Month: October 2017

Tech Terms: Doxing

Doxing is the process of gathering information about a person or business using online public sources such as social media profiles, reverse phone lookup and search engines. The information doxed may include a person’s full name, email address, address, telephone number, pictures and other personal details. Doxing typically leads to an anonymous person’s identity being revealed.

Why People Get Doxed
In some cases, a person is doxed simply because another person wants to learn more about them. There are also instances where a person is maliciously doxed and will find all their personal information has been collected and posted online in one place. A personal dox may be compiled for retaliation or vigilantism or used to threaten, blackmail or harass a victim.

Doxing (the gathering of information) is not an illegal practice, however it has a negative connotation because it violates a person’s privacy and is often used for retaliation or vigilantism.

Famous Dox
The phrase doxing garnered international news headlines when Newsweek was publicly accused of doxing Bitcoin creator, Satoshi Nakamoto. Some feel the writer invaded privacy and compared the act to criminal hacking, while others believe the doxing was honest investigative reporting.

Source

Advertisements

Tips & Tricks: Rename Files

Rename a file quickly Right-clicking and selecting rename is not very efficient. Instead press F2 while a file is selected to change its name. To alter the name of another file, type Tab without deselecting the current file. On Macs, hitting Enter will rename (which may sound counter-intuitive to Windows users) while Cmd + O is used to open.

Tech Terms: ADN

Application Delivery Network (ADN) is a suite of technologies developed to provide application availability, security, visibility and acceleration. ADNs are designed to ensure the safe and efficient distribution of business-critical applications across an enterprise’s network.

Compare ADN and ADC
Application Delivery Network and the closely-related term Application Delivery Controller (ADC) were marketing monikers first promoted by F5 Networks and later by competing ADN and ADC vendors for hardware and software solutions that provide front-end intelligence to facilitate and optimize application flows from client to server and back to the client.

Application Delivery Networks vs. Content Delivery Networks
Application Delivery Networks are often compared to Content Delivery Networks (CDNs), and the two terms are sometimes used interchangeably. The two types of networks share similarities and are both used to accelerate the web experience for users while reducing load times, but CDNs are typically deployed to optimize static content, whereas ADNs are more frequently used for web acceleration of dynamic content.

Source

Tech Terms: CDN

CDN is short for content delivery network. A content delivery network (CDN) is a system of distributed servers (network) that deliver pages and other Web content to a user, based on the geographic locations of the user, the origin of the webpage and the content delivery server.

This service is effective in speeding the delivery of content of websites with high traffic and websites that have global reach. The closer the CDN server is to the user geographically, the faster the content will be delivered to the user. CDNs also provide protection from large surges in traffic.

How CDNs Work
Servers nearest to the website visitor respond to the request. The content delivery network copies the pages of a website to a network of servers that are dispersed at geographically different locations, caching the contents of the page.

When a user requests a webpage that is part of a content delivery network, the CDN will redirect the request from the originating site’s server to a server in the CDN that is closest to the user and deliver the cached content. CDNs will also communicate with the originating server to deliver any content that has not been previously cached.

The process of bouncing through CDNs is nearly transparent to the user. The only way a user would know if a CDN has been accessed is if the delivered URL is different than the URL that has been requested.

Many Businesses Use CDNs
When delivering large scale websites to a global audience, CDNs can reduce latency, accelerate site load times, reduce bandwidth consumption secure applications and even block data scrappers and other forms of spammers hitting your server.

Source

Tips & Tricks: Bookmarks in Chrome

Icon-only bookmarks on your toolbar You can delete the name of your bookmarks leaving only the icon so they take up less space on the toolbar. In Chrome: right click the bookmark > edit > delete the name and save.

Tech Terms: LAN

A local-area network (LAN) is a computer network that spans a relatively small area. Most often, a LAN is confined to a single room, building or group of buildings, however, one LAN can be connected to other LANs over any distance via telephone lines and radio waves.

A system of LANs connected in this way is called a wide-area network (WAN). The difference between a LAN and WAN is that the wide-area network spans a relatively large geographical area. Typically, a WAN consists of two or more local-area networks (LANs) and are often connected through public networks.

Most LANs connect workstations and personal computers. Each node (individual computer) in a LAN has its own CPU with which it executes programs, but it also is able to access data and devices anywhere on the LAN. This means that many users can share expensive devices, such as laser printers, as well as data. Users can also use the LAN to communicate with each other, by sending email or engaging in chat sessions.

LANs are capable of transmitting data at very fast rates, much faster than data can be transmitted over a telephone line; but the distances are limited and there is also a limit on the number of computers that can be attached to a single LAN.

