Tag Archives: Computers & Internet

Link

Is Computer Security Becoming a Hardware Problem? by Michael Byrne via vice_motherboard_logo

Benefits vs. Risks Of Cloud Computing (… and some tips from my experience…)

Previously posted on Medium

Today utilizing an external drive is the most often used strategy for having an efficient backup storage. On the other hand, the people who contemplate utilizing cloud computing for this purpose often wonder if the technology is worth the attempt.

Users of the system ensure that there’s no reasons why anyone should keep from utilizing this system as it guarantees numerous additional benefits as when compared to the traditional methods. The truth that you’ve to fork out a “minuscule” amount of cash on a -monthly- basis for the use of cloud data storage is one motive behind prospective users to be careful.

 

The following benefits of the technology are cause enough to make sure that this expense property is truly worth it.

Extensive storage space: The most elementary advantage of utilizing the cloud is that you can store any quantity of information, which is difficult when using drives. The system is very simple to utilize as the account is created within a few minutes, as opposed to the effort and time spent on going searching for an additional drive.

No Physical existence: Once you have saved your data on the cloud, it becomes the obligation of the supplier to worry about its preservation. Rather than purchasing and saving these numerous added drives, one only has to stay attached to the web in order to access the stored information.

Convenience of automatic back-up: The consumers of cloud computing do not have to trouble making sure that they have related the external drive to their computers and that they take back-ups occasionally. The options on the cloud system may be altered as per the user’s setting as to whether the back-up must be taken several times in one day or once each day. The only obvious prerequisite for the system to be copied is the internet must be related and anything else is looked after.

Easy restoration: In usual conditions, locating and repairing a hard disk drive from backed up information is a long and troublesome process which calls for the providers of the pc technician. The cloud consumers are spared from such an annoyance as this restoration procedure is made quick and simple. If at all the users however have questions about managing this on their very own, they could always seek help from the companies plus they’ll be more than happy to oblige.

It is important to understand the dangers involved when transferring your business into the cloud before contemplating cloud computing technology. You should perform a risk assessment procedure before any control is handed over to a service provider.

First of all you should deeply understand what is the real privacy protection offered by the Cloud Provider. Nowadays the best (more secure and/or more respectful of your privacy) Hosting – Cloud Providers are redeploying their storage servers from USA to Switzerland. This happens because in general Swiss has a better privacy protection and it is outside the European Union and United States Laws. This means that in Swiss, disclosure order/warrant have less possibilities to have effects than in US or EU if they have not a very good legal motivation.

More in general, it is possible to affirm that any location of the Cloud Provider could be good if you understand the local privacy legislation before you use its services. Moreover the Cloud Providers have to guarantee an encrypted storage without detaining any key that can, directly or indirectly, decrypt the information you save or use through its servers. Consequently all the data transmission have to use https protocols with a recommended minimum of 1024 bits encryption. On my side I privilege nothing that offers less than a 2048 bits https protection.

Usually you can have a good representation about the security of the services offered and the legal legislation that will affect your Cloud Service contract if you read carefully the EULA.

For this reason, before committing, you should inquire which privacy and security laws will apply to the information and where your information will be saved. In case the information will be saved outside of your Country, you will also need to be informed as to the laws and regulation demands in that specific geographic place.

Moreover you have to understand if the Cloud Provider that you are choosing to support your business, is really able to guarantee an adequate service level. Don’t be worried to send inquires if the information provided in their Service Level Agreement don’t solve tour doubts or you think that the provided services could not match with your needs in future because they seems not enough flexible.

Anyway, try to prefer a Cloud Service Provider that has an effective Customer Support Service that can promptly (24/7/365) solve your problems. Cloud Service reseller are (sometimes) cheaper but they could not be the best choice for your business technical needs.

cloud-computing-defined

Courtesy of webopedia.com

Last but not least, don’t underestimate the security holes represented by the human factor. You have to offer the right level of training to your employees and colleagues because just a single mistake by them, can be transformed, by an hacker or a competitor, in a potential debacle for all your Cloud System. Invest in learning courses about Cloud risks for all your employees and colleagues, let them understand what are the potential risks of using Cloud Services. Don’t be afraid to introduce “difficult” technical concept (as e.g. man-in-the-middle attacks, different encryption systems, social engineering tactics, the importance of digital signs, etc..) to them.

For this reason, in order to reach a better security level, configure all the electronic devices (common: tablets, smartphones, laptops & uncommon and often more dangerous: all the hardware with an embedded OS especially if they are able to communicate data through Internet or your phone provider) in order that they use your VPN by default. If you will be able to secure all the transmission through your reliable VPN you could have solved at least the 40-50% of the potential mistakes that are normally made by your employees or colleagues.

