skip to main | skip to sidebar

Sunday, August 21, 2011

You Can Think of to Account Security? No Password, and Login!

2 comments
Once again to further protect your accounts from hacking into some of the interactive customer resources Web 2.0, you can do this.

One of the vulnerable factors in the security of the Internet can not only be too simple password, and in addition thereto it is known to many around your e-mail.

Unfortunately, so are arranged, for example, Google and mail.google.com. From their e-mail accounts "grown up" social networks - and they coincide with the login authentication login address.

But there are systems in which as a login, you can use e-mail, not associated with the very resource. This is the case, for example, Facebook and several other social networks.

A similar situation, for example, in a variety of technological and technical Internet services - for example, many systems of contextual advertising. In the same way with the authorization process is organized in many famous Russian shops.

We make a general preliminary conclusion: safe / not safe by themselves may not be password or login name individually, but as if it was a pair of "login - the password." Since the password is something attackers can even pick up, but the login ...

The Internet is a set of email services - ordinary "mail" to find them easily. Register for one of them myself e-mail address and use it solely as a login in order to log into these systems. On it will receive messages of one kind only - incoming service announcements on these systems.

Yes, of course, superfluous "e-mail" - it is a pain, but think about what is more important: the additional security or conditional carelessness. Let this be your kind of network "door" to which only you will know and only you, because you are because of her no "show" - it will only work on the entry.

In this case:
- Never, to anyone, under any circumstances, does not tell your e-mail address;
- In any case, do not post it on your business cards;
- Never with anyone he did not write;
- Never "prescribe" the account to the POP3-and SMTP-settings for your email, use this almost exclusively through the web interface;
- In this case (see previous item) is always the "exit" from the email account for its next use.

You can, of course, to make such an address in the system of corporate e-mail domains - the system administrator of the company (organization, institution), where you say, work.

But a little-known in the remote mail system of various e-mails can be tens of thousands (and it also may be a dozen different to writing e-mail domains), and individual user nobody, in fact, is not needed.

But your extra corporate mailing address can easily know your system administrator. Even if it is - an absolutely honest man, your e-mail may be accidentally "seen the world", say, from a certain list of email addresses of employees who, being prepared for the banal reason that may later come to be in the trash.

The main conclusion: as a login in order to log into any interactive online system is to use e-mail, which in principle will be known solely to you.

When used as such, known to many of your mail write an attacker to "break" only a password.

In our more perfect case of need to know more and login.

Wednesday, August 17, 2011

Why Thematic Sites Generate More Money?

0 comments
Requests often come in a mini-audit of the owners of sites that collected information is heterogeneous.

Typically, these owners say as key words are the most popular themes: e-books, pay online, useful links, and of some of their personal interests. So what's wrong with that?

Bad - nothing. But no good.

Previously, these pages called Home page (home page), or "hamster." So they remain today. Because, besides the author and owner of the site, it is not interesting.

There are just too simplified versions. For example, a site with my personal photos. If the author has created it to all friends and had a chance to admire them - then no problem. But when an author wants to "get to first place in the word" picture "" - this is, to put it mildly, unwise.

So, the problem number 1 - this site very few people interested. At least, because that man was created, not so long to come to the Internet. And so it is hardly a collection of materials, which he dragged to the other sites of interest to others more experienced.

Problem number 2. The materials which are copied from other sites, or placed in violation of generally accepted rules (without attribution and links to the source site) or simply obsolete. (Which is sometimes more dangerous than you think. Depends on the subject. This is a separate article.) They are perceived negatively by Google. And this site does not occupy high positions.

Problem number 3. The Internet wins specialization. Where will look for refrigerators? On specialized sites. But not on the website "All about everything." Because nobody would think of it this look. A ranked first in terms such as "refrigerator" or other competitive terms, this site unrealistic.

Problem number 4. This site is difficult to unwind (if we forget about the first problem). Because every site should have a name. The more "telling" it would be better, the more people remember him. But what to call the site "Everything"? So we get the faceless names like "Portal Vasey Doe." Or louder - "Information Center ...."

