Predavanja

 

90 let Pokrajinskega arhiva Maribor – arhivi nekoč in danes

Predavateljica bo predstavila 90. letno tradicijo formalnega zbiranja, hranjenja in varovanja arhivskega gradiva v Mariboru, razvoj arhivskega dela in dela z uporabniki arhivskega gradiva. Pomen dela arhivov skozi leta sicer ostaja enak, spreminjajo pa se načini dela in podajanja informacij tistim, ki le-te potrebujejo. 90 let delovanja je zaznamovalo mnogo sprememb, predvsem pa razvoja arhivske dejavnosti, ki se v modernih časih sooča z izzivi digitalne družbe. Arhivi nismo več le institucije, ki hranijo in varujejo arhivsko gradivo, v času digitalnega poslovanja moramo biti v življenjskem ciklu dokumentov prisotni že veliko prej in tako varovati arhivsko gradivo že v času njegovega nastanka.

Nina Gostenčnik
Pokrajinski arhiv Maribor
Četrtek, 11.04.2024
13:30 - 14:00
O predavatelju

AI in Cybersecurity and vice versa

AI has become a hot topic over last 2 years and cyber security has not been an exception. AI will influence the cyber security in many aspects and we keep hearing about this on a daily basis. However, we do not hear a lot on cyber security within the AI. This talk will cover basic stuff about the AI, how it influences cyber security processes, but also how the cyber security principles should be applied while building AI.

Jurica Čular
Infobip
Petek, 12.04.2024
09:00 - 09:30
O predavatelju

Combating Targeted Ransomware Through Threat Hunting

This presentation will focus on understanding APT attacks & targeted ransomware attacks, why your security is failing you and lastly, the step-by-step guide to implement continous threat hunting in your organizations to combat these attacks.

Amr Thabet
MalTrak
Petek, 12.04.2024
13:30 - 14:00
O predavatelju

CTI Monitoring - Dark Web & InfoStealers: Uncovering Threats and Safeguarding Data

In an era where cyber threats are constantly evolving, organisations face significant challenges in securing their digital assets and sensitive information. This presentation delves into the realm of Cyber Threat Intelligence (CTI) monitoring, with a particular focus on the Dark Web and InfoStealers.
The Dark Web, an obscure underworld of the internet, harbors malicious actors who exploit vulnerabilities, trade stolen data, and launch cyber attacks. Understanding the intricacies of this hidden ecosystem is crucial for preemptively countering threats. Equally important is comprehending the techniques employed by InfoStealers, a class of malware designed to pilfer sensitive information from unsuspecting victims.
During this presentation, we will explore the methods employed by threat actors to operate within the Dark Web and distribute InfoStealers. We will delve into the Dark Web's structure, the types of illicit activities it facilitates, and how cybercriminals exploit its anonymity to their advantage. Furthermore, we will examine the inner workings of InfoStealers, analyzing their capabilities, infection vectors, and the wide-ranging consequences of their successful deployment.
We will outline effective strategies for CTI monitoring that organisations can implement to detect and mitigate Dark Web threats and InfoStealer attacks. We will explore the tools and techniques used to monitor and analyse the Dark Web.
Attendees of this presentation will gain a deeper understanding of the risks posed by the Dark Web and InfoStealers, and how CTI monitoring can play a pivotal role in mitigating those risks. Armed with this knowledge, organisations can bolster their security posture, proactively identify potential breaches, and fortify their defenses against emerging cyber threats.
Join us in this informative session as we shine a light on the dark underbelly of the internet and empower organisations to safeguard their critical data and infrastructure in an increasingly dangerous digital landscape.

Catalin Curelaru
Visma
Petek, 12.04.2024
10:00 - 10:30
O predavatelju

Defending Cloud Computing from DDoS Attacks: Effective Strategies and Techniques

Cloud computing has revolutionized the way businesses operate by providing scalable and cost-effective solutions. However, with the increasing reliance on cloud services, the risk of Distributed Denial of Service (DDoS) attacks has also grown. These attacks can disrupt the availability of cloud resources, leading to significant financial and reputational damage for organizations.

A DDoS attack occurs when multiple compromised systems flood a target system or network with a massive amount of traffic, overwhelming its capacity to handle legitimate requests. This flood of traffic can cause service disruptions, slow down network performance, and even render the targeted system completely inaccessible.

