Pages

Subscribe:

Sunday 15 July 2012

Create a Password That Not Even Spider-Man Can Hack

The recent hacking scandals that have dominated the headlines led me to reconsider all the various passwords I currently use at work and at home. Hacking, defined by Wikipedia as the means of finding out weaknesses in a computer or computer network, is a serious, constant threat to businesses and personal home offices alike. After doing some extensive research, I now have a better understanding of why I should create a truly secure password and how to properly do so. Below are the most important tips to remember when creating a password that not even Spider-Man can hack.
The minimum recommended password length is 6-8 characters. The longer and more complex the password, the more likely it could withstand a brute-force attack used by hackers on encrypted data. According to Microsoft, passwords with 15 or more characters are no longer encrypted and stored in their hidden system files; therefore, completely eliminating the threat of being attacked by a hacker.
The trick is to make your passwords complex but easy for you to remember and difficult for others to guess. One suggestion is to start with a meaningful phrase, remove the spaces, mix in 1-2 upper case letters, change 1-2 letters to numbers, deliberately misspell a word, or insert a punctuation mark. Here is an example: "I love social media" can be changed to "1luvSocailM3dai.". There is a mix of upper and lower case letters, numbers, misspelled words, and a period at the end.
Another suggestion when using a meaningful sentence is to take the first letter of each word and apply the same techniques as above. So, "I love social media" can be changed to "iL:sm12!".
An alternative to using a sentence is to join two unrelated words and again, apply the same techniques as above. For example: "hamburger and wireless" can be changed to "Hambugr&wirele88".
It is not enough to simply use one technique; it must be a mix and meet the minimum number of characters.
Do not use anyone's name or user name (your own, spouse, kids, pets, relatives, etc.).
Do not use any words found in the dictionary, names of TV shows, or keyboard sequences (like qwerty).
Do not use any phone number, birth date, license plate number, or any part of a social security number.
Change your passwords every 4-6 weeks and do not reuse old passwords.
Create a different password for your different accounts; meaning your email, bank account, Amazon, Pay Pal account should all have different passwords. As bothersome as it is to remember so many passwords, if one account is hacked, at least the others will not be jeopardized.
Do not write your passwords down and store near or on your computer. If you must store the passwords, use hints instead to help you remember.
Finally, always be wary of emails requesting you to change your password. It could be a scam! One exception would be if you forgot the password and requested it be reset.
The different password options are infinite; just use your imagination to come up with something that is completely random and only unique to you.

Electronic Techs Beware, This Could Be a Shocking Experience

Have you ever walked across a carpeted floor, then to reach out and touch another object and receive a small static discharge from your hand. I certainly have, and if you are not expecting it, it can be a surprising event large enough that you may even see a spark travel between your hand and the other object.
This phenomenon is referred to as Electrostatic Discharge or (ESD). It is something that most of us have experienced at least once in our lives, and can certainly be amusing at times as well, but it can also cause serious issues when working with electronic equipment such as computers, audio equipment, or any other type of electronic equipment that may have components that contain static sensitive devices. In many cases devices containing these types of sensitive components will have warning labels to make you aware that the device you are servicing or installing is static sensitive, some do not!
There are different types of ESD the spark being the most spectacular, but many ESD events occur without a visible or audible spark. A person or object may be carrying a small electric charge and may not even be aware of a discharge, but this invisible type of ESD can be devastating to electronic devices not only causing immediate failure but also could effect the long term performance of these devices as well.
Using anti static tools, referred to as "ESD Safe Tools" is always the best approach to prevent ESD and can save you hundreds of dollars in the long run.
Some examples of Anti Static Tools are:
Anti Static Mats: An anti static floor mats or bench mats are constructed of a special material embedded into the mat that collects static.The mat has a grounding strap attached to it which allows the static charge to be directed to a ground away from the equipment you are working on.
Anti Static Wrist Strap: Is worn on the wrist, has a grounding strap attached to it which allows the static charge to be directed to a ground source. It is best used in conjunction with a anti static mat or a special static-dissipating plastic laminate on the workbench surface.
Anti Static Tools: Generally referred to as ESD Safe Tools, can include soldering irons, tweezers, diagonal cutter and pliers, screwdrivers and other electronic tools. These types of tools are specifically designed to prevent static discharge when coming into contact with sensitive devices but should always be used in conjunction with anti static mats and wrist straps as well.
Precaution is always the best approach when working with any electronic device. If you have any doubt if the electronic equipment you are servicing is susceptible to ESD, then use ESD safe tools and mats. A few dollars spent up front for prevention could save you hundreds in replacement or unnecessary repair costs.
Mark Boehm is the president of M-B Electronics, Inc., Electronic Toolbox, Inc. He has over 25 years of experience in the Audio Visual and Electronics Industry and a Bachelors degree in Electronic Engineering.

