Security Verification in Web Browser Extensions

Author(s):  
Chinmay Agarwal ◽  
Medhavini Kulshrestha ◽  
Himanshu Rathore ◽  
Kamalakannan J
Author(s):  
Tiancheng Cao

This paper investigates web browser extensions as an under-researched media object for their capacity for activism. “Activist extensions” disrupt a webpage’s intended use and redirect users’ attention to social issues by modifying textual, visual, or auditory elements of the web user interface. The relevance of the study stems from the ubiquity of the web browser as a communication tool and the potential of browser extensions to counter its power in shaping how web content is delivered to users. Based on the notions of transduction and affordance, the critical vocabulary of the Situationist International, and the conceptualization of platform governance through the provision of infrastructural services, this paper asks: Through what mechanism do activist extensions redirect users’ attention to social issues? What are the potential implications for users? And, how can browser platforms affect the creation and distribution of activist extensions? The study adopts a mixed-methods approach that includes discursive interface analysis of the extensions’ modification of the browser interface, critical discourse analysis of user comments on these extensions, and semi-structured interviews with extension developers. Major findings of the study include: 1) the redirection of users’ attention from the webpage to social issues is achieved through the mechanism of $2 , 2) activist extensions function as $2 that provides users with a coping mechanism against certain online rhetoric, and 3) the creation and distribution of activist extensions are conditioned by an $2 imposed by the browser platform on extension developers.


2001 ◽  
Vol 44 (2) ◽  
pp. 45-50 ◽  
Author(s):  
David M. Martin ◽  
Richard M. Smith ◽  
Michael Brittain ◽  
Ivan Fetch ◽  
Hailin Wu

Author(s):  
Annette Bailey ◽  
Godmar Back

LibX is a platform that allows libraries to create customized web browser extensions that simplify direct access to library resources and services. LibX provides multiple user interfaces, including popups, context menus, and contextualized cues to direct the user’s attention to these resources. LibX is supported by two toolbuilder applications - the Edition Builder and the LibApp Builder – which allow anyone to create, manage, and share LibX configurations and applications. These tools automate the process of software creation and distribution, allowing librarians to become software distributors. This chapter provides background and history of the LibX project, as well as in-depth analysis of the design and use of the LibX Edition Builder that has helped enable its success.


2015 ◽  
Vol 1 (1) ◽  
pp. 37-45
Author(s):  
Irwansyah Irwansyah ◽  
Hendra Kusumah ◽  
Muhammad Syarif

Along with the times, recently there have been found tool to facilitate human’s work. Electronics is one of technology to facilitate human’s work. One of human desire is being safe, so that people think to make a tool which can monitor the surrounding condition without being monitored with people’s own eyes. Public awareness of the underground water channels currently felt still very little so frequent floods. To avoid the flood disaster monitoring needs to be done to underground water channels.This tool is controlled via a web browser. for the components used in this monitoring system is the Raspberry Pi technology where the system can take pictures in real time with the help of Logitech C170 webcam camera. web browser and Raspberry Pi make everyone can control the devices around with using smartphone, laptop, computer and ipad. This research is expected to be able to help the users in knowing the blockage on water flow and monitored around in realtime.


Author(s):  
Elly Mufida ◽  
David Wardana Agus Rahayu

The VoIP communication system at OMNI Hospital Alam Sutera uses the Elastix 2.5 server with the Centos 5.11 operating system. Elastix 2.5 by the developer has been declared End of Life. The server security system is a serious concern considering that VoIP servers can be accessed from the internet. Iptables and fail2ban applications are applications that are used to limit and counteract those who try to attack the VoIP server. One application that can be used as an open source VoIP server is the Issabel Application version 4.0. The migration process from Elastix 2.5 application to Issabel 4.0 by backing up all configurations in the Elastix 2.5 application through a web browser including the configuration of endpoints, fax, e-mail, asterisk. After the backup file is downloaded then upload the backup file to the Issabel 4.0 application then run the migration process. Adding a backup path as a failover connection is needed because the VoIP communication protocol between the OMNI Hospitals Group still uses one path so that when there is a problem in the connection path, the communication protocol will stop. The tunnel EoIP is a protocol used as a backup path between the OMNI Hospitals Group site.


2016 ◽  
Vol 10 (1) ◽  
Author(s):  
Novan Adi Musthofa, Siti Mutrofin, Mohamad Ali Murtadho

Dengan berkembangnya teknologi informasi, sering sekali terjadi penyelewengan dokumen terutama pada dokumen-dokumen cetak. Dokumen merupakan salah satu data yang sangat penting, karena dokumen merupakan sumber informasi yang diperlukan oleh suatu instansi, organisasi, negara, maupun individu. Tanpa dokumen, maka seseorang akan kehilangan data-data yang diperlukan untuk kegiatan di masa yang akan datang. Pemalsuan dokumen sangat mudah dilakukan dengan cara meniru bentuk serta isi dari suatu dokumen. Penelitian sebelumnya pernah dilakukan, namun dalam objek yang berbeda. Pemalsuan dokumen dapat diatasi dengan menggunakan Quick Response (QR) Code. QR Code mampu menyimpan semua jenis data, seperti data angka/numerik, alphanumeric, biner, kanji/kana. Selain itu QR Code memiliki tampilan yang lebih kecil daripada barcode. Untuk dapat membuat QR Code suatu dokumen maka dibuatlah sebuah aplikasi yaitu aplikasi Validasi Dokumen. Aplikasi Validasi Dokumen dirancang dengan menggunakan metode waterfall serta menggunakan perancangan Unified Modelling Language (UML). Bahasa pemrograman yang digunakan yaitu bahasa pemrograman PHP: Hypertext Preprocessor (PHP) dengan database MySQL. Sebelum QR Code dibuat, terlebih dahulu data dokumen dienkripsi dan kemudian dijadikan QR Code. Hasil pemindaian QR Code berupa Uniform Resource Locator (URL) yang mengarah pada data dokumen. Ketika URL dijalankan pada web browser, sistem melakukan deskripsi pada URL, kemudian dicocokkan dengan database, dan selanjutnya ditampilkan ke web browser. Hasil akhir aplikasi Validasi Dokumen berupa QR Code yang digunakan untuk menyimpan URL yang  menunjukkan bahwa dokumen memang benar-banar dokumen yang resmi (bukan ilegal) dari suatu instansi. Pada uji coba penelitian ini juga dilakukan perbandingan kinerja dengan 3 aplikasi yang sejenis, 3 aplikasi pembanding tersebut dipilih karena memiliki hasil visual QR Code yang hampir mirip, namun jika dilakukan scanning memiliki hasil yang berbeda, karena fiturnya juga berbeda. Berdasarkan hasil pengujian dengan 3 pembanding aplikasi yang sejenis, dengan menggunakan aplikasi yang diusulkan dalam penelitian ini, pemalsuan dokumen dapat dihindari dengan menggunakan aplikasi Validasi Dokumen selama tidak ada ikut campur orang dalam (superadmin/admin) dalam melakukan praktik pemalsuan dokumen. Pada penelitian selanjutnya dapat dilakukan perbaikan kelemahan aplikasi ini, yaitu agar tidak menampilkan URL, namun hasil pemindai QR Code, langsung dapat menampilkan detail isi dokumen.


Sign in / Sign up

Export Citation Format

Share Document