Category Archives: Technology

How Australia can cash in on the cyber boom

By  via ZDNet

LINK TO THE ORIGINAL ZDNet POST

…”Australia is a world leader in developing infosec ideas, but bad at commercialising them. There’s a plan to fix that”.

sh_cyber-wall-street_750

“We’ve got to create a cyber industry, create depth in the talent pool, to be able to support our other industries as well … We need to get a critical mass of researchers to attract the investment.”…

LINK TO THE ORIGINAL ZDNet POST

Quora: a great, powerful tool for Social Media Marketing!

Quora? Are you sure about what you are saying? Why?

Yes, I am more than sure. I know that you could be surprised about thinking Quora as a Social Marketing tool but it is really a powerful if you learn how to disrupt its potential.

In few words Quora is you personal brainstorming tool. A real powerful tool if you consider that people in Quora are in the main part experts into their sectors.

Quora-Personal-Branding

If you post a question, promote it -asking to Quora suggested experts to answer- and you don’t receive any reply, it means you posted the wrong question! Quora people don’t waste their time answering to obvious or silly questions. So, if this happens, don’t be ashamed but remove it and start thinking what is the mistake you did. In many cases if you spend some minutes thinking about it you will find the answer you were asking for.

But, remember, don’t limit yourself to only asking but start answering the question that Quora will propose to you. Good answers will get you being noticed. And it could be helpful for your CV or for attracting traffic top your social media or blog.

For this reason I suggest you to spend the right time to write your profile when you join Quora. It is important for a couple of aspects. The first is related to the questions that Quora will propose to you: especially at the beginning they will be strictly related to your Bio. The second aspect is directly linked to your social exposure. Don’t forget that Quora is not only a collaborative platform but it is also a precious, “shining” window were you can directly show your expertise and indirectly attract new follower to your social media, blogs or online activities.

quora

Quora is the right tool to create and nurture your personal branding strategy. If you think to be an expert on some topics, go to Quora and show your knowledge there. Because Quora is the best place to find people that are looking for the right answers to their top engaging questions.

Moreover Quora let you connect with experts in all the topics you prefer. Doing this you are able to create your personal web of experts and potential promoters for you or your activity. After a while, I suggest you to actively search the most appropriate questions you like to answers. This strategy will enhance your presence on Quora and allows you to give your best when answering.

Last but notquora-logo2 least, don’t be obvious when you answer to a specific question directly related to your business or activity. If you want to promote your activity or your website you need to clearly explain why you think that it is the best solution to that specific question. In few words you have necessarily demonstrate to the questioner (and to all the other experts who are going to read you) why you or your services or website are the first best for his/her needs.

To conclude let me say that Quora is really essential for your Social Media Marketing and you should be really interested to test and include it into your Social Media Strategy!

HTML5 Privacy Matters: DOM Storage. How to solve it in only 2 steps!

Recently I started an online course that was created using the Google Course Builder.

After I registered the course I was not able to access it because “my browser didn’t allow the web storage” and, for this reason, a message informed me that it would be necessary to use a up-to-date browser as Chrome or Firefox.

The only problem is that I always use Firefox. Obviously a “particular” version of Firefox where I also added a bunch of different add-ons to enhance the privacy protection level of my navigation and, for this reason, the Google course was not available for me.

Normally I would have decided to quit the course because I prefer not to modify my Firefox configuration after I spent so much time searching the best add-ons to preserve a minimum of privacy.  But, in this case, I really wanted to attend the course and so I decided to manually operate on the Firefox configuration to “solve” the problem and allow Google to keep all the information it would have considered as essential.

This is the list of what I did:

– open Firefox and type:

about:config

in the address bar.

– search for:

dom.storage.enabled

and change its configuration from “false” to “true” double-clicking on it.

After this fast change in the Firefox’s configuration menu I was able to attend the Google course but….. I am conscious that my privacy is a little bit less protected because now Google can store up to 5 MB of content on my browser. In fact, before HTML 5 we were used to “cookies” and we were able to “manage” (better: erase) them also if, as the LSO Flash cookies, they were more persistent than usual. Moreover in the old html times, the space available for cookies on your local browser was 4 KB (yes… KB) but now, in the Html 5 era, a single website can easily manage and permanently store till 5 MB on your browser. And this is the reason why I decided to protect my privacy disabling the DOM Storage on Firefox and this is also the reason because I will disable DOM Storage as soon as I complete the Google course…
DOM STORAGE
If you are not a simple user but you prefer to directly and consciously operate on the Firefox configuration to improve your privacy level, you would read this interesting post by BestVPN.
————-

References:

3 Good Reasons to persist in using Google ncr = no country redirect

why_istock_000007228941xsmall-300x198

Image from: marketing-partners.com

Since some weeks ago, I used:

http://google.com/ncr

for my web search and I was able to open the main Google Homepage without to be redirected to any local Goole site.

What I usually obtained was:

1 – less “personalized” search results: the algorithm will be not “contaminated” by my local IP and I will able to find information “cleaned” by local trends;

2 – the possibility to use the “same” Google even when I am abroad;

3 – the security that my searches were always up-to-date respect the global actual trends. For my experience when I search some particular topics as “marketing” I obtain, in the first Google page, fresh news only using Google in its NCR version. If I try to use my local Google homepage I have to spend more time setting the Google’s “advanced search” or trying to understand what information are “really” fresh new.

url-720x340

Image from: mods2015.com

I found the right solution when I visited ycombinator.com and I found the post created by newman314 that submitted a link that combined NCR and SSL protocol (for a little bit of more privacy).

https://encrypted.google.com/search?q=test&qscrl=1&n…

https://encrypted.google.com/search?q=test&qscrl=1&ncr=1

Where the word “test” is what I am looking for.

