Mar 25, 2019

How To Tell If You're "Shadow Banned" on Twitter

Have you heard of the term shadow banning on Twitter? In short, it's when Twitter feels that you are violating some broadly interpreted term of service, so they limit the reach of your account... and they don't tell you about it! The funny thing about it though is that it seems to only happen to conservatives.

From The Independent:
The issue of online "shadow banning" has once again provoked a major debate about free speech and censorship, after US President Donald Trump accused Twitter of silencing Republicans. 
Shadow banning essentially means that a user of Twitter or any other online forum is not actually banned outright. Instead, all of their posts are made only visible to themselves. 
For example, if a Twitter user was shadow banned, they would still be able to see their tweets but no one else would. The idea is to limit the reach of a user without them being aware that they have been silenced – potentially preventing them from retaliating against the moderators responsible for the ban.
Well, Shadow Banning is a very real thing. In fact, a recent hidden camera video from Project Veritas shows how Twitter engineers use Shadow Banning to silence conservatives:




So why am I bringing this all up? Well, our Mainwashed political Twitter account recently got shadow banned and we didn't even realize it! How did we figure it out? I'm glad you asked!

We found an online Shadow Ban check tool! All you have to do is enter your Twitter handle, and click check!



I'm not sure who exactly we pissed off, but we're taking it as a compliment that we did! It means our message is getting out there!

Anyway, if you are a conservative person on Twitter and your reach has been significantly stifled, try this tool out. You might just find that you've been Shadow Banned!

Mar 18, 2019

The Rise of Kubernetes [Infographic]

At the company I work for during the day that shall remain nameless, we're starting to look at containerized application deployments instead of running applications on servers in an "old school way."

One thing we're starting to look at is Kubernetes. If you haven't heard of it before, here is a short description from their page:
Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications. 
It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community.
From what we've seen, Kubernetes will drastically change the way my company hosts, runs and deploys our applications to clients. With that in mind, I found this really cool infographic about Kubernetes. Check it out!



[Via Mapr]

Mar 11, 2019

Should I Bother with Mobile Marketing?

Have you ever wondered whether or not your mobile marketing campaigns are worth the time and effort you spend on them? There's no denying that they're cost effective, but are they getting the kind of results you hoped for? Should you try something else instead?

Before you abandon your mobile marketing efforts for good, consider this. The team at App Geeks found that in 2015, 92% of adults had a mobile phone. Fast-forward to this year, and the evidence in favor of mobile becomes even more compelling: 55.79% of web searches were conducted through a mobile device.

There are several other similar statistics in the infographic below, so we won't go into those right now. We've shared a copy down below so that you can see for yourself.

It won't take long to read through, but don't let that fool you—it's packed with information. What's nice about its format is that it is all pure facts. There's no airy-fairy, flowery prose to wade through either.

Considering the medium they're talking about, this makes sense. After all, with mobile marketing, you need to get your message across quickly and succinctly. There are places to publish a novel, but this isn't one of them.

What's also interesting with the research they conducted is that they looked at case studies of how companies used this form of advertising. So you get the statistics proving why you should look into it, as well as the practical examples of it in action.

But why are we still talking about this? You want to check out the infographic, don't you? So here you are—enjoy. And don't forget to leave us a note if you want to see more posts like this one.



Mar 4, 2019

5 Signs That Your Cyber Security Needs Upgrading

Unfortunately for too many businesses, it is simple to get left behind. Doing this can render you vulnerable to hackers and in the risk of suffering serious financial and reputation harm. Does your company show the signs of poor cyber safety? Listed below are just five of the major signs which you might need an upgrade.

1. Your defenses are not proactive

Cybercriminals and hackers have gotten so sophisticated that relying solely on traditional security defenses like firewalls and anti-virus software is something of the past. In 2018 it is not sufficient to assume that your perimeter protection will block all known threats, or respond to incoming attacks once they happen -- cyber-attacks are too damaging to your business for it.

Instead of attempting to take care of cyber-attacks while or after they've occurred, it's more economical to concentrate on prevention and early detection. Many cyber security firms provide proactive community monitoring to help detect threats and react before they can inflict damage and disturbance.

2. Your business is growing

The cyber security requirements of almost any business evolve continuously as a result of business growth. As your business expands you might be interested in investing in technologies offering productivity and cost-saving advantages such as cloud computing along with the Web of Things (IOT). Doing so without concurrently strengthening and assessing your own defenses can put the whole of your organization at risk from cyber criminals.

If your business is going through a period of considerable expansion you should put some thought in how this will affect your current IT infrastructure. As you encounter expansion your cyber defenses need to develop also.

3. You start seeing regular attacks on your systems

One of the most significant indicators that you want to boost your electronic defenses is if you are beginning to see normal attacks taking place from the system. Cyber-attacks are sadly becoming part of the lifetime of virtually every company in the united kingdom , but getting murdered may also show that your feeble defenses make you a simple target.

You shouldn't assume that in the event you have suffered one attack, you've been unlucky and are unlikely to endure another. Hackers will always attempt to compromise weak targets, and if your company has been targeted in the past you're advertising the fact your systems aren't especially robust.

4. You haven't upgraded your security in a while

Technology changes quickly and with hackers becoming more skilled and advanced, you will need to move constantly. When it's been a matter of decades without any substantial changes to your security system then you could be in a very vulnerable position. Once again, it's a good idea to work with experienced professionals to help direct any improvements.

5. You're not keeping up with new regulations

Have you been captured off-guard from the General Data Protection Regulation (GDPR)? With new guidelines governing businesses which manage any kind of private information, many companies are made to examine and update their own systems and procedures to attain compliance.