And in the keywords to be simply a collection of popular keywords. And no use of this site will not be. Because the increase in its popular search phrases will be difficult. And if they raise, what then? For a while  then the author wants to make money on it, hang about five banners on every page. And would think that soon grow rich, with attendance of 50-100 people a day "on such a steep keywords." Hence the next problem.

Problem number 5. These sites have no prospects. First they are to assert itself. For him, they unwind, using all available means, including the Pyramids, the system simply wrapping counters and the automatic link exchange. And then what?

Then the site owner to get bored, and the project abandoned. Especially if he was on a free hosting. And then hosting? Granted, the author of the resource for it does not pay, then the value of any site in the head. If he had to pay 5 bucks a month, he would have thought a hundred times - that is put on paid hosting? And so, for free, and can distribute the junk. Just because it's interesting now.

In the best case, the author will learn the basics of html and php, will explore ways of site promotion, and he will make enough competent webmaster. He quickly realizes what sites should be done. Especially if you want to earn money on it.

And those who did not become sensible webmaster, is likely to tell everyone that the Internet - is nonsense, it's just a toy, and no persuasion from him. Or start packs to create a site (copy ready) to participate in a variety of pyramids and lure them to naive newcomers. In the first case of swell various myths about the Internet. In the second are the regular garbage sites that litter the Internet.

The moral of the article: Create themed sites. They are easier to spin and easier to sell them through something. But to successfully sell something in particular - should be properly plan for the site.

But on the plan - the next time.

Tuesday, August 16, 2011

How Much Does the Cat-Spy? History of Acoustic Kitty

0 comments
The film "Cats & Dogs" clearly shows that our pets should be checked not only for fleas and ticks, but the content of any spy devices. But it is in the film, but is it possible to turn a lump of purring fur intelligence agent in?

Let's look first at the opposite camp - the dogs. They have long been working in the field of security. Customs Service, Department of Narcotics, rescue - all of them anywhere without the dogs. But in the meantime the cat walk by themselves, even visited by a new batch of feed (or to shat in the tray or sneakers). Is there a cat Yuri Kuklachev representatives engaged in socially meaningful activities. The rest of the cats - the narcissistic lazy, selfish and parasites on society.

But what potential! Where you want to get through where you want, and because brain is - it can not deny. No, not such good fail. Talked about as the CIA in the early '60s, conceiving the project Acoustic kitty (Acoustic Kitty). Already from the name you can guess that the cat will be engaged in guinea wiretap negotiating a potential enemy, that is, the Soviet Union. No, the cat did not attempt to teach human language, and then give the general secretary of the CPSU Central Committee. All turned out to be darker (for the cat).

Equipment and training involved in a cat Department of Science and Technology by the CIA. It was his experts found a way to turn the animal into a living listening device. Recommend to owners and cat lovers to stop reading the article, when you come to describe the manipulation of the cat. Cat survived not the most pleasant transaction. He probably would have rather preferred to daily surgical castration, rather than all this. The transmitter and battery were implanted into the animal, and the antenna passes through the tail. The brain also had a few animal ... change, the cat did not feel hungry. Last had to do because, hungry, animal forgot about the duty to his country and began to look for food. After surgery, the cat was fed by force is not to die of starvation.

Office cat at the CIA was short-lived. After training, he was released on the lawn near the Soviet Embassy in Washington ... And a couple of minutes the cat was brought down to death a passing taxi. The project cost $ 20 million. And it's not today's papers of the State Bank USA, and real money. Experts from the archives of the U.S. National Security concurred that the cat still would not last long after that happened to him.

Former CIA officer Victor Marchetti (Victor Marchetti), told reporters: "They literally cut it in half, shoved into all of these devices and sewn back. They have created a monster. "

The sad story of a spy cat ended quite well for the founders of the project. Their work was rewarded. The CIA said: "Work undertaken reflects the enormous contribution of our employees, whose energy and imagination can be an example to all the pioneers of science."

Coincidentally, a year when the project "Acoustic kitty" ended in failure, the screens out the British film "The Spy with a cold nose", where the main role was played by a dog, "equipped" to spy on the "evil empire" (the Soviet Union again, if who do not know). Still, sometimes not leave fiction behind the screen.

