Previous Slide


HTTP Protocol Headers

Next Slide

MANY TCP-BASED INTERNET PROTOCOLS USE "HEADERS" TO COMMUNICATE EXTRA INFORMATION.

Received: from localhost by colrain.williams.edu
 (5.65v4.0/1.1.8.2/16Jul96-0543PM) id AA06083; 
  Mon, 07 Dec 1998 17:21:12 -0500
Date: Mon, 07 Dec 1998 17:21:12 -0500 (EST)
From: Mark Ouillette <Mark.Ouillette@williams.edu>
Subject: CSCI 434 coursebooks
To: Tom Murtagh <Thomas.P.Murtagh@williams.edu>
MIME-version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Content-Length: 634



The Web:
Technologies and
Techniques


Links to other course pages:


Williams College
Department of Computer Science
This page is part of a section of lecture slides related to " Data Gathering vs. Privacy " within the topic "Privacy Issues and Encryption". Other slides within this section and other sections of slides for the topic "Privacy Issues and Encryption" can be accessed using the links below.
  • Electronic Privacy Threats
  • Internet Eavesdropping
  • Who can you Trust?
  • Secure Web Communications
  • Traditional Cryptography
  • Encryption Basics
  • Cryptographic Notation
  • The Caesar Cipher
  • Key-based Encryption Schemes
  • Generalizing the Caesar Cipher
  • More Notation
  • Key Properties
  • Vigenere Cypher
  • Vigenere Cypher (cont.)
  • The Key Distribution Problem
  • Public Key Cryptography
  • Public Key Cryptography
  • Public Key Distribution
  • The RSA Cryptosystem
  • Some Details of the RSA Cryptosystem
  • Some Details of the RSA Cryptosystem (cont.)
  • Properties of the RSA Cryptosystem
  • Authentication
  • Authentication
  • Authentication and the Internet
  • Authentication and Cryptography
  • Digital Signatures?
  • Digital Signatures (cont.)
  • Authenticity with Secrecy
  • Certifying Authorities
  • Certifying Authorities (cont.)
  • Data Gathering vs. Privacy
  • "Passive" Privacy Threats
  • HTTP Protocol Headers
  • Server Response Headers
  • Web Browser Headers
  • What are "Magic Cookies"?
  • Magic Cookies
  • Data Mining
  • Passive Privacy and Encryption Techniques
  • Digital Cash
  • Anonymous Internet Financial Transactions
  • Commutative Encryption
  • Blank Bills
  • Withdrawal Symptoms
  • Making Money
  • A Spending Spree