There are several types of DDoS attacks, including:

  • Volumetric Attacks: These attacks aim to consume the target's bandwidth by flooding it with a high volume of traffic.
  • Protocol Attacks: These attacks exploit vulnerabilities in network protocols, such as TCP/IP, to exhaust system resources.
  • Application Layer Attacks: These attacks target specific applications or services, overwhelming them with malicious requests.

Proactive mitigation strategies focus on preventing DDoS attacks before they can cause any damage.
Let's explore some effective proactive approaches:

  • Network-Level Defenses
    Network-level defenses involve implementing measures at the network infrastructure level to detect and mitigate DDoS attacks. These defenses include:
    - Firewalls: Firewalls act as a barrier between the internal network and external threats. They can be configured to block suspicious traffic and prevent DDoS attacks.
    - Intrusion Detection and Prevention Systems (IDPS): IDPS solutions monitor network traffic for potential DDoS attack patterns and take immediate action to mitigate the threat.
    - Rate Limiting: Rate limiting restricts the amount of incoming traffic from specific sources, preventing the network from becoming overwhelmed.
  • Traffic Filtering:
    Traffic filtering involves analyzing network traffic and filtering out malicious requests. This can be done using various techniques:
    - IP Whitelisting: Whitelisting allows only trusted IP addresses to access the network, blocking traffic from potential attackers.
    - Blacklisting: Blacklisting blocks traffic from known malicious IP addresses or ranges.
    - Deep Packet Inspection (DPI): DPI examines the contents of network packets to identify and block malicious traffic.

  • Reactive Mitigation Strategies:
    Reactive mitigation strategies focus on responding to DDoS attacks as they occur. While they may not prevent the attack entirely, they aim to minimize the impact and ensure service availability:

  • Cloud-Based DDoS Protection Services
    Cloud-based DDoS protection services provide an additional layer of defense by diverting traffic through their infrastructure. These services have the capacity to absorb and filter out malicious traffic, allowing legitimate traffic to reach the target system.

  • Resource Scaling
    Resource scaling involves dynamically adjusting the resources allocated to a system based on the current demand. In the case of a DDoS attack, scaling up resources can help absorb the excess traffic and maintain service availability.
  • Incident Response Planning
    Having a well-defined incident response plan is crucial for effectively mitigating DDoS attacks. This plan should outline the steps to be taken during an attack, including communication channels, roles and responsibilities, and coordination with third-party security providers.

DDoS attacks pose a significant threat to cloud computing environments. By implementing a combination of proactive and reactive mitigation strategies, organizations can strengthen their defenses and minimize the impact of such attacks. Network-level defenses, traffic filtering, cloud-based protection services, resource scaling, and incident response planning all play crucial roles in safeguarding cloud resources and ensuring uninterrupted service availability.
Remember, staying updated with the latest security practices and collaborating with experienced security professionals can further enhance your organization's ability to defend against evolving DDoS threats in the cloud computing landscape.

Ismail Ahmed
Yalla-Hack
Petek, 12.04.2024
13:00 - 13:30
O predavatelju

Evropska denarnica za digitalno identiteto

V kratkem se pričakuje sprejem nove EU Uredbe Evropskega parlamenta in Sveta o spremembi Uredbe (EU) št. 910/2014 v zvezi z vzpostavitvijo okvira za evropsko digitalno identiteto, ki prinaša evropsko denarnico za digitalno identiteto. Evropska denarnica naj bi postala univerzalno sredstvo elektronske identifikacije, njena uporaba pa naj bi omogočala tudi dostop do zaupanja vrednih dokazil oz. atributov o imetniku denarnice. Prve evropske denarnice se pričakujejo konec leta 2026, že sedaj pa potekajo na ravni Evropske komisije tehnične priprave za uvedbo teh denarnic. Ministrstvo za digitalno preobrazbo v ta namen sodeluje tudi v pilotnem projektu velikih razsežnosti POTENTIAL, v okviru katerega se načrtuje vzpostavitev evropske denarnice in testiranje njene uporabe za elektronske storitve v javni upravi.

dr. Alenka Žužek Nemec
MINISTRSTVO ZA DIGITALNO PREOBRAZBO
Četrtek, 11.04.2024
14:00 - 14:30
O predavatelju