Friday, August 12, 2011

How to Protect Personal Information Online?

0 comments
Scandals involving leaks of personal information on the Internet in recent years there with enviable regularity. Just recently discovered that in the search results of "Google" it is possible to obtain information about jobs in various online stores, including sex shops. In an open access was complete information about the customer, including name and full mailing address, as well as the contents of the order.

To do this, just enough to type a query «inurl: 0 inurl: b inurl: 1 inurl: c status of an order." Such a terrible gibberish actually stands for is quite simple: we ask to find pages that contain the phrase "order status", and in the URL of the page should present the symbols "0», «b», «1» and «c». Incidentally, in 2009, with the appearance in the query language of "Google" operator «inurl:» experts warned that in the first place hackers will appreciate its advantages, which will pick up sites that use repetitive engines with known vulnerabilities.

So in this case fell under the distribution of customers of online stores that use the script WebAsyst Shop-Script. Naturally, the extreme in this case is not found. The owners of online stores charge "Yandex" that his robots poke your nose where you should not. "Google" says that just does its thing, and blame the site owners do not provide safety information.

Suspicion fell a set of services "Google." Supposedly all the affected sites were on board this "snake". Finding your way is difficult, but nevertheless the search engine Google, which has the same operator «inurl:», personal information will not allow extradition.

But be that as it may, and the rescue of drowning - the handiwork of drowning. And his own drowning, too. Users are much easier to work attackers. For example, in the search results on that same terrible request, I found a page that allows a person to check the status of your order. Field "Order Number" and «E-mail» had already been filled. In order to get detailed information requested log - enter your last name.

It seems to be good. But e-mail address look like familiya_imya@mail.ru! Naturally, after entering this very site helpfully opened family me complete information about the order. Yes and no very obvious addresses of the form "chto-to@mail.ru" easy to calculate the surname. Enough, for example, simply make a search of this address on the Internet or access social networking "My World". For this you need only to address my.mail.yahoo / mail / xxxxxx / xxxxxx replace this "something" from the address. Most probably we will get on your personal page owner. And this is not a burglary, the man himself posted it on public display. And as to the personal page you can find out almost everything.

Therefore, by registering on social networking sites, forums, online stores, remember - you disclose about yourself is often much more information than appears at first glance. And no one knows who to hit this information, and how he will use it. For example, it is not surprising that the employer did not take to the driver, who on a personal page tells us that not paying attention to traffic lights, even if he lives in does that, and just wrote nonsense. Therefore, adherence to a few simple rules simply need to:

1. Minimize the communication on the Internet. It is clear that for many this is tantamount to a smaller board to breathe. But in this case, we can reduce the risk to a minimum.

2. Limit the amount of personal information that is publicly available. Use aliases and nicknames that are not associated with a real name. It is especially important to teach this child.

3. Use multiple e-mail address: Separate - for business and personal correspondence, separately - a public address (for forums, shopping carts and so on). Public address must provide the minimum information about the owner.

4. For different accounts and services should use different passwords. If you remember many passwords is difficult, it is possible to develop a simple mnemonic rule. For example, this: my password - the word "spade", then the first three letters of the site address and the number corresponding to the length of the name of the site.

Naturally, all this should not replace but complement the use of antivirus software, firewalls and other tools in the arsenal of technical protection, which is powerless if the user himself puts personal information online.

Wednesday, August 10, 2011

How to Write An Article in Windows 7?

0 comments
After reading the title, most would think: "Is he serious? What kind of question is this, frankly stupid? You open a text editor and ... "And that, ladies and gentlemen? Print! And not writing. I'm going to write. By hand.

This idea - not a whim but a desire to quickly step into the future. Two years ago, I would not have believed that I would do in a computer without a paddle-type "mouse". But here - no carpet, no rodent! More user-friendly tool drove less convenient. There was, in a deep philosophical sense, the evolution of human-machine! In this article predict a return to writing.

I will, unfortunately, biased, and explore the possibility of writing the text of one-sided - for example, the features of Windows 7. Fans of Apple and Linux users do not propose to hold holywar in the comments, and share their experiences handwriting - the most interesting, and the purchase of iMac is postponed indefinitely. Set as some Ubuntu, then to set up all night tablet driver, no desire at all.

