :
Support for QoS enables the VPN to prioritize mission-critical or delay-sensitive traffic such as voice and video, and also to manage congestion across varying bandwidth rates. QoS mechanisms include queuing, network congestion avoidance, traffic shaping, and packet classification.

Manageability:
Typical VPN management tasks include:
• Provisioning
• Distributing and installing VPN-enabled customer premises equipment (CPE) and VPN software clients where needed
• Installing security and QoS policies
• Managing and making changes to VPNs
• Billing
• Supporting service-level agreements (SLAs)
To perform these tasks, the service provider relies on an operations support system (OSS). An OSS with automated flow-through provisioning systems, reporting, and monitoring enables service providers to quickly fulfill VPN orders and support SLAs.

Reliability and Redundancy :
The VPN must be able to deliver the predictable and high service availability that business customers expect and require. A combination of reliability and redundancy is the key to maintaining business continuity and recovering from failures. Mechanisms
to improve service availability include enabling the VPN network to provide server stateful failover, VPN redirect, VPN session keepalive, VPN redundant server and backup sites. Some of these mechanisms may be offered by the service provider as a premium service at additional cost.