Type of site | Online database |
---|---|
Available in | English |
Created by | Guy King |
URL | bugmenot |
Registration | None |
Launched | August 2003 |
BugMeNot is an Internet service that provides usernames and passwords allowing Internet users to bypass mandatory free registration on websites. It was started in August 2003 by an anonymous person, later revealed to be Guy King, [1] and allowed Internet users to access websites that have registration walls (for instance, that of The New York Times ) with the requirement of compulsory registration. This came in response to the increasing number of websites that request such registration, which many Internet users find to be an annoyance and a potential source of email spam. [2]
BugMeNot allows users of their service to add new accounts for sites with free registration. It also encourages users to use disposable email address services to create such accounts. However, it does not allow them to add accounts for paid websites, as this could potentially lead to credit card fraud. [3] BugMeNot also claims to remove accounts for any website, requesting that they do not provide accounts for non-registered users.
To help make access to their service easier, BugMeNot hosts a bookmarklet that can be used with any browser to automatically find a usable account from their service. They also host extensions for the web browsers Mozilla Firefox (but not on Firefox quantum yet), Internet Explorer, and Google Chrome (the extensions were created by Eric Hamiter with Dmytri Kleiner and Dean Wilson, respectively).[ citation needed ] There are also implementations in the form of a BugMeNot Opera widget, or UserJS scripts along with buttons, which makes it fully browser-integrated. An Android application is also available. [4]
BugMeNot provides an option for site owners to block their site from the BugMeNot database, if they match one or more of the following criteria: [5]
No option is provided for users to request removing a block if a site ceases to meet the blocking criteria or has never met them in the first place.
Site blocking can be circumvented by BugMeNot users by publishing usernames and passwords under a similar, but different, domain name to which they apply. For example, the owners of the domain abc.def.com might request a block to be put in place, but this will not prevent users uploading access information under the name of def.abc.com. Since one domain owner cannot demand that another domain be blocked, the information remains and is accessibly provided that BugMeNot users tacitly agree that def.abc.com in fact refers to abc.def.com.[ original research? ] For example, Wikipedia logins are in the database under wikipedia.net because wikipedia.com and wikipedia.org have been banned under the first criterion. [6]
Nearly a year after it was created, BugMeNot was shut down temporarily by its service provider (at that time), HostGator. The site's creator claimed BugMeNot's host was pressured by websites to shut them down, though Hostgator claimed that the BugMeNot site was repeatedly crashing their servers. [7]
The BugMeNot domain was transferred briefly to another hosting company, dissidenthosting.com, but before the site was set up, it began to redirect visitors to web pages belonging to racist groups, without the knowledge or consent of the site's owner. BugMeNot moved again, to NearlyFreeSpeech.NET. BugMeNot's move to this provider, which also hosts a number of highly controversial sites, prompted BugMeNot's creator to say, "Personally, I don't care if I'm sharing a server with neo-Nazis. I might not agree with what they have to say, but the whole thing about freedom of speech is that people are free to speak." [8]
Shortly after BugMeNot returned, reports surfaced that some news sites had begun to attempt to block accounts posted on BugMeNot, though the extent and effectiveness of such efforts, as well as compliance with BugMeNot's Terms of Use, [9] are not known.
The operators of BugMeNot expanded the "MeNot" network in October 2006 with the addition of RetailMeNot – a service for finding and sharing online coupon codes. Users can add coupons they have found through any method, as well as a description of the coupon and an expiration date. Users can also scan in printed coupons and upload them for others to print.
Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext Transfer Protocol (HTTP). It uses encryption for secure communication over a computer network, and is widely used on the Internet. In HTTPS, the communication protocol is encrypted using Transport Layer Security (TLS) or, formerly, Secure Sockets Layer (SSL). The protocol is therefore also referred to as HTTP over TLS, or HTTP over SSL.
A web browser is an application for accessing websites. When a user requests a web page from a particular website, the browser retrieves its files from a web server and then displays the page on the user's screen. Browsers are used on a range of devices, including desktops, laptops, tablets, and smartphones. By 2020, an estimated 4.9 billion people had used a browser. The most-used browser is Google Chrome, with a 66% global market share on all devices, followed by Safari with 18%.
The File Transfer Protocol (FTP) is a standard communication protocol used for the transfer of computer files from a server to a client on a computer network. FTP is built on a client–server model architecture using separate control and data connections between the client and the server. FTP users may authenticate themselves with a plain-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that protects the username and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol (SFTP).
