871 resultados para Private browsing
Resumo:
A Web aproximou a humanidade dos seus pares a um nível nunca antes visto. Com esta facilidade veio também o cibercrime, o terrorismo e outros fenómenos característicos de uma sociedade tecnológica, plenamente informatizada e onde as fronteiras terrestres pouco importam na limitação dos agentes ativos, nocivos ou não, deste sistema. Recentemente descobriu-se que as grandes nações “vigiam” atentamente os seus cidadãos, desrespeitando qualquer limite moral e tecnológico, podendo escutar conversas telefónicas, monitorizar o envio e receção de e-mails, monitorizar o tráfego Web do cidadão através de poderosíssimos programas de monitorização e vigilância. Noutros cantos do globo, nações em tumulto ou envoltas num manto da censura perseguem os cidadãos negando-lhes o acesso à Web. Mais mundanamente, há pessoas que coagem e invadem a privacidade de conhecidos e familiares, vasculhando todos os cantos dos seus computadores e hábitos de navegação. Neste sentido, após o estudo das tecnologias que permitem a vigilância constante dos utilizadores da Web, foram analisadas soluções que permitem conceder algum anónimato e segurança no tráfego Web. Para suportar o presente estudo, foi efetuada uma análise das plataformas que permitem uma navegação anónima e segura e um estudo das tecnologias e programas com potencial de violação de privacidade e intrusão informática usados por nações de grande notoriedade. Este trabalho teve como objetivo principal analisar as tecnologias de monitorização e de vigilância informática identificando as tecnologias disponíveis, procurando encontrar potenciais soluções no sentido de investigar a possibilidade de desenvolver e disponibilizar uma ferramenta multimédia alicerçada em Linux e em LiveDVD (Sistema Operativo Linux que corre a partir do DVD sem necessidade de instalação). Foram integrados recursos no protótipo com o intuito de proporcionar ao utilizador uma forma ágil e leiga para navegar na Web de forma segura e anónima, a partir de um sistema operativo (SO) virtualizado e previamente ajustado para o âmbito anteriormente descrito. O protótipo foi testado e avaliado por um conjunto de cidadãos no sentido de aferir o seu potencial. Termina-se o documento com as conclusões e o trabalho a desenvolver futuramente.
Resumo:
Data leakage is a serious issue and can result in the loss of sensitive data, compromising user accounts and details, potentially affecting millions of internet users. This paper contributes to research in online security and reducing personal footprint by evaluating the levels of privacy provided by the Firefox browser. The aim of identifying conditions that would minimize data leakage and maximize data privacy is addressed by assessing and comparing data leakage in the four possible browsing modes: normal and private modes using a browser installed on the host PC or using a portable browser from a connected USB device respectively. To provide a firm foundation for analysis, a series of carefully designed, pre-planned browsing sessions were repeated in each of the various modes of Firefox. This included low RAM environments to determine any effects low RAM may have on browser data leakage. The results show that considerable data leakage may occur within Firefox. In normal mode, all of the browsing information is stored within the Mozilla profile folder in Firefox-specific SQLite databases and sessionstore.js. While passwords were not stored as plain text, other confidential information such as credit card numbers could be recovered from the Form history under certain conditions. There is no difference when using a portable browser in normal mode, except that the Mozilla profile folder is located on the USB device rather than the host's hard disk. By comparison, private browsing reduces data leakage. Our findings confirm that no information is written to the Firefox-related locations on the hard disk or USB device during private browsing, implying that no deletion would be necessary and no remnants of data would be forensically recoverable from unallocated space. However, two aspects of data leakage occurred equally in all four browsing modes. Firstly, all of the browsing history was stored in the live RAM and was therefore accessible while the browser remained open. Secondly, in low RAM situations, the operating system caches out RAM to pagefile.sys on the host's hard disk. Irrespective of the browsing mode used, this may include Firefox history elements which can then remain forensically recoverable for considerable time.