Implementacija EU Uredbe za vzpostavitev enotnega digitalnega portala (SDG)

Uredba (EU) 2018/1724 Evropskega Parlamenta in Sveta o vzpostavitvi enotnega digitalnega portala za zagotavljanje dostopa do informacij, do postopkov ter do storitev za pomoč in reševanje težav (angl. Single Digital Gateway Regulation, v nadaljevanju uredba SDG) je stopila v veljavo decembra 2018. Namen uredbe je poenostaviti ljudem in podjetjem gibanje znotraj Evropske unije in medsebojno poslovanje ter omogočiti večji izkoristek potenciala notranjega evropskega trga.
Ključni cilj uredbe je vzpostaviti enotni digitalni portal Your Europe/Tvoja Evropa, ki povezuje nacionalne spletne kontaktne točke vseh držav članic EU. Te nacionalne spletne točke morajo skupaj z Evropsko komisijo implementirati vse zahteve uredbe SDG, med drugim tudi vzpostavitev sistema za izmenjavo dokazil med državami po načelu »samo enkrat«.
Skozi portal Your Europe bodo lahko državljani in podjetja dostopali do bistvenih informacij in elektronskih storitev za uveljavljanje svojih pravic na enotnem digitalnem trgu EU. Vzpostavitev sistema »samo enkrat« pa bo podjetjem in državljanom prihranila tudi čas in denar, saj bo olajšal opravljanje raznih formalnosti na daljavo, s prilaganjem raznih dokazil direktno iz uradnih virov.
Slovenija je v tej implementaciji zelo napredna in se uvršča med prve 4 države, ki so uspele v predvidenem roku vzpostaviti rešitev za izmenjavo dokazil po sistemu »samo enkrat«. Poleg Slovenije so to še Italija, Nemčija in Nizozemska.
Ministrstvo za digitalno preobrazbo napoveduje, da bo rešitev sedaj postopoma vgrajena v ključne postopke tako v Sloveniji kot tudi v drugih državah EU, postopoma pa bo državljanom in podjetjem na voljo vse več dokazil, ki jih bodo lahko prek sistema »samo enkrat« prilagali v postopke v drugih državah na daljavo direktno iz različnih uradnih registrov.
Po ocenah Evropske komisije naj bi bilo okoli 80 000 pristojnih organov držav članic, ki bodo povezane med seboj prek sistema »samo enkrat« za izmenjavo dokazil.

Tina Kuliš
MINISTRSTVO ZA DIGITALNO PREOBRAZBO
Četrtek, 11.04.2024
14:30 - 15:00
O predavatelju

Med klasično in digitalno arhivsko teorijo in prakso v arhivskih službah pri ustvarjalcih

Problemi klasičnega in digitalnega arhiviranja se začenjajo v arhivskih službah pri ustvarjalcih. Zato arhivisti pospešeno izobražujemo arhiviste na prvi, drugi in tretji stopnji. Z družbenimi in tehnološkimi spremembami se srečujemo vsi, pri tem pa moram ugotoviti, da med klasično in arhivsko teorijo in prakso ni razlik. Spremenjena je samo oblika arhivskega gradiva, ki ga zakonodaja izenačuje, kar pomeni, da moramo za zagotavljanje pravilne hrambe arhivskih dokumentov skrbeti najprej v arhivskih službah pri ustvarjalcih, kasneje pa v pristojnih arhivih.
Razvoj in pojav digitalizacije arhivistov ni presenetil, saj digitaliziramo arhivsko gradivo že vrsto let zaradi varnosti in uporabe. Te dejavnosti in izkušnje so nam zelo prav prišle v času COVID-a.
Procesi predajanja arhivskega gradiva od ustvarjalcev v pristojne arhive se niso nič spremenili, saj so ustvarjalci dolžni, glede na zakonodajo, predajati v pristojne arhive, odbrano in popisano arhivsko gradivo v zaokroženih časovnih obdobjih.
Nekaj podatkov iz prakse pa bo podala mag. Aida Škoro Babič. 

izr. prof. dr. Peter Pavel Klasinc
UNIVERZA AMEU ECM
Četrtek, 11.04.2024
11:30 - 12:00
O predavatelju
mag. Aida Škoro Babič
UNIVERZA AMEU ECM
O predavatelju