Pros and Cons of NTP Servers

ByJustin A Salmasi
An NTP server is a Network Time Protocol server used to synchronize computer clocks over a network of information. Many of today's technological systems that contain computer chips often receive their time from such NTP servers. Synchronizing to these time servers has many benefits but can also have drawbacks. Being aware of these Pros and Cons are important in order to insure that a system you are using is up-to-date with an accurate time.
Pros:
Synchronization with the Internet:
Using an NTP server ensures that time is observed accurately between your devices and the internet. At this day in age, all of our devices are expected to display consistent time with the internet from clock to clock, which is required for our all of our technical gear to be able to interface properly with one and other. Time could vary significantly from one internet-connected device to another if it wasn't for NTP servers.
Total System Synchronization:
When all technology within a building or network synchronizes to the same NTP server, the chance of having several differently set times on individual devices is eliminated. NTP servers can send their time information out to many computers at a time, ensuring that entire systems of buildings, networks, campuses, etc. are running on the same time.
Enhanced Security:
A NTP server can be internal to a premise. In this situation, a facility can consider itself less subject to a system hacking or attack. An internal NTP server can eliminate the need for an internet connection where the entire system becomes vulnerable to cyber attacks and viruses. In a world where cyber attacks are growing exponentially, an NTP time server can be ideal on an internal level.
Cons:
Down Servers:
Just like any website or internet server, sometimes an NTP networks can crash or shut down for a period of time. Like most glitches, these downtimes are unexpected and their duration can vary. When these servers are down, time data will cease to be transmitted to all devices that may be syncing to them. During this time, those devices may start to drift from the correct time and fail to match other device clocks that used the same server. When having an accurate time is extremely vital for your technology using an alternate time source or backup servers to sync with may be advised.
Not All Servers Guarantee Accurate Time:
Although most NTP networks are accurate and reliable, not all transmit accurate time data. Mistakes can happen whether human or technological. An NTP may run on a different time zone or fail to adjust for Daylight Saving Time, for instance. While NTP servers are very dependable for precision, it is important to make sure that a server being used is accounting for your time zone and for whether your location observes DST or not.
If an NTP server is the route you are looking to take for time synchronization, don't forget to keep these Pros and Cons in mind. NTP networks are a common and respected source for time regardless of some of its drawbacks. This is a great option when used with the right application. For a reliable and safe alternative to keeping time, consider using an NTP as your everyday time source for technical equipment.
Justin Salmasi is a Marketing Intern at The Sapling Company, Inc.

What Are the Different Types of Servers?

There are different types of servers, and they all function to manage network resources. The name of the server determines its function. For instance, file servers are storage locations for users in a network to use. Servers perform dedicated function and perform no more functions aside from what they are programmed to do and handle.
• Application servers. These connect PC users to database. They are a type of middleware, that occupies a huge space on any computer. Middleware should be thought of as software that links two separate applications. For instance, there is a middleware product that connects web servers and database. This particular middleware allows users to see web pages they ask their web browsers to see.
• Audio/Video servers. These allow multimedia to be played on websites. They allow streaming of music, audio, movies, and video clips. Streaming is a term that means to transfer data steadily from a source to an end user. This is different from actually downloading files, wherein you have to wait for the whole audio or video file to finish downloading before you can play it. When streaming, you can play the file while it is being transmitted to your device.
• Chat servers. Chatting has become one of the major means of communicating across vast distances. You can see and talk to someone from the other side of the globe. You can talk to colleagues and associates even if you are out of town. These allow real-time conversation. They allow people to be able to send a message or make a call right away provided that they have access to internet.
• Fax servers. These are the types that allow companies to fax hard copies of documents.
• FTP servers. File Transfer Protocol is one of the oldest internet services. FTP allows transmission of files from a computer source to another computer. These allow secure file transmission between computers.
• Groupware servers. These allow users within a company to collaborate on the internet or within an intranet. People can then work as a team within a virtual setup.
• Mail servers. They are as important as web servers. Used by most people using the internet, mail servers allow people to send emails to other people. When you want to manage mailing lists, you are using the list type.
• News servers. These act as distribution source for public news groups. They are used to handle Usenet articles, which is a global bulletin accessible all over the world via online services. Usenet contains over fourteen thousand forums, which are called newsgroups. Millions of people use it every day.
• Proxy servers. These bridge act like filters standing between a web browser and an external type. Their function is to filter requests and improve browsing capabilities of a computer.
• Web servers. These are essential to people sharing files online. That means it is important to majority of internet users.
• Dedicated servers. A dedicated server serves a network to manage communication between computers within that network. They are usually rented from a web host.
For more information about an India dedicated server or a dedicated server in India visit our website ctrlservers.com.