Operating System Version - Max, therefore possibly some functions described by me, will not be available in less advanced assemblies. So, the guys from Redmond have prepared for the leap into the future? With Windows 7, when you connect the tablet machine comes with a virtual keyboard support for handwriting, and in the Control Panel, hiding two options: "Tablet PC Settings" and "pen and touch input." The latter offers a set of gestures for a pen tablet in combination with a touch screen.

Why do you want a pen for touch screen, which the producers sharpened by human fingers, remained unclear. The gloomy genius Ballmer? The first option is used to calibrate the touch screen and allows you to run a virtual keyboard. More precisely, the application-shifter, able to pretend and keyboard (screen), and "paper" for writing.

Hurry will not - start with the virtual keyboard. I tried two ways: by touch-screen poke your finger (see photo at the beginning of the paragraph), and the second option - to stick your cursor over the letters (a better result, however, by the time I got used and found a point). It turned out not so hot. However, with fast print and on the conventional, hardware, keyboard error missing. True, the print still comes out faster (yet). And besides, who said that the most important work - it's the speed?

Initially, this was a disadvantage, as an unfortunate location of the application window. It hides the left or right on the screen and a little comes out when the cursor is brought to the edge of the display. But here's the problem - sometimes in the province are the buttons interface of any application (browser, for example). And you want to poke a button and you get to "control gestures", which immediately turns around and occupy the lower third of the screen (well, not third, and somewhere in one-fifth of an exact count, but it still interferes, when there is no need in this panel) . I had already wanted to give up writing and turn off the application when the thought of to get into the "Tablet PC Settings" and got the opportunity pinned launch a virtual keyboard on the taskbar next to the language bar. There he lives.

Well, now switch the keyboard to handwritten input and try to write something. Enter text into any application can be: notepad, browser, graphics editor. When writing in Word, there are two options: either to remain a handwritten "cuneiform", or he, if you write on the virtual keyboard is converted to typed text. Print in the document where you have written something, you can. But the letter written by the editor, in fact, just the drawings, which will lie on top of a printed text. Slightly better is the case in OneNote - a tool for creating notes from MS Office. Printed text is divided into blocks that can be placed randomly in the document, and the free space insert notes or comments. At the same time the printed text can emphasize or highlight marker, as many like to do in the present paper documents.

As for an alternative text editor - Writer of a set of Open Office, then write directly to him is impossible. True, there is an article on the internet about inscribing Chinese characters when using Open Office in Ubuntu, but support for the Russian letters in the experiment could not be found. Therefore have to sacrifice the bottom of the screen (one-fifth) for the application of virtual input.

Somehow it seems to me that such tricks can be of interest to the child. In cases where the child refuses to learn the spelling of the standard method is to offer him a way to advanced. Not yet in play Crysis 2! Kalyakat on a computer can be any number. Now that regular, analog, paper will endure, the digital and even more so. The similarity of the e-mail with a drawing like returns us to the point of creation of the first icons. The story takes place in a spiral, and we were lucky (or unlucky) to be at a new round. After all, the sixth production cycle is not far off - there were a whole five years. But the cycles in different times, and finally the historical example of the importance of handwriting.

Being an old man, Nietzsche received a gift typewriter. This has helped to continue the philosopher writing. Losing sight of Nietzsche mastered the blind and print can type text with their eyes closed. It is true that the transition from writing for publication has changed (as Nietzsche thought Editors) style of his work - keep it simple, almost telegraphic. Philosopher agreed with the comments and moved the blame on a typewriter. Like, when we associate a letter written word and the idea of physically, by hand, but any printer (including the keyboard and computer to which the philosopher did not live) is an intermediary between the author and his text. A mediator brings is its change in relations between the two entities, whether the seller and the buyer (growth centers) or author and muse.

I would, of course, blamed not a typewriter, and old age and the increasing madness of Friedrich Nietzsche, but after reading enough of the Internet works - from blogs to online novels, writing for the importance of brain development will not challenge. Let until all this is nothing more than an experiment, but perhaps will soon be able to resurrect the epistolary genre, and we begin to really write to each other emails!