Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications

    Is Your Web Site Revealing Your Secrets?

    Written by

    Evan Schuman
    Published February 24, 2006
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      One of the more intriguing movies with a technology theme in the last few decades was a 1983 flick called “WarGames,” starring Matthew Broderick in his second movie.

      Critics of the movie from the IT community at the time said that the films plot—about a sophisticated war game computer that confused its NORAD masters into thinking that a simulated nuclear attack was real—was unrealistic because every computer has more failsafes than the one in the story.

      Maybe, but I saw the films theme as dramatizing a valid point: Any sophisticated program is going to have capabilities that most of its day-to-day users are unaware of and that ignorance can cause huge problems.

      In 2006, current Web capabilities are rapidly growing and few users understand how much data is being collected and potentially shared. Thats a lesson learned this week by the Washington Post.

      The Post has extensive experience protecting confidential sources. As journalists, we know the clues people look for in our stories to try and identify confidential sources, and we avoid them.

      When the newspaper posted pictures to accompany the story, they included metatag info that identified the sources location as a particular small town, making the sources identity easy to guess given all of the details in the story.

      /zimages/2/28571.gifTo read more about the Posts troubles with metadata, click here.

      When the photo department placed that information on the image for its catalog purposes, didnt it realize it would be world-viewable? How many retail IT execs would have thought of that?

      Another good example: A recently published book called SpyChips discussed privacy concerns about RFID. But one tactic that the authors (including someone finalizing a Harvard doctorate program) used was to go to various vendor sites and—so help me—type in the word “confidential.” Sure enough, certain sites then displayed confidential documents.

      In doing lots of Web searches, I found various internal memos and documents that were archived for a companys internal review and no one realized theyd be discovered by search engines.

      Far too many Web managers have faith in what is known as security by obscurity, which essentially means that a piece of content cant be found unless the user knows the exact URL path or finds a link to the document somewhere.

      That approach may be fine for a casual site visitor checking out your electronic storefront, but if someone searches for a word included in that document, youre toast.

      The reflexive response to security by obscurity is to stick a password on the front page of that document. The problem is that many sites do not properly set up their password security.

      Done quickly, the password can block someone who tries to click on that documents front door, but if a search engines spider hits every other possible combination, it might get through to some of the internal pages.

      I saw this recently on a site that had a large number of audio files (it was a post-production Web cast) and a mandatory registration page associated with the link to go to that collection of audio links.

      That mandatory reg page was comparable to a password in that it was a script that required a specific response before it would allow anyone through.

      The problem was that the site needed to password protect each and every file within that site.

      Another scary piece of Web magic: GoogleDesktop. That is an amazing piece of software. When I started using it, it wonderfully archived tons of files and images and E-mails. But I was startled during one search when it found someones phone number that had only existed in a brief IM exchange I had had weeks earlier and then deleted.

      Of course, theres the well-publicized Microsoft Office revision changes, which are often retained, even when invisible. Those documents can only reveal changes, but who the document had been sent to and lots of other great details that few people realize are being transmitted to clients and suppliers and anyone else on their distribution list.

      Google’s own CEO—Eric Schmidt—learned that lesson the hard way in March when he used Microsoft Office. Specifically, his data costume reveal was when he posted some PowerPoint slides he had used for an analyst presentation. The slides included speaker notes that revealed a theretofore secret plan to replicate a users entire harddisk on Google servers.

      The more sophisticated and automated Web programs get, the more data theyll need and that means the more data it might inadvertently share.

      Its something to consider before you send your boss an accidental nastygram, your wife a love letter that originally had someone elses name on it and your customers information revealing your markup.

      You do that a few times in a day and WarGames version of global thermonuclear war will start to look appealing.

      Evan Schuman is retail editor for Ziff Davis Internets Enterprise Edit group. He has tracked high-tech issues since 1987, has been opinionated long before that and doesnt plan to stop anytime soon. He can be reached at Evan_Schuman@ziffdavis.com.

      /zimages/2/28571.gifCheck out eWEEK.coms for the latest news, views and analysis on technologys impact on retail.

      Evan Schuman
      Evan Schuman
      Evan Schuman is the editor of CIOInsight.com's Retail industry center. He has covered retail technology issues since 1988 for Ziff-Davis, CMP Media, IDG, Penton, Lebhar-Friedman, VNU, BusinessWeek, Business 2.0 and United Press International, among others.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×