Secure and Stop Straining Your Eyes

Written on August 20, 2013 by Mish Asia

The web is a platform for a lot of things. It is one of the most used platforms, not only when it started or introduced, but it is well known in the present day. The moment you wake up, it is one of the first things you do, you open your gadget or personal computer and check on your emails, notifications from social networking accounts or simply check on what’s hot or not in the news section. That is how important the web is. There are a wide array of advantages you can get from the web. However, these benefits you get from various web applications can be somewhat hazardous to your health, when it comes to browsing. Besides web security issues, you may be compromising your health when you open your eyes or greet your morning with your screen. Your eyes can be strained from this habitual act of staying on the screen so much. This is why it is wise to greet the morning with a breather by going outside and by relaxing your eyes with nature. If you work in front of the computer, it is wise to look at something green (grass, wall, paper) every once in a while to ease tension.

Photo Credits

Reminders Again

Written on June 19, 2013 by Jerson

It is easy to communicate with anyone today. The internet has changed communication and connectivity worldwide. Now, you can easily meet someone two continents away with the click of your fingers. Businesses and even personal activities have changed because of this. Internet security is always front and center as life and lives are more and more exposed to cyber space. Let’s take a moment to look at some simple tips, habits that are so easy to do but are often overlooked or forgotten.

http://images02.olx.in/ui/11/56/61/1294754306_105345561_1-Computers-and-Laptops-Servicing-and-Maintenance-Secunderabad.jpg

When you are logged onto a site, be sure to log off on the sites page and not just exit the window. A lot of people think this is as good as signing out but it is not and you are just leaving yourself open to security breaches. When browsing, use the private browsing option, visit sites that are HTTPS, or delete your browsing history after every visit. Finally, do not leave any personal information online.
Remember these three simple actions go a long way towards self protection.

Pause for a Moment

Written on April 30, 2013 by Victoria

Let us take a moment from web design and security and look at an activity that is so every day, so mundane, it is almost forgotten. Maintaining your computer is an essential part of making it last as long as possible. This is simple and, if done regularly, can add to the life of your equipment.

cleaning computers
credit

Make sure to wipe dirt off your monitor. Do this by spraying glass cleaner onto a soft cloth. Do not spray on the monitor itself or you risk damaging it. Remove particle from your keyboard using a mini-vacuum or tweezers. As with your monitor, do not spray anything directly onto the keyboard. Keep your equipment away from food or drink. Perhaps twice a year, remove the case of your computer and dust the insides sing a compressed air can.

These simple steps done regularly will ensure the long life of your computer.

Security Reminders

Written on March 30, 2013 by Victoria

You can do anything on the Internet now. You can buy your groceries, order take out, order medicine, buy anything from furniture to a trinket. You can do online back transaction, book flights abroad, bus tickets cross country, rent a car, you can even work online. A whole life can revolve around the Internet and movies where the individual does not feel the need to leave the house because everything can be done with the click of a mouse is not a hypothetical but a reality. That said, it is always important to recall safety online.

small__2404978535 (1)
credit

Online safety is something that everyone needs to know, and for those who do any activity online, this is something they should know by heart. So some basics: keep your firewalls, spyware, and virus detection programs updated and running on regular intervals. Do not go to unsecured sites as much as possible. When you are on social media, switch to https. Block pop ups and do not click on links in unknown email. Do not leave personal, especially financial detail online. Vigilance is the key to successful inline activity.

Reiterating the Importance of Security

Written on January 27, 2013 by Victoria

We have discussed the many reasons a person should be vigilant about online security. There really is no way around going online to do some kind of activity. Today, classes and even homework is given and reinforced online. So instead of remaining backward or hiding from the inevitability of the Internet, it is better to know how to protect yourself and to exert all the necessary effort to do this.

small__1594411528
credit

The problem is that we often do not think negative things will happen to us. As long as it is a hypothetical, then it’s importance is not deeply felt. Let’s look at the latest case of online security fraud that has caught the nation’s headlines. Footballer Manti Te’o and his girlfriend who supposedly died from leukemia but who in fact never existed is a classic example of how online security must be strictly applied. The latest news that the image of his girlfriend was actually a picture stolen off Facebook is further proof that it can happen to anyone, anywhere.

