EBLOCKER pro User Manual page 79

Hide thumbs Also See for pro:
Table of Contents

Advertisement

the so called "malware" in short. Not every malware is immediately noticed (or at all). The best way to
protect yourself from malware is to keep your system as up to date as possible; no opening of
suspicious emails that are send from dubious sources; using the latest antivirus program and of
course, using your eBlocker.
Network mask
With help of the IP address the network mask defines which other IP addresses belong to the local
net. That means which addresses can be reached directly. All other IP addresses that do not belong
to one network mask, do not belong to the local network and can only be reached through the router.
Price discrimination
Price discrimination describes a price policy on the Internet, where you get different prices for the
same product depending on from which device you want to buy the product. The price is set
dynamically according to the known data of the user with the aim to maximize their revenue.
Referrer
If you open a website, your browser sends you an according request for the website you want to visit.
This request not only contains the URL, but also many other meta-files for requests. Amongst other
things the browser transmits from which website the new request was send from. This indication is
called „HTTP-referrer" or in short „referrer".
It has the legitimate right, to see insights which sites have been visited by the user and thus can
optimize their offers accordingly. The referrer can also be used in a comprehensive way, so
personality profiles can be created and connected.
Tor Network
The Tor network is used to disguise your original IP address and to provide anonymous Internet
surfing. Suppose you have a certain page you want to visit and therefore you enter the URL into the
web browser. Your IP address is sent directly to the page you want to visit. However, if you use Tor,
you will be directed into the Tor network, which is made out of many other IP addresses from different
computers. The Tor network will send an IP address to the page that it chooses randomly out of all
the other IP addresses floating around the Tor network. This is how your real IP address is disguised.
Tracker – Data collector
Most of the time trackers are service providers for advertising industries. Every time a user opens a
site that is being tracked, the tracker gets a notification that a user has been tracked successfully.
Through according cookies or other techniques, the tracker can recognize the user even through
many different websites again and again and thus generate a detailed protocol of the Internet
behavior. All trackers make their money by providing these personality profiles to advertising
industries. The advertising industries can now generate target oriented advertisement and place them
on sites that are visited frequently by the user.
openPVN
OpenVPN is an open-source software application that implements virtual private network (VPN)
techniques for creating secure connection.
VPN
A virtual private network (VPN) extends a private network across a public network, and enables users
to send and receive data across the public network as if their computing devices were directly
connected to the private network.
17.10.2017
Page 79 of 81

Advertisement

Table of Contents
loading

This manual is also suitable for:

Family

Table of Contents