In the context of an HTTP transaction, basic access authentication is a method for an HTTP user agent to provide a user name and password when making a request. In basic HTTP authentication, a request contains a header field in the form of Authorization: Basic <credentials>
, where <credentials>
is the Base64 encoding of ID and password joined by a single colon :
.
Netscape Browser is the eighth major release of the Netscape series of web browsers, now all discontinued. It was published by AOL, but developed by Mercurial Communications, and originally released for Windows on May 19, 2005.
Digest access authentication is one of the agreed-upon methods a web server can use to negotiate credentials, such as username or password, with a user's web browser. This can be used to confirm the identity of a user before sending sensitive information, such as online banking transaction history. It applies a hash function to the username and password before sending them over the network. In contrast, basic access authentication uses the easily reversible Base64 encoding instead of hashing, making it non-secure unless used in conjunction with TLS.
Anti-phishing software consists of computer programs that attempt to identify phishing content contained in websites, e-mail, or other forms used to accessing data and block the content, usually with a warning to the user. It is often integrated with web browsers and email clients as a toolbar that displays the real domain name for the website the viewer is visiting, in an attempt to prevent fraudulent websites from masquerading as other legitimate websites.
The usage share of web browsers is the portion, often expressed as a percentage, of visitors to a group of web sites that use a particular web browser.
The Mozilla Application Suite is a discontinued cross-platform integrated Internet suite. Its development was initiated by Netscape Communications Corporation, before their acquisition by AOL. It was based on the source code of Netscape Communicator. The development was spearheaded by the Mozilla Organization from 1998 to 2003, and by the Mozilla Foundation from 2003 to 2006.
A proxy auto-config (PAC) file defines how web browsers and other user agents can automatically choose the appropriate proxy server for fetching a given URL.
HTTP cookies are small blocks of data created by a web server while a user is browsing a website and placed on the user's computer or other device by the user's web browser. Cookies are placed on the device used to access a website, and more than one cookie may be placed on a user's device during a session.
Server Name Indication (SNI) is an extension to the Transport Layer Security (TLS) computer networking protocol by which a client indicates which hostname it is attempting to connect to at the start of the handshaking process. The extension allows a server to present one of multiple possible certificates on the same IP address and TCP port number and hence allows multiple secure (HTTPS) websites to be served by the same IP address without requiring all those sites to use the same certificate. It is the conceptual equivalent to HTTP/1.1 name-based virtual hosting, but for HTTPS. This also allows a proxy to forward client traffic to the right server during TLS/SSL handshake. The desired hostname is not encrypted in the original SNI extension, so an eavesdropper can see which site is being requested. The SNI extension was specified in 2003 in RFC 3546
In computing, a blacklist, disallowlist, blocklist, or denylist is a basic access control mechanism that allows through all elements, except those explicitly mentioned. Those items on the list are denied access. The opposite is a whitelist, allowlist, or passlist, in which only items on the list are let through whatever gate is being used. A greylist contains items that are temporarily blocked until an additional step is performed.
The Public Suffix List (PSL) is a community-maintained list of rules that describe the internet domain name suffixes under which independent organisations can register their own sites. Entries on the list are referred to as effective top-level domains (eTLDs), and contain commonly used suffixes like com, net and co.uk, as well as private suffixes like appspot.com and github.io.
Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts. There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript fetch or XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser. In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.
Browser security is the application of Internet security to web browsers in order to protect networked data and computer systems from breaches of privacy or malware. Security exploits of browsers often use JavaScript, sometimes with cross-site scripting (XSS) with a secondary payload using Adobe Flash. Security exploits can also take advantage of vulnerabilities that are commonly exploited in all browsers.
Mozilla is a free software community founded in 1998 by members of Netscape. The Mozilla community uses, develops, publishes and supports Mozilla products, thereby promoting exclusively free software and open standards, with only minor exceptions. The community is supported institutionally by the non-profit Mozilla Foundation and its tax-paying subsidiary, the Mozilla Corporation.
IronVest, is a browser extension biometric fraud prevention company that develops and markets fraud prevention products for consumers and businesses, founded in 2022. The IronVest consumer security and privacy app and browser extension evolved from Blur, a privacy product designed to block trackers and provide masking tools, developed by Abine, a privacy company headquartered in Boston, Massachusetts, and first released for Firefox in March 2011. There is a free version, and a paid one with more features.
Credential Management, also referred to as a Credential Management System (CMS), is an established form of software that is used for issuing and managing credentials as part of public key infrastructure (PKI).
Firefox Lockwise is a deprecated password manager for the Firefox web browser, as well as the mobile operating systems iOS and Android. On desktop, Lockwise was simply part of Firefox, whereas on iOS and Android it was available as a standalone app.