Then I also found a faster solution by dragop:

http://www.google.com/?gfe_rd=cr&gws_rd=cr

and, in the same webpage, a shorter version from 3dfan:

http://www.google.com/?gws_rd=cr

On my side I prefer to use this other URL that gives me the same results through an SSL connection:

https://encrypted.google.com

To be sure that the results were really the same and not simply related with the English language and influenced by the IP, I tested this URL comparing them from what I obtained from the above mentioned:

http://www.google.com/?gws_rd=cr

I discovered that what I “received” using encrypted.google.com are really the same links and they are not just the standard local results in the English language.

I know that cookies will not allow me to have real “septic” results but this is the first step to a less passive use of Google search because I would like to be a more active user and not just a passive customer pampered by Google.

Start 2016 with a bunch of unusual Linux OS!

linux-distributions-to-look-forward-in-2016

What’s better than testing? For me nothing!

For this reason, let me introduce some “unusual” Linux distribution proposed by Jesse Afolabi @Jesseflb via Techmint.

VeltOS and PapyrOS are based on Arch but the last one is in its pre-alpha testing so it’s not suggested for beginners.

Moreover, we may decide to begin 2016 with Korora that is still one of my favorite projects also after so many years since the first release.

Last but not least, we have Solus OS 2 that it is not the most Linux distribution I tested but it is stable and really well built.

Happy 2016!

Protect your Privacy: use a Self-destructing, single-use File Sharing Service

encryption-100410129-primary-idge

Image from infoworld.com

If you need to share a confidential file to one of your colleague and you have not enough time to manually encrypt the file before uploading it to a you may consider to use securesha.re.

This online service let you to share a file through its online service encrypting it before it is uploaded to the securesha.re servers.

DevStash.io uses a 128-bit client-side AES encryption through a SSL protocol. This website automatically offers a 40 charaters long, randomly generated password that can be changed by user if he/she prefers to use its own passphrase.

Moreover securesha.re keep the file reachable in a long, random URL to decrease that files could be discovered through a brute force search.

Last but not least, this website let you delete the uploaded file after a pre-defined amount of time or/and after a pre-defined number of views. The default configuration allows just one view and an automatic deleting after seven days but the views can be extended till 10 and the amount of days reduced to just 1 day.

Personally I normally prefer to encrypt files by myself before sharing them online but I will keep securesha.re in mind in the case I need to share a file and I have not my laptop with me.

Link
star-wars-logo

Image from opencastingcall2013.com

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

Could Privacy Law Limitations kill the Internet Dream?

Is Privacy a fundamental human right? Your personal answer to this question is the starting point to think about the current Internet legislation and to evaluate if the recent legal restrictions on civil rights could represent the “end of the Internet Dream.” A clear and motivated opinion about this issue is a strategic keypoint for all those people who, as me, operate everyday in one of the many Internet branches as consultants, lawyers, programmers, marketing experts, investors or, more often, as common users.

Dan Gillmor, via BACKCHANNEL, has recently underlined that a liberal legislation should not restrict end to end encryption, because it represents the best safeguards for tomorrow’s freedom. A standard use of fragile encryption, imposed by Law, will not only interfere with privacy, but will also heavily tamper with Internet global security.

o-INTERNET-PRIVACY-facebook

Image by quotesgram.com

On the other hand, Dan Patterson, via TECHREPUBLIC, has reported two different conversations with UN reporters who affirmed that strong encryption allows privacy and privacy is the corner stone of truth, especially for reporters, because it helps to “validate the veracity of information.”

Consequently, to preserve our privacy in our daily living it would be useful to:

  • Use Privilege VPN or  HTTPS connections when you surf Internet;
  • Use Encrypted Storage for your data, especially if you cannot avoid using cloud-based services;
  • Watch the Legislator: contact the MP/Politician who represents you and express your point of view, each time a restrictive Law proposal is under discussion.

As Citizens, the real challenge we have for the next months is represented by the influence we will be able to exercise on new Laws that should find a legal equilibrium between anti-terrorism surveillance and the need of protecting citizen’s personal information allowing the use of VPN/HTTPS connections and Encrypted Storage.

3 things you need to remember when Upgrading to Fedora 23 as for the Unicmen’s instructions

The upgrade from Fedora 22 to Fedora 23 is not automatic, as usual in my Fedora experience, but it is really simple to manage if you follow the path suggested by Unixmen.

There are few things you need:

connect your laptop to the power plug (if you use a laptop);

– a couple of hours (something more or less depending on your CPU, RAM, Internet connection speed, etc..);

few lines of commands on the Terminal

The upgrading process is well structured and to start it you need to launch Terminal and upgrade the native Fedora Fedup with its new version that now is integrated into DNF:

dnf upgrade

Then you have to install the DNF plugin:

dnf install dnf-plugin-system-upgrade

and finally you can start the “core” part of the upgrade just typing:

dnf system-upgrade download –releasever=23 –allowerasing –best 

Where:

– allowerasing will continue the upgrade also in presence of any “old” (not yet upgraded) third part repositories that normally would have completely stopped the main upgrading process

-best is a verbose mode in case of unsatisfied dependencies

After a while, depending on your Internet connection speed, you will be able to conclude the upgrade typing:

dnf system-upgrade reboot

Your laptop will reboot and the upgrade starts.

From now you spend more than 40 minutes waiting and answering to few easy questions that the OS asks you to solve some configuration matters.

The length of the waiting time depends obviously on the CPU, the RAM and the type of Hard Disk installed into your PC.

That’s it!

Link
http3a2f2fwww-redpill-linpro-com2fsysadvent2fassets2fimg2fbackup_disk

Image from redpill-linpro.com

Cloning block devices online using Software RAID