Nanotechnology: The Promising New Technology

Brief insight:
Chances are you are already using Nano products based on the new revolutionary technology; if not, then you cannot afford it, yet. Who in the world needs stain-resistant shirts or, for that matter a wrinkle-free trouser? What will become of all the 'detergent' companies; the washing machine and press iron makers? Ironically, the persons who can afford the existing commercial 'Nano products', perhaps, are the multi-millionaire CEO's and Presidents of the same detergent and home appliances companies; wearing clothing made from the new 'disruptive' technology that may literally put them out of business, in the not-so-far future. Even if the trouser or shirt ultimately gets soiled or just wears off; we may use Nano-cleaning or Nano-weave, to clean or renew them. Am I taking you on a mega ride with my Nano-fantasy! But we are already there in a number of fields; Nanotechnology is coming of age, progressing from the research labs to consumer products; the technology holds key to new developments in technology, communications, engineering, medicines, computers, green energy and many more areas; the secret lies in manipulating the matter at the molecular or atomic level- just a billionth of a meter.
Scientific Definition:
Nanotechnology is a collective term for a wide range of diverse technologies, techniques and processes that involve manipulation of matter at the smallest scale; range from 1 to 100 nano meters or, one billionth of a meter.Nanotechnology, involves engineering at the atomic or molecular level.
(microtechnology on the other hand deal with technology or processes; a millionth of a meter!)
Why and what we need to know about, Nanotechnology?
Nanotechnology is positioned to transcend conventional research boundaries between physics, chemistry, biology mathematics, information technology and engineering.
The leading fields of current research involves commercially viable sectors; nanobio, nanomaterial, surfaces, electronics, Information technology and instrumentation. The most popular, lucrative and marketable segment being Nanomaterial- predominately involving apparel / fashion, medical fabrics and sports/leisure industry. But, not far behind is the consumer products companies: the CP multinationals have taken a lead and introduced Nano molecules in products like anti-bacterial antiperspirants /deodorants containing silver nanoparticles.
Nanotechnology has been an 'active' technology in the textiles and fabrics manufacturing industry for some time now. In fact the textile industry has taken an innovative lead and have incorporated the new technology and techniques in their processes. In percentage terms, 90% of the technology in use has been by the textile/fabrics industry alone. The production and marketing have been driven by the lucrative sectors, like the Apparel/Fashion textiles, medical fabrics and sports/outdoor textiles. The percentage share by each sector has been estimated, as follows: Apparel/fashion/sports- 37%, Interior fabrics -33% and technical textiles - 30%.
Nanotechnology and Energy independence:
Energy and Fuel technologies: The most anticipated research is being done in Green energy technologies and battery cell technology. Automobiles in the future, may be running on electricity alone, and will be equipped with smart processes to generate power on board; the current research is directed towards energy creation, storage and transmission technologies.
Next Part: Economics and business potential:
In 2010, the global market for goods incorporating nanotechnology totaled US $15 billion and by some estimates, the 2020 figures are going to be US $2.4 trillion.

Are You Blacklisted? Protect Your Outgoing Emails From The Spam Inbox

Every email is constantly scrutinized to see whether it is spam, virus, or just a normal email. With the constant demand for email security, Blacklist was developed. On a short note, a Blacklist is a list of people, companies or organizations that for some reason have been denied a particular privilege. In terms of emails, a spam blacklist is a list of emails who have possibly broken the rules of conduct and will therefore will be constantly blocked until removed from the list. So how you find out if you've been blacklisted?

Upon sending your email and it being blocked by a Blacklist provider, some lucky individuals will be informed with an automated response email explaining that their message has been blocked. However, it's unlikely you will receive such a response. The only way you will figure out if you are being blocked, is when you talk to your customers and they say, "I did not receive that email". This can be a costly thing when your business relies on steady communication with your costumers.

Please note that the biggest danger is the reputation a blacklisting can have on your domain. It may go on to affect not only your email, but other's in your organization as well as your webpage.

Luckily many website services were created to scan blacklists to determine whether or not your domain is free to send email or not. Examples of these websites include Mxtoolbox.com, blacklistcheck.com, and whatismyip.com, which are all free to use. Once you have determined that you are on a "Black List", you need to correct the problem, then contact the blacklist administrator requesting that your domain be removed from the list. This process can sometimes go easily, but it can also be costly depending on the Blacklist Company involved. Now it's time to avoid being victimized...

To protect yourself from becoming blacklisted or to resolve such an issue, make sure your email's domain is not sending spam. The best way to avoid sending spam is to ensure your machine has dependable anti-virus software installed and that it is up to date. Secondly, if you own the server on which your domain resides, make sure this also has anti-virus protection. Lastly, never send group emails to more then 15-20 emails at once. A large outgoing mail flow to multiple accounts can be flagged as spam.

If you need to send a large quantity of mail like this, consider a third party email client, such as Constant Contact. These platforms are set up to send emails out to multiple contacts. Their basis is that upon sending an email, you have permission to email each and every contact you add to your (Constant Contact) contacts database.

In short, use your personal and work email accounts carefully and for more of one-on-one and small group communication and ensure your computers andservers are secure. We can never be too careful!

InfoPathways, Inc.


View the Original article