No secrets at all ...

1. The truth about Cookie's ...
2. See, what information I can gather about your system ...
3. And how I and every one else could hack your system ...
4. Check the SECURITY of YOUR connection to the Internet ...
5. A Virus List (german) regularly updated and very accurate ...

Cookies are a general mechanism which server side connections can use to store and retrieve information on the client side of the connection. The addition of a simple, persistent, client-side state significantly extends the capabilities of Web-based client/server applications. The state object is called a Cookie, for no compelling reason. A Cookie is introduced to the client by including a Set-Cookie header as part of an HTTP response (Netscape System Development) ... uff ...

Have you got that ...

But in fact, internet Cookies are incredibly simple. Cookies are small files measuring a maximum of 4KB of text information which is either stored on the user/ client hard drive, or in memory until the browser is closed. Commonly Cookies are saved in the Windows/Cookies directory (for Microsoft Internet Explorer) or in the Users folder (for Netscape Navigator). Each Cookie is unique, it only refers to the site that issued it in the first place.

People sometimes are a bit paranoid about Cookies for a few reasons: fear of the unknown, privacy concerns, and rumors of unethical or illegal activities.

But Cookies are not a program, and it cannot "do" anything. A web site can retrieve only the information that it has placed on your machine. It cannot retrieve information from other Cookie files, nor any other information from your machine.

At its most basic, a Cookie serves to identify a user at a site and can store individual preferences or a record of any content viewed whilst you were there and is therefore used to general Website Tracking and user Customization ...

Although, a trivial piece of JavaScript could defeat entirely the Platform for Privacy Preferences (P3P) the famous "Cookie protections system" Microsoft has integrated into Internet Explorer 6, all because of a dodgy "feature" in Windows Media Player (WMP). According to privacy advocate Richard M. Smith, WMP generates by default a serial number which can be grabbed by a Web site using the simple exploit. The number can be used as a "super cookie", as Smith calls it, enabling a nosey third party to track a victim's on-line comings and goings regardless of their cookie handling rules. Even if all cookies are deleted and privacy policy set to reject them, the WMP number can be used to track users because it's stored in the Windows Registry. It can be read with a simple ClientID request (see your WMP ClientID below). Once the WMP ClientID number is available to a JavaScript program, it can be sent back to a Web site either by appending it to the URL of a Web bug or storing it in a regular Web browser cookie.

But at the moment, don't be too concerned about this ... these things are in the open and will be monitored very closely .. there are actually other things you should really be concerned of, by using the Web.

First, see what information I can easily gather about your system ...

Your WMP ClientID:

Your CPU Class is:
Your Operating System is:
The Application code of your browser is:
Browser Language is:
You have visited:
Previous Page visited:
Your Javascript Version:
Hmm, Cookies?
Java Enabled:
You Have Been Here:
Host name / IP address:
Current Resolution:
Max Resolution:
Color Depth: bit
Number of Colors:
Anti-aliasing fonts:
You Have The Following Plugins Installed:


How I and every one else could hack your system ...

Since I don't have the right equipment (neither software, computer or mind) to hack your computer, there is no danger from here. But did you know, that your browser is capable to communicate and exchange data (your data) with any computer connected to the "Net", without your knowledge ... and did you know, that any of these computers could actually plant software in your system which could monitor your doings, format your harddisk or attack other systems ... why is that ... you might ask ... because you allow it. Millions of people are using a stand alone home computer with a fully (but silly) integrated network operating system ... which is completely unnecessary and very dangerous. Who needs file- and printer sharing on a home computer and what is the benefit of a log-in and log-out procedure when you are merely the only user. A network is a very complex system and difficult to know and to understand (for the most of us anyway) and therefore should be supervised by knowledgeable people and not distributed to every one without precaution. And that's exactly what Microsoft is always doing. Distributing complex stuff, completely unnecessary, to people who don't know what to think about it ... only, because it sounds cool, advertises great and therefore sells better. First glimpse of what's going on and where the danger lies could be experienced through email viruses like Melissa and so on and that was only the beginning (search the Web for: "Virus construction kits" and you'll see what I mean). And now, Microsoft again steps ahead and ships WindowsXP (for every one) with "Full Raw Socket" support. "Full Raw Socket" means, accessing a network system direct on the most basic system layer and therefore bypassing all the identification and security layers ... well done ... and again, this is utterly and totally unnecessary and totally dangerous. At least, the hacker community will be happy and grateful. They will have millions of useful (vulnerable) systems at hand to knock down virtually every major server all over the world with a DDoS (Distributed Denial of Service) attack, triggered by a simple: "At your finger tip" action. And, thanks "Full Raw Socket" and the wisdom of Microsoft, can't neither be traced, prevented or stopped. Oh, the Redmont people do their very best, and ship WindowsXP with a integrated firewall protection ... well done ... I should say ... but for me, that's like distributing guns with ammunition together with a bullet proof vest, to tackle the obvious danger. And, to stick with this little example further ... the bullet proof vest will certainly look great ... but imagine ... 60'000 bugs in it ... I know WindowsXP is and will not be the only Operating system out there with such a "Full Raw Socket" implementation. Windows2000, Linux and all the Unix systems have it ... but these are, by all means, very mature network operating systems with a well defined "user/system operator" hierarchy (requirement for "root" privilege), where normal user rights are deliberately restricted. System operators, on the other hand, are usually quite responsible and very knowledgeable people whose philosophies are rather in building up then destroying. The hunters and professional gun men, who handle such powerful tools with greater consideration (I suppose) then the lot of script kiddies and gang-lander who can't wait to get their hands on such weaponry.

Read more about the real threats, their difficult consequences ... and even some solutions, in Steve Gibsons fantastic Web-Site (Gibson Research Corporation at: http://www.grc.com). He has also built a powerful and widely recognized network scanner which you should use frequently, to see how (in)secure your internet connection really is ... I promise, you will be horrified.

Steve Gibsons network scanner is not available at the moment, you can use
"Sygate Online Services" instead.

Click here for system ports scan ... <br>the results will be returned in about 40 Sec.
Click here for system ports scan ...
the results will be returned in about 40 Sec."
Note. There is virtually no risk involved ...

Geographic Distribution of attack sources of the last 5 days:
Click here for more