Types of Local-Area Networks (LANs)
There are many different types of LANs, with Ethernets being the most common for PCs. Most Apple Macintosh networks are based on Apple’s AppleTalk network system, which is built into Macintosh computers. The following characteristics differentiate one LAN from another:

  • Topology: The geometric arrangement of devices on the network. For example, devices can be arranged in a ring or in a straight line.
  • Protocols: The rules and encoding specifications for sending data. The protocols also determine whether the network uses a peer-to-peer or client/server architecture.
  • Media: Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some networks do without connecting media altogether, communicating instead via radio waves.

Deploying a Wireless LAN
Wireless networks are relatively easy to implement these days, especially when compared to the prospect of having to route wires when deploying a new wired network or overhauling an existing one. The first step in planning a wireless LAN deployment should be to decide on your wireless networking technology standard. Keep in mind that the standard you need to accommodate your network access points and routers as well as the entire collection of wireless network interface cards (NICs) for your computers and other network resources.

Source

Tips & Tricks: Private Browsing

Use private browsing The uses for not having cookies and history saved are obvious for certain activities, you know, like shopping for gifts on a shared computer (of course!). Pressing Ctrl + Shift + N will launch a new private in Chrome, Ctrl + Shift + P will do it in 

Tech Terms: OOP

Object-oriented programming (OOP) refers to a type of computer programming (software design) in which programmers define not only the data type of a data structure, but also the types of operations (functions) that can be applied to the data structure.

In this way, the data structure becomes an object that includes both data and functions. In addition, programmers can create relationships between one object and another. For example, objects can inherit characteristics from other objects.

The Basic OOP Concepts
If you are new to object-oriented programming languages, you will need to know a few basics before you can get started with code. The following Webopedia definitions will help you better understand object-oriented programming:

  • Abstraction: The process of picking out (abstracting) common features of objects and procedures.
  • Class: A category of objects. The class defines all the common properties of the different objects that belong to it.
  • Encapsulation: The process of combining elements to create a new entity. A procedure is a type of encapsulation because it combines a series of computer instructions.
  • Information hiding: The process of hiding details of an object or function. Information hiding is a powerful programming technique because it reduces complexity.
  • Inheritance: a feature that represents the “is a” relationship between different classes.
  • Interface: the languages and codes that the applications use to communicate with each other and with the hardware.
  • Messaging: Message passing is a form of communication used in parallel programming and object-oriented programming.
  • Object: a self-contained entity that consists of both data and procedures to manipulate the data.
  • Polymorphism: A programming language’s ability to process objects differently depending on their data type or class.
  • Procedure: a section of a program that performs a specific task.

Advantages of Object Oriented Programming
One of the principal advantages of object-oriented programming techniques over procedural programming techniques is that they enable programmers to create modules that do not need to be changed when a new type of object is added. A programmer can simply create a new object that inherits many of its features from existing objects. This makes object-oriented programs easier to modify.

OOPL – Object Oriented Programming Languages
An object-oriented programming language (OOPL) is a high-level programming language based on the object-oriented model. To perform object-oriented programming, one needs an object-oriented programming language. Many modern programming languages are object-oriented, however some older programming languages, such as Pascal, do offer object-oriented versions. Examples of object-oriented programming languages include Java, C++ and Smalltalk.

The First OOPL
Simula, developed in the 1960s at the Norwegian Computing Center in Oslo, is considered to be the first object-oriented programming language. Despite being first, Smalltalk is considered to be the only true object-oriented programming environment and the one against which all others must be compared. It was first developed for educational use at Xerox Corporation’s Palo Alto Research Center in the late 1960s and released in 1972.

Source

National Cybersecurity Awareness Month Week 4: The Internet Wants YOU: Consider a Career in Cybersecurity

According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers. It is critical that today’s students graduate ready to enter the workforce to fill the vast number of available cybersecurity positions. Week 4 will encourage students and other job seekers to explore cybersecurity careers. Key influences – like parents, teachers, guidance counselors and state and local officials – will learn more about this growing field and how to engage youth in pursuing cybersecurity careers.

Have no fear, Your IT Concierge, Zerofail Southeast, has you covered. We have a team of experts including cybersecurity experts dedicated to securing your network. Cybersecurity is an ongoing process that involves all aspects of your company. Education is the key to reducing data breaches. Phishing scams continue to be one of the main causes of data breaches. Phishing means sending people emails hoping you will click on a hyperlink or open an attachment to infect you and the network. Here are a few recent examples:

  • IRS Phishing Scam: Fake email from tax professional requesting that an insurance form be completed allowing hackers to use information to file false insurance claims or open unauthorized accounts/policies.
  • Facebook Phishing Scam