Can audio go viral on Facebook? Here’s what happened when NPR ran an experiment for a month by Serri Graslie via NiemanLab

“Trust me, this is really, really great even though you don’t know who’s talking and there’s nothing to look at and I’m asking you to focus for 40 seconds!”

Quora: a great, powerful tool for Social Media Marketing!

Quora? Are you sure about what you are saying? Why?

Yes, I am more than sure. I know that you could be surprised about thinking Quora as a Social Marketing tool but it is really a powerful if you learn how to disrupt its potential.

In few words Quora is you personal brainstorming tool. A real powerful tool if you consider that people in Quora are in the main part experts into their sectors.

Quora-Personal-Branding

If you post a question, promote it -asking to Quora suggested experts to answer- and you don’t receive any reply, it means you posted the wrong question! Quora people don’t waste their time answering to obvious or silly questions. So, if this happens, don’t be ashamed but remove it and start thinking what is the mistake you did. In many cases if you spend some minutes thinking about it you will find the answer you were asking for.

But, remember, don’t limit yourself to only asking but start answering the question that Quora will propose to you. Good answers will get you being noticed. And it could be helpful for your CV or for attracting traffic top your social media or blog.

For this reason I suggest you to spend the right time to write your profile when you join Quora. It is important for a couple of aspects. The first is related to the questions that Quora will propose to you: especially at the beginning they will be strictly related to your Bio. The second aspect is directly linked to your social exposure. Don’t forget that Quora is not only a collaborative platform but it is also a precious, “shining” window were you can directly show your expertise and indirectly attract new follower to your social media, blogs or online activities.

quora

Quora is the right tool to create and nurture your personal branding strategy. If you think to be an expert on some topics, go to Quora and show your knowledge there. Because Quora is the best place to find people that are looking for the right answers to their top engaging questions.

Moreover Quora let you connect with experts in all the topics you prefer. Doing this you are able to create your personal web of experts and potential promoters for you or your activity. After a while, I suggest you to actively search the most appropriate questions you like to answers. This strategy will enhance your presence on Quora and allows you to give your best when answering.

Last but notquora-logo2 least, don’t be obvious when you answer to a specific question directly related to your business or activity. If you want to promote your activity or your website you need to clearly explain why you think that it is the best solution to that specific question. In few words you have necessarily demonstrate to the questioner (and to all the other experts who are going to read you) why you or your services or website are the first best for his/her needs.

To conclude let me say that Quora is really essential for your Social Media Marketing and you should be really interested to test and include it into your Social Media Strategy!

3 steps to install DNScrypt to improve your privacy – Ubuntu version

Also if you use OpenDNS to improve your standard of privacy, you are not protected by “last mile” dangers but you can boost your security installing DNScrypt on your digital device. DNScrypt “works by encrypting all DNS traffic between the user and OpenDNS, preventing any spying, spoofing or man-in-the-middle attacks”.

DNScrypt “is a protocol that authenticates communications between a DNS client and a DNS resolver” and it “is not a replacement for a VPN, as it only authenticates DNS traffic, and doesn’t prevent “DNS leaks”, or third-party DNS resolvers from logging your activity”.

For this reason you have to be conscious that DNScrpt is just a -very good- improvement of your privacy but not the definitive solution to all your privacy concerns.

DNScrypt is so versatile that you can install it on every kind of device you prefer. In fact it is possible to download DNScrypt for servers, IOS, OSX, Android, Windows and Linux computers (DNScrypt-proxy version). Obviously the installation and setup will vary a little depending the OS you installed on your device.

Concept-Skyscraper-Feeds-on-Air-Pollution-Uses-It-to-Grow-433607-2

Image from softpedia.com

Here we are talking about DNScrypt installation on Ubuntu.

For this purpose I suggest to use the Terminal that allows you to install DNScrypt i just 3 steps:

sudo add-apt-repository ppa:anton+/dnscrypt
sudo apt-get update
sudo apt-get install dnscrypt-proxy

Last but not least, you need to interface the Internet traffic of your computer through the DNScrypt-proxy. For this reason you have to Edit your Network Configuration and add the address 127.0.0.2 to the “DNS Servers” line as for the below screenshot:

DNSCrypt

Now you can start DNScrypt just typing:

sudo dnscrypt-proxy -R opendns -a 127.0.0.2:53 -u okturtles

Where, in my specific case, okturtles is the name of the remote DNS resolver I decided to use. I chose that specific risolver from the list I found into into my computer after DNScrypt-proxy installation:

/usr/share/dnscrypt-proxy/dnscrypt-resolvers.csv

As usual in similar situations, you may want to spend another couple of minutes to configure your computer to start DNScrypt at the computer boot. Open the Session and Startup manager through the desktop Dash and Add this specific command to the Application Autostart menu:

sudo dnscrypt-proxy -R opendns -a 127.0.0.2:53 -u dnscrypt

Configure OpenDNS on your Ubuntu Computer through DDclient in just 6 steps – Tutorial

1 – Why should I change DNS? 
You “use” them in any moment, every time you are in front of a computer but usually you don’t consider to directly manage or change them because you think that it is not worthy to do anything with them. 
On the contrary, you know that many different online companies offer dedicated DNS addresses you can use to substitute the default DNS addresses provided by your ISP.
So, at this point, your main question is “Why should I change DNS on my route or my computer”?
For example, for one or more of these different reasons:
– to have a chance of a possible increasing of speed and reliability when you surf Internet; 
– if you want to delegate to a third “professional” part some security tasks (e.g. third party security filtering to protect yourself against phishing or viruses);
acces websites that are normally geoblocked by commercial policies/agreements or censorship imposed by Governments;
parental monitoring if you prefer to have a rough idea of what websites your children visit or if you whant to filter some specific contenents.
2 – Choose a reliable DNS provider
If you decide that you want to try a different DNS provider you need to choose a reliable one. A quick search on Internet will help you to find the most appropriate DNS Provider for your needs.
In this specific case we are examining how to configure the DNS from OpenDNS.com so, if you want to test it, you have to sign up for a free account on opendns.com or simply copy the DNS addresses you find in the bottom right of their homepage or sign up for a OpenDNS.com free account. In the last case, you have the possibility of monitoring your traffic in a professional statistical way and probably you will satisfy one or more of the reasons that may explain your choice to use different DNS. 
3 – Install DNS from OpenDNS on your router
If you want to use OpenDNS on your LAN you have to configure the router through the its configuration interface. The way you can do this varies from one router to another but in all the popular models you will easily find a specific sub-menu where you could activate the “use predefined DNS” option compiling the two addresses provided by OpenDNS.
In this way all your LAN traffic will be pipelined through OpenDNS and you will not need to singularly configure each computer you have.
dns4

Image from: oriental-press.com

4 – Install DNS from OpenDNS on your Linux computer
4a – Preliminary configuration.
The problem with opendns.com is that it doesn’t provide an official tutorial to correctly install its DNS on a Linux machine. For this reason you can follow this brief notes that I wrote after installing it on a Ubuntu 14.04 LTS Ubuntu computer.
Go to the OpenDNS.com support page dedicated to the installation on Ubuntu and follow their instructions:
I exactly followed all the instruction till the point 8 but, when I had big problems when I typed:
sudo ifdown eth0 && sudo ifup eth0
because this message appeared:
ERROR unknown interface eth0=eth0
The matter is that my ethernet is really named eth0 (I double checked using the commands ifconfig and netstat -r -n) but it was not possible to operate on it.
To solve this problem I used the Poorak’s Blog suggestion and I had to open the interface file via Terminal with:
sudo nano /etc/network/interfaces 

– or if you prefer:

sudo gedit /etc/network/interfaces
and manually add these lines:
auto eth0
iface eth0 inet dhcp
then I restarted my networking
sudo /etc/init.d/networking restart
4b – Install DDclient on Ubuntu if you have a dynamic IP
Normally the Internet Service Provides provides a dynamic IP to users that may change over time. So, if you don’t want to pay more to obtain a static IP, you need to install a software that could constantly communicate your actual IP address to OpenDNS.com. In my case, I dedcided to install DDclient to be able to continue to properly use the OpenDNS.com services.
To install DDclient I preliminarly had to install coreutils through Terminal:
sudo apt-get install coreutils
and the required SSH and SSL sockets:
sudo apt-get install ssh libio-socket-ssl-perl
and finally the DDclient:
sudo apt-get install ddclient
At this point you manually edit the configuration file:
sudo nano /etc/ddclient.conf
(or, if you prefer sudo gedit /etc/ddclient.conf)
typing:

##
## OpenDNS.com account-configuration
##
use=web, web=myip.dnsomatic.com
ssl=yes
server=updates.opendns.com
protocol=dyndns2
login=opendns_username
password=opendns_password
opendns_network_label

where:

– ‘opendns_network_label’ is the label given to the network you’re updating in your account.
If you have spaces in your network label, replace them with an underscore ( _ ) 
You can find the network label in the Settings Tab of the OpenDNS Dashboard.
– the login is your email address with OpenDNS
– the password is your opendns password. 
“If you have special characters in your password wrap the password in single-quotes ( ‘ ). 
If there are any single-quotes in your password, put backslash ( \ ) before the single-quote to escape the character”.
References:
5 – Start OpenDNS and DDclient on your Ubuntu computer
At this point you have all the elements to start  so you can open a Terminal and type: 
sudo /usr/sbin/ddclient chkconfig ddclient on && sudo /usr/sbin/ddclient service start
On the other side, if you want to check the status of DDclient, you will type:
sudo /etc/init.d/ddclient status

6 – Configure Linux OS to start DDclient at boot on Ubuntu

On Ubuntu is really simple to configure DDclient to start at the computer boot. You have to open the Session and Startup manager through the desktop Dash. Now you are able to Add a specific command to the Application Autostart menu to run DDclient at the boot:
sudo /usr/sbin/ddclient chkconfig ddclient on && sudo /usr/sbin/ddclient service start
If you are configuring OpenDNS through DDclient on a different Linux distribution you can google the right tutorial or follow the guide created on aboutLinux.info.
At this point you will automatically use OpenDNS on your Ubuntu computer. 

3 Good Reasons to persist in using Google ncr = no country redirect

why_istock_000007228941xsmall-300x198

Image from: marketing-partners.com

Since some weeks ago, I used:

http://google.com/ncr

for my web search and I was able to open the main Google Homepage without to be redirected to any local Goole site.

What I usually obtained was:

1 – less “personalized” search results: the algorithm will be not “contaminated” by my local IP and I will able to find information “cleaned” by local trends;

2 – the possibility to use the “same” Google even when I am abroad;

3 – the security that my searches were always up-to-date respect the global actual trends. For my experience when I search some particular topics as “marketing” I obtain, in the first Google page, fresh news only using Google in its NCR version. If I try to use my local Google homepage I have to spend more time setting the Google’s “advanced search” or trying to understand what information are “really” fresh new.

url-720x340

Image from: mods2015.com

I found the right solution when I visited ycombinator.com and I found the post created by newman314 that submitted a link that combined NCR and SSL protocol (for a little bit of more privacy).

https://encrypted.google.com/search?q=test&qscrl=1&n…

https://encrypted.google.com/search?q=test&qscrl=1&ncr=1

Where the word “test” is what I am looking for.

Then I also found a faster solution by dragop:

http://www.google.com/?gfe_rd=cr&gws_rd=cr

and, in the same webpage, a shorter version from 3dfan:

http://www.google.com/?gws_rd=cr

On my side I prefer to use this other URL that gives me the same results through an SSL connection:

https://encrypted.google.com

To be sure that the results were really the same and not simply related with the English language and influenced by the IP, I tested this URL comparing them from what I obtained from the above mentioned:

http://www.google.com/?gws_rd=cr

I discovered that what I “received” using encrypted.google.com are really the same links and they are not just the standard local results in the English language.

I know that cookies will not allow me to have real “septic” results but this is the first step to a less passive use of Google search because I would like to be a more active user and not just a passive customer pampered by Google.

Start 2016 with a bunch of unusual Linux OS!

linux-distributions-to-look-forward-in-2016

What’s better than testing? For me nothing!

For this reason, let me introduce some “unusual” Linux distribution proposed by Jesse Afolabi @Jesseflb via Techmint.

VeltOS and PapyrOS are based on Arch but the last one is in its pre-alpha testing so it’s not suggested for beginners.

Moreover, we may decide to begin 2016 with Korora that is still one of my favorite projects also after so many years since the first release.

Last but not least, we have Solus OS 2 that it is not the most Linux distribution I tested but it is stable and really well built.

Happy 2016!

Protect your Privacy: use a Self-destructing, single-use File Sharing Service

encryption-100410129-primary-idge

Image from infoworld.com

If you need to share a confidential file to one of your colleague and you have not enough time to manually encrypt the file before uploading it to a you may consider to use securesha.re.

This online service let you to share a file through its online service encrypting it before it is uploaded to the securesha.re servers.

DevStash.io uses a 128-bit client-side AES encryption through a SSL protocol. This website automatically offers a 40 charaters long, randomly generated password that can be changed by user if he/she prefers to use its own passphrase.

Moreover securesha.re keep the file reachable in a long, random URL to decrease that files could be discovered through a brute force search.

Last but not least, this website let you delete the uploaded file after a pre-defined amount of time or/and after a pre-defined number of views. The default configuration allows just one view and an automatic deleting after seven days but the views can be extended till 10 and the amount of days reduced to just 1 day.

Personally I normally prefer to encrypt files by myself before sharing them online but I will keep securesha.re in mind in the case I need to share a file and I have not my laptop with me.

Link
star-wars-logo

Image from opencastingcall2013.com

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?