Browse Definitions :
Definition

Web 2.0 suicide

Contributor(s): Ivy Wigmore

Web 2.0 suicide is the deletion of information related to an individual's online persona as displayed on social networking sites, blogs and other web-based venues. People sometimes commit Web 2.0 suicide by deactivating their accounts and taking their blogs offline but there are also applications and services available to help with the process.

A free service called Web 2.0 Suicide Machine automates the process of deleting user info on Facebook, MySpace, LinkedIn and Twitter. The creators, a Netherlands-based non-profit organization called WORM, estimate that it takes 52 minutes for their script to run, as compared to nine hours and thirty-five minutes for the average user to delete information manually.

Here's what the Web 2.0 Suicide Machine does on Facebook:

  • Logs into the user's account.
  • Changes the password and profile picture.
  • Arranges for the account to be inaccessible through public search.
  • Removes any email notifications.
  • Removes all user's friends.
  • Removes user from any groups.
  • Removes the user's wall posts
  • Joins the user to the "Social Network Suiciders" Facebook group.
  • Logs out.

The Suicide Machine website describes the technology:

The machine consists of a tweaked Linux server running Apache2 with Python modules installed. Selenium RC Control is used to automatically launch and kill browser sessions. This is all driven by a single Python/CGI script with some additional self-written Python libraries.

Each user can watch her suicide action in real-time via a VNC remote desktop session, displayed on our website via a Flash applet rendered live into the client's webbrowser. We are also running some customized bash scripts plus MySQL in the background for logging and debugging, jquery/PHP for the website and a modified version of the great FlashlightVNC application built in Flex.

See an introductory video:

This was last updated in August 2012

Continue Reading About Web 2.0 suicide

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • brute force attack

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted ...

  • spyware

    Spyware is software that is installed on a computing device without the user's knowledge. Spyware can be difficult to detect; ...

  • ATM black box attack

    An ATM black box attack, also referred to as jackpotting, is a type of banking-system crime in which the perpetrators bore holes ...

SearchHealthIT

SearchDisasterRecovery

  • business continuity and disaster recovery (BCDR)

    Business continuity and disaster recovery (BCDR) are closely related practices that describe an organization's preparation for ...

  • warm site

    A warm site is a type of facility an organization uses to recover its technology infrastructure when its primary data center goes...

  • disaster recovery (DR) test

    A disaster recovery test (DR test) is the examination of each step in a disaster recovery plan as outlined in an organization's ...

SearchStorage

  • disk array

    A disk array, also called a storage array, is a data storage system used for block-based storage, file-based storage or object ...

  • enterprise storage

    Enterprise storage is a centralized repository for business information that provides common data management, protection and data...

  • optical storage

    Optical storage is any storage type in which data is written and read with a laser. Typically, data is written to optical media, ...

Close