Let’s remember to be safe and to apply our Internet security protocol at all times.

How to Handle Malware

Written on January 1, 2013 by Victoria

If you are new to the computer world, maybe you haven’t really felt the need to be informed about this before, or maybe you are just starting to do activities online, you will have to familiarize yourself with the evils out there. Everyone knows that once you get set up, whether this be a PC, laptop, tablet, smart phone or all, you need to have the proper security systems set up.


credit

Why is this? Because there are such things as ‘malicious software’ or ‘malware’ that exists to destroy your computer system and to steal your information. Making sure you are armed to defend yourself against malware should be the first thing you do when you get your computer set up.

There are different kinds of malware out there but do not fret. Getting started with your basic security setup is a good enough shield to begin with. You can build on this. Make sure you have your firewall set up, your security software installed and regularly updated and you should be good to go.

Password Planning

Written on November 30, 2012 by Victoria

Doing some kind of activity online is unavoidable in these times. The simple act of emailing someone is an activity online that will leave a thumb print. Since this is now a fact, a concern for a lot of people is how to maintain privacy online. One sure way to do this is to manage your information online, specifically your passwords.


Photo Credit

Back in the day, you only needed to memorize your banking pin. Since these were not too many and were all numeric, the habit was to create one password for all accounts so this would be easy to remember. For internet accounts of any kind, you should do the opposite to maintain your security. Whether we are talking about the simple creation of an email address to something more financially based like online shopping, you should remember to never have the same password for these accounts.
Following this simple advice will do so much in ensuring you are secure online.

Web Application Firewall Concepts

Written on November 13, 2012 by Jerson

1. Use Cases
1. Web intrusion detection and prevention
2. Continuous Security Assessment
3. Virtual (or just-in-time) patching
4. HTTP traffic logging and monitoring
5. Network building blocks
6. Web application hardening
2. Deployment models
1. Inline
2. Out of line
3. Embedded
3. Data Model
1. Model construction
2. Persisting information across requests
3. Distinguishing sessions
4. Distinguishing users
4. Analysis Model
1. Negative security
2. Positive security
3. Anomaly scoring
4. Learning
5. Evasion
6. Impedance mismatch
5. Traffic logging
6. Special protection techniques
1. Cookie protection
2. Cross-Site Request Forgery
3. Brute force attacks
4. Denial of Service attacks
5. PDF UXSS protection

Web Security Guidelines

Written on October 30, 2012 by Victoria

photo
There is this saying that you can do and find anything on the Internet. That was an exaggeration a decade ago but is certainly true now. Today, you really can get and do anything on the World Wide Web. With a few keystrokes you can make purchases, get hired, even arrange to move to another continent. There is no limit.
This is mind, one must always be vigilant about web security. Since you can do anything on the web, you must be sure to protect yourself from those who would take advantage or expose you or your profile to theft or fraud.
There are some simple rules to protect yourself. Do not leave any financial information online. Make purchases using an online account and not a credit card. Do not make your password easily cracked ones. And do not access sites you are not sure of. These three steps are foundational for internet security.

Measurements used for Internet Speed Tests

Written on September 10, 2012 by Jerson

QOS

Represents the level of consistent download capacity provided by your Broadband or DSL providor. The higher QOS percentage, the higher the overall quality of the internet connection. High quality plus internet speed provides better connections for VoIP (voice over IP), Citrix and other high traffic applications.

This figure should come in around 80 or higher yet. This does not mean that you won’t find success at lower speeds, but on average, the speed test should report >= 80.

RTT

The Round Trip Time (RTT) reports the total time in milliseconds (ms) to send a small data packet in our internet speed test and obtain a reply back. The faster (smaller) the RTT, the better broadband speed you’ll have.

For Voice over IP, round trip delays can occur when results exceed 250 mSec or 150 mSec one way which is also considered the maximum desired one-way latency to achieve high-quality voice.

Max Pause

Max Pause is the longest pause recorded during the Broadband Speed Test data download. This should be a very small number. If not, it could indicate Internet speed congestion or a bad broadband connection.