OWASP ASVS: Methodical Application Security Testing

OWASP Application Security Verification Standard (ASVS) is a list of application security requirements or tests that can be used by architects, developers, testers, security professionals, tool vendors, and consumers to define, build, test and verify secure applications. It has been gaining popularity over the recent years to even getting itself as part of the "must know" knowledge for some AppSec job postings, yet a lot of people are confused with its usage and how to really use it. This talk will discuss some of the nuances and approaches to a more methodical and practical web app pentest and how can someone use it efficiently whether they are a builder (developer), planner (architect) or breaker (pentester).
This talk will go through the overview of ASVS, its main purpose and usage, categories and subsections, practical examples of several requirements that could be easily tested (pentester's view), practical examples as well of some requirements that people have difficulty to interpret and test (developer and pentester's view), also demystify some of the confusing requirements and a bit of sneak peek for the upcoming version 5.0 (fixes and work in progress).

Ralph Andalis
Petek, 12.04.2024
14:00 - 14:45
O predavatelju

Penetration Testing For NOT Dummies

Penetration testing is a vital part of a company's cybersecurity defense strategy. Pen testing efforts need to catch 100% of vulnerabilities but cybercriminal need to find just one way to breach your systems. How do you make sure that your pen testing methodologies are correct? In my presentation, I'll take a deep dive into complexities of penetration testing and discuss tools, techniques, limitations, scope and how to best understand what to test. We are not dummies and our pen tests need to be done with intelligence and skills to assess the true scope of system readiness to remediate the findings.

Alex Holden
Hold Security, LLC
Petek, 12.04.2024
12:00 - 12:30
O predavatelju

Pizza, Pasta and Red Teaming: insights and ideas for an efficient report

Roberto Chiodi - Head of Red Team of Yarix, suggests a point for reflection on a topic as complex as delicate as the Red Teaming reports, trying to go beyond the fight to the bitter end for the know-how, wanting instead to propose a moment of sharing and hopefully of pleasant debate.

Roberto Chiodi
Yarix srl
Petek, 12.04.2024
11:30 - 12:00
O predavatelju

Prihodnost e-arhiviranja: implementacija naprednih tehnologij v sistem e-ARH.si

Sistem e-ARH.si združuje inovativnost in sodelovanje sedmih slovenskih javnih arhivov na področju dolgoročnega ohranjanja digitalnega arhivskega gradiva, ki od leta 2009 s skupnimi močmi razvijajo to rešitev, v večjem delu financirano z evropskimi sredstvi. Od začetne študije izvedljivosti do danes je sistem neprestano napredoval, v obdobju 2016-2021 so bile razvite različne rešitve, namenjene tako ustvarjalcem digitalnega arhivskega gradiva kot tudi končnim uporabnikom, ki želijo dostopati do tega gradiva. Leta 2022 se je sistem e-ARH.si uspešno umestil v Načrt za okrevanje in odpornost (NOO) za obdobje 2022-2026, s čimer je dobil priznanje za obstoječe rešitve in potrditev za svoj nadaljnji razvoj. Osrednja vizija projekta je preoblikovanje postopka e-arhiviranja z avtomatizacijo, optimizacijo in vključitvijo naprednih tehnologij - od RFID tehnologije v depoje arhivskega gradiva v fizični obliki, do umetne inteligence in strojnega učenja, ki obetajo korenite izboljšave v postopku prevzemanja, hrambe in dostopnosti digitalnega arhivskega gradiva. S tem se ne le zmanjšujejo administrativna bremena, ampak se tudi povečuje zaupanje v hranjeno digitalno arhivsko gradivo. Avtorica bo v svoji predstavitvi razkrila ključne dosežke projekta v prvem delu trajanja projekta e-ARH.si: NOO 2022-2026 in s tem poudarila njegov prispevek k digitalni transformaciji postopka e-arhiviranja v Sloveniji. Poudarjen bo prispevek projekta k dolgoročnemu ohranjanju in dostopnosti arhivskega gradiva, kjer implementacija naprednih tehnologij odpira nove dimenzije varovanja naše kulturne dediščine in dostopa do nje.

doc. dr. Tatjana HAJTNIK
Arhiv Republike Slovenije
Četrtek, 11.04.2024
10:30 - 11:00
O predavatelju

Prototype Pollution

JavaScript's prototype pollution vulnerability allows attackers to add arbitrary properties to global object prototypes, potentially inherited by user-defined objects. While not always exploitable independently, it enables attackers to manipulate typically inaccessible object properties. If mishandled, this may lead to chaining with other vulnerabilities.
In client-side JavaScript, this often results in DOM XSS, compromising user security by injecting malicious scripts into the Document Object Model. On the server side, prototype pollution poses a severe threat, potentially leading to remote code execution. Exploiting this vulnerability allows attackers to execute arbitrary code on the server, jeopardizing system security.