Resumo:
Universidade Estadual de Campinas . Faculdade de Educação Física
Resumo:
Approval of the Clean Development Mechanism, provided for in the Kyoto Protocol, enables countries with afforested land to trade in carbon emissions reduction certificates related to carbon dioxide equivalent quantities (CO(2-e)) stored within a certain forest area. Potential CO(2-e) above base line sequestration was determined for two forest sites on commercial eucalyptus plantations in northern Brazil (Bahia). Compensation values for silvicultural regimes involving rotation lengths greater than economically optimal were computed using the Faustmann formula. Mean values obtained were US$8.16 (MgCO(2-e))(-1) and US $7.19 (MgCO(2-e))(-1) for average and high site indexes, respectively. Results show that carbon supply is more cost-efficient in highly productive sites. Annuities of US$18.8 Mg C(-1) and US$35.1 Mg C(-1) and yearly payments of US$4.4 m(-3) and US$8.2 m(-3) due for each marginal cubic meter produced were computed for high and average sites, respectively. The estimated value of the tonne of carbon defines minimum values to be paid to forest owners, in order to induce a change in silvicultural management regimes. A reduction of carbon supply could be expected as a result of an increase in wood prices, although it would not respond in a regular manner. For both sites, price elasticity of supply was found to be inelastic and increased as rotation length moved further away from economically optimal: 0.24 and 0.27 for age 11 years in average- and high-productivity sites, respectively. This would be due to biomass production potential as a limiting factor; beyond a certain threshold value. an increase in price does not sustain a proportional change in carbon storage supply. The environmental service valuation model proposed might be adequate for assessing potential supply in plantation forestry, from a private landowner perspective, with an economic opportunity cost. The model is not applicable to low commercial value forest plantations. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
This pilot project at Cotton Tree, Maroochydore, on two adjacent, linear parcels of land has one of the properties privately owned while the other is owned by the public housing authority. Both owners commissioned Lindsay and Kerry Clare to design housing for their separate needs which enabled the two projects to be governed by a single planning and design strategy. This entailed the realignment of the dividing boundary to form two approximately square blocks which made possible the retention of an important stand of mature paperbark trees and gave each block a more useful street frontage. The scheme provides seven two-bedroom units and one single-bedroom unit as the private component, with six single-bedroom units, three two-bedroom units and two three-bedroom units forming the public housing. The dwellings are deployed as an interlaced mat of freestanding blocks, car courts, courtyard gardens, patios and decks. The key distinction between the public and private parts of the scheme is the pooling of the car parking spaces in the public housing to create a shared courtyard. The housing climbs to three storeys on its southern edge and falls to a single storey on the north-western corner. This enables all units and the principal private outdoor spaces to have a northern orientation. The interiors of both the public and private units are skilfully arranged to take full advantage of views, light and breeze.
Resumo:
This pilot project at Cotton Tree, Maroochydore, on two adjacent, linear parcels of land has one of the properties privately owned while the other is owned by the public housing authority. Both owners commissioned Lindsay and Kerry Clare to design housing for their separate needs which enabled the two projects to be governed by a single planning and design strategy. This entailed the realignment of the dividing boundary to form two approximately square blocks which made possible the retention of an important stand of mature paperbark trees and gave each block a more useful street frontage. The scheme provides seven two-bedroom units and one single-bedroom unit as the private component, with six single-bedroom units, three two-bedroom units and two three-bedroom units forming the public housing. The dwellings are deployed as an interlaced mat of freestanding blocks, car courts, courtyard gardens, patios and decks. The key distinction between the public and private parts of the scheme is the pooling of the car parking spaces in the public housing to create a shared courtyard. The housing climbs to three storeys on its southern edge and falls to a single storey on the north-western corner. This enables all units and the principal private outdoor spaces to have a northern orientation. The interiors of both the public and private units are skilfully arranged to take full advantage of views, light and breeze.
Resumo:
Objective To determine patterns of dental set-vices provided to a cohort of the insured population 18 years and over, in private general practice in New South Wales, Australia. Basic research design A cohort study using the person-years method and Poisson regression for analysis. Setting Data were derived from claims records submitted by members of a health insurance fund (Government Employees Health Fund-GEHF) for rebates during the study period 1 January 1992-31 December 1995. Participants There were 133,467 members aged 18 years and over from New South Wales. Main outcome measures To determine, by age group, for those members who used private general practice and made a claim (referred to as 'patients') the annual number of visits, total number of services received per year and number of services received at a visit, Results The mean number of visits per patient was 2.4 per year with patients under 45 years making fewer visits than the 45-54 age group reference category. Mean number of services utilised per patient-year was 5.9, with services provided increasing from 3.5 for the 18-24-year-old group, reaching a plateau of approximately 6.2 for those aged 45 years or more. The number of services received per visit was 2.4 and there were no differences by age. Service mix was dominated by restorative (35%), diagnostic (27%), and preventive services (18%); with age specific variations observed. Conclusions Age was found to be an important determinant in the use of dental services, independent of membership duration and gender.
Resumo:
Most regional programs focus on the supply side of regions, emphasizing the attraction conditions offered, such as infrastructure, labor skills, tax incentives, etc. This study analyzes one aspect of the demand side, that is, how investment decisions of private firms are made by asking the question: ""Do corporations decide the same way on investments in different parts of the territory?"" The paper analyzes the investments of 373 large Brazilian firms during 1996-2004. Based on the investment decisions of these firms, the role of sales, cash-flow, external financing, and working capital is investigated through regression analysis. The regional influence is captured by explanatory variables representing regional and firm characteristics, and by interaction dummies between the region and the main investment determinants. The results indicate significant differences across regions in the importance of investment determinants. This information is important for regional development policy, because different mechanisms should be used in different regions to foster private investments.