
28.08.2018
Page 92 of 95
yourself from malware is to keep your system as up to date as possible; no opening of suspicious emails
that are send from dubious sources; using the latest antivirus program and of course, using your
eBlocker.
Network mask
With help of the IP address the network mask defines which other IP addresses belong to the local net.
That means which addresses can be reached directly. All other IP addresses that do not belong to one
network mask, do not belong to the local network and can only be reached through the router.
Price discrimination
Price discrimination describes a price policy on the Internet, where you get different prices for the same
product depending on from which device you want to buy the product. The price is set dynamically
according to the known data of the user with the aim to maximize their revenue.
Referrer
If you open a website, your browser sends you an according request for the website you want to visit.
This request not only contains the URL, but also many other meta-files for requests. Amongst other
things the browser transmits from which website the new request was send from. This indication is
called
„HTTP-referrer“ or in short „referrer“.
It has the legitimate right, to see insights which sites have been visited by the user and thus can optimize
their offers accordingly. The referrer can also be used in a comprehensive way, so personality profiles
can be created and connected.
SSL Encryption
SSL (Secure Sockets Layer) encryption is a method of data encryption. In connection with the
certificates, it ensures, that no changes can be made to the data on the way from the server to a browser
and the data exchange can not be read by unauthorized persons.
If an Internet user logs into a forum or an online shop, his registration data and texts can easily be
viewed and later misused when sent without SSL encryption. If the connection is protected by SSL, it
would take a relatively high effort to decrypt this encryption.
Tor Network
The Tor network is used to disguise your original IP address and to provide anonymous Internet surfing.
Suppose you have a certain page you want to visit and therefore you enter the URL into the web
browser. Your IP address is sent directly to the page you want to visit. However, if you use Tor, you will
be directed into the Tor network, which is made out of many other IP addresses from different
computers. The Tor network will send an IP address to the page that it chooses randomly out of all the
other IP addresses floating around the Tor network. This is how your real IP address is disguised.
Tracker
– Data collector
Most of the time trackers are service providers for advertising industries. Every time a user opens a site
that is being tracked, the tracker gets a notification that a user has been tracked successfully.
Through according cookies or other techniques, the tracker can recognize the user even through many
different websites again and again and thus generate a detailed protocol of the Internet behavior. All
trackers make their money by providing these personality profiles to advertising industries. The
advertising industries can now generate target oriented advertisement and place them on sites that are
visited frequently by the user.
openPVN
OpenVPN is an open-source software application that implements virtual private network (VPN)
techniques for creating secure connection.
VPN
Summary of Contents for PRO
Page 32: ...28 08 2018 Page 32 of 95...