Milan Veljković
Petek, 12.04.2024
11:00 - 11:30
O predavatelju

The rise of hybrid threats

In the early 1980s, a new warfare concept emerged, known as the Revolution in Military Affairs (RMA). This concept signified a technological revolution in the military, promising significant enhancements in the lethality and capabilities of conventional weapons. Presently, Information and Communication Technologies (ICTs) play a crucial role in RMA, integrating services, command structures, authorities, devices, and weapon-delivery systems into a cohesive "system of systems." This integration boosts situational awareness, lethality, and versatility. Hybrid warfare combines elements of conventional and irregular warfare, cyberwarfare, and information warfare tactics, including the spread of fake news, disinformation, and misinformation. It involves various modes of warfare like conventional and irregular tactics, terrorist acts, violence, coercion, and criminal activities, engaged by both states and non-state actors. In this warfare style, conventional military operations are secondary to information campaigns. Currently, the distinction between cybercrime and cyberattacks, as well as between reality and perceived reality, truth and falsehood, is increasingly ambiguous. With the growing integration of Artificial Intelligence in daily life, the eventual use of this technology in fully autonomous systems or in developing advanced malware and chatbots is inevitable.

 

Sozon LEVENTOPOULOS
Zonos Systems Consulting
Petek, 12.04.2024
09:30 - 10:00
O predavatelju

Uvedba informacijske rešitve KRPAN za podporo upravljanju z dokumentarnim gradivom na organ državne uprave

Informacijski sistem KRPAN predstavlja enotno, tehnološko prenovljeno in napredno informacijsko rešitev za podporo upravljanju z dokumentarnim gradivom, nameščeno na centralno informacijsko infrastrukturo Ministrstva za digitalno preobrazbo. Zagotavlja varen zajem in upravljanje izvirnega in zajetega dokumentarnega gradiva v digitalni obliki. Zaposlenim v državni upravi omogoča fleksibilnejše in učinkovitejše delo z dokumentarnim gradivom. Modularna zasnova rešitve omogoča nadgradljivost glede na večanje števila uporabnikov, obsega podatkov, spreminjanja in dopolnjevanja funkcionalnosti, spreminjanja notranje organiziranosti uporabnikov ter povezovanja z drugimi informacijskimi sistemi. Z novo poenoteno informacijsko rešitvijo, prijaznim uporabniškim vmesnikom in mobilnim dostopom, zaposlenim v državni upravi omogoča enotno, hitrejše, cenejše in varnejše orodje za delo z dokumentarnim gradivom.

mag. Gabriela Weiss Živič
Direktorat za razvoj digitalnih rešitev in podatkovno ekonomijo, MDP
Četrtek, 11.04.2024
10:00 - 10:30
O predavatelju

Zahteve uredbe eIDAS 2.0 in direktive NIS 2 za varno in zanesljivo obdelavo informacij v digitalni obliki

Evropska deklaracija o digitalnih pravicah in načelih za digitalno desetletje določa, da bi moral imeti vsakdo dostop do digitalnih tehnologij, izdelkov in storitev, ki so po zasnovi varni in zaščiteni ter varujejo zasebnost, kar zagotavlja visoko raven zaupnosti, integritete, razpoložljivosti in avtentičnosti obdelanih informacij. Med predpisi, ki določajo zahteve za verodostojno, varno in zanesljivo obravnavanje dokumentov in drugih zapisov v digitalni obliki, velja posebej izpostaviti uredbo eIDAS 2.0 in direktivo NIS 2. V prispevku bodo predstavljene njune določbe o izvajanju elektronske identifikacije in storitev zaupanja v povezavi z ukrepi za obvladovanje tveganj za kibernetsko varnost.

Marjan Antončič
predsednik Združenja EIDES
Četrtek, 11.04.2024
11:00 - 11:30
O predavatelju

Zapisi v kontekstih: Prihodnost popisovanja in dostopa do arhivskega gradiva

Na področju delovanja arhivov so trenutno veljavni štirje standardi: Splošni mednarodni standard za arhivsko popisovanje (General International Standard Archival Description - (ISAD(G)); Mednarodni standard za arhivski zapis o ustvarjalcih arhivskega gradiva (International Standard Archival Authority Record for Corporate Bodies, Persons, and Families - (ISAAR (CPF)); Mednarodni standard za popisovanje funkcij in aktivnosti (International Standard for Describing Functions - (ISDF)) in Mednarodni standard za opisovanje ustanov, ki hranijo arhivsko gradivo (International Standard for Describing Institutions with Archival Holdings (ISDIAH)).
Postopek popisovanja arhivskega gradiva, temeljimo na ISAD(G) standardu v drugi izdaji iz leta 2000. Od prve objave ISAD(G) standarda so informacijsko - komunikacijske tehnologije vplivale na postopke popisovanja in dostopa do arhivskega gradiva. Zaradi tega je ICA (angl. International Council od Archives) ustanovila skupino, ki razvija nov standard Records in Contexts (Zapisi v kontekstu – RiC), ki združuje in nadgrajuje obstoječe štiri standarde. RiC omogoča večdimenzionalno popisovanje, ki temelji na vnaprej definiranih entitetah, lastnostih in povezavah med entitetami. S pomočjo RiC-a so podatki predstavljeni v strojno berljivi obliki, kar je lahko podlaga za programske rešitve in projekte umetne inteligence.
Na predavanju bodo predstavljene spremembe za arhive, ustvarjalce in uporabnike, ki jih prinaša RiC in nekaj primerov uporabe.

Ivančica Sabadin
Pokrajinski arhiv Koper
Četrtek, 11.04.2024
13:00 - 13:30
O predavatelju
11.-12.4.2024
On-Line

Za udeležence je dogodek BREZPLAČEN!

Dogodek je BREZPLAČEN
za vse končne uporabnike, ki niso ponudniki IKT, pravnih ali arhivskih storitev in rešitev.

Sponzorji

Srebrni sponzorji

Bronasti sponzorji

Medijski sponzorji

Obveščamo vas, da so bili naši pogoji poslovanja posodobljeni.
Sprememba se nanaša na člen »Odpoved ali sprememba dogodka s strani organizatorja«. Zaradi nepredvidenih dogodkov, kot je tudi trenutna epidemija koronavirusa, si pridržujemo pravico, da posamezna izobraževanja odpovemo ali spremenimo termin oz. način izvedbe (online izvedba).

Odpoved ali sprememba dogodka s strani organizatorja
Organizator si pridržuje pravico do odpovedi posameznega izobraževanja, delavnice, dogodka, seminarja ali spremembe terminov oz. načina izvedbe (namesto osebne izvedbe dogodka, izvedba dogodka preko spleta ali na drug način, pri čemer se ključna vsebina in obseg dogodka ne spreminjata oziroma se prilagodita glede na spremembo, npr. zamenjava predavatelja, prilagoditev urnika ipd., vendar se ohrani enakovredna kakovost izvedenega dogodka). Zavezuje se k obvestilu prijavljenim najkasneje en delovni dan pred predvidenim pričetkom izobraževanja oz. takoj, ko prejme novico o morebitnih izrednih dogodkih, ki so razlog za spremembo/odpoved. V primeru odpovedi izobraževanja s strani organizatorja, organizator, morebitno že vplačano kotizacijo, brezobrestno povrne v roku štirinajstih dni od obvestila o odpovedi ali pa omogoči stranki, da kotizacijo porabi za druge izdelke ali storitve. V primeru spremembe načina izvedbe ostanejo plačila v veljavi, v primeru spremembe termina pa ima udeleženec možnost odpovedati udeležbo iz utemeljenih razlogov po določbi Odpoved s strani udeleženca ali pa se odjaviti na način v rokih, ki jih predvideva določba Odjava udeleženca. 

Celotni pogoji poslovanja so dostopni tukaj: https://poslovanje.pogoji.si/tos/29xyi0o

Ta spletna stran uporablja piškotke. Z obiskom in uporabo spletne strani soglašate s piškotki.  DOVOLIM Več informacij o piškotkih najdete in nastavitve tukaj.