It's very important to be aware that a crucial component of the GDPR will be the requirement to safeguard the personal data your organisation procedures . This means that you must demonstrate that suitable measures are set up to defend your company against cyber attacks. It can be a good idea to utilize outside GDPR specialists who will be able to provide advice and advice on the Actions you Will Need to take

When you consider telephone theft, then you may think of someone physically stealing your cellphone. However, with our lives today saved to our telephones, we need to be more concerned with individuality hackers stealing our private data, not only the phone itself. When it may feel safe to work with a Wi-Fi hotspot at a cafe, there is always a possibility your personal information has been hacked into, and this is very often far more valuable than your wallet or keys.

Our telephones have become an extension of ourselves, almost like getting an excess limb. A Norton report from 2013 shows that 1 in 3 smartphone users have undergone cybercrime. So how can we stay as safe as you can when using our mobiles?

There are a few simple methods to staying safe online, like updating the cell software frequently or installing anti virus virus applications, however the most obvious tip is to keep away from Wi-Fi. If you are always on the move, this can be tricky to avoid at times, and that is where a VPN (Virtual Private Network) can be convenient. Ideal for remote working, VPN's will be the online model of computer firewalls, allowing a secure connection on a general network. Whether you're using your pc, phone or tabletcomputer, information running to and from the VPN server is securely encrypted. As a consequence, you can surf at will at a public area without danger of your information being hacked into.

How can you setup a VPN?

All of iPhones are currently encrypted mechanically, whereas Android mobiles are not. It is possible to set up a VPN for free on your android within your Wi-Fi phone configurations, but many experts suggest heading for paid services over free solutions for complete security. These solutions are offered for iPhones and Androids, also there are Apps like Express VPN that guide you through the procedure of establishing a server on your cell phone.

If you think locking your display will stop any data from being stolen, then think again. Although this is a fantastic beginning, it doesn't stop most tech-savvy fraudsters from gaining access to some data.

Other benefits of a VPN (besides security) include having the ability to see live TV or catch up when travelling overseas. Some people buy one to only unblock Netflix or alternative streaming sites. Basically, it will make it look as if you are in a different country letting you watch sites you might not otherwise have access to. However, this will only work if you pick the perfect server location.

Picking a VPN

There are a good deal of VPN suppliers around, and before you entrust them with your valuable information, it's a good idea to get your homework . So, what do you need to look out for when selecting the correct solution for your cellphone?

This all depends on what you are using it for. Prices for starters is critical, most suppliers offer yearly subscriptions and shopping around will let you get the very best bargain. But, there are more important qualities to look out for such as server location, encryption protocols, and any data or bandwidth constraints.

What you'll be using your own VPN for, will decide exactly what you need from these types of features. As an example, protocols change in safety, so if you're using it to unblock an streaming website then a'PPTP' protocol is adequate. But if you were planning to be sharing files and obtaining data then you need to be searching for a supplier that supports an OpenVPN. A list of the top suppliers for Android can be discovered on BestVPN.com.

Some state that checking a supplier's privacy policy is easily the most crucial element when deciding on the perfect product to buy. A supplier that logs all your information defeats the object of having a VPN in the first place. A service which is not required by legislation to log your surfing or data is just the one to choose if you're using it for highly confidential information transfers and to keep your data secure.

Feb 25, 2019

CHERRY INTRODUCES MW 8 ADVANCED: RECHARGEABLE, HIGH-PRECISION MOUSE



Kenosha, Wis.Cherry, the foremost provider of computer input devices, presents the MW 8 ADVANCED wireless mouse. This mouse offers innovative features and is built to meet the highest standards of the most discerning user. The MW 8 ADVANCED joins Cherry's portfolio as the new flagship mouse, combining timeless design with state-of-the-art technology.

Best materials and high-quality workmanship 

The CHERRY MW 8 ADVANCED features an elegant metal surface made of brushed aluminum that conveys the highest-quality workmanship. The rubber pads have the Voronoi cell structure on both sides of the mouse to ensure a good grip.

The MW 8 ADVANCED fits the hand perfectly, making it a pleasure both to look at and to use. To top off the MW 8 ADVANCED, Cherry added additional sophisticated features. For instance, the mouse includes an extra durable mouse wheel with optical scanning, a magnetic lock for the USB receiver, and a transport bag. These features make the MW 8 ADVANCED equally well-suited to mobile and stationary applications.

High-precision PixArt sensor 

The CHERRY MW 8 ADVANCED not only looks and feels nice but is also a top performer. From a technical point of view, MW 8 ADVANCED boasts the high-precision PixArt "track-on-glass" laser navigation sensor with optical scanning, ensuring the mouse can work on nearly any surface – including glass – without a mouse pad. In addition, the sensor resolution can be adjusted in four steps between 600, 1000, 1600, and 3200 DPI (dots per inch), ensuring the MW 8 ADVANCED is suitable for use with 4K monitors.

Wireless connectivity through 2.4 GHz wireless or Bluetooth 

The MW 8 ADVANCED also has multiple connectivity options. Users can simply connect the mouse to a compatible system using the built-in Bluetooth 4.0 functionality. Alternatively, one can use the supplied USB receiver to establish a 2.4 GHz wireless connection secured with AES-128 encryption.

Switching between the two modes of connectivity is a breeze, and is done by sliding the switch at the bottom of the mouse. Using this feature, you can connect the CHERRY MW 8 ADVANCED with a notebook and desktop PC at the same time, quickly switching between the two with the simple slide of a switch.

Integrated battery for long service life 

The integrated Lithium battery with a generous capacity of 550 mAh ensures a long service life, with one charge lasting up to 70 days. A two-color status LED provides information about the battery charge, the selected resolution, and the connection to the PC.

About Cherry 

Cherry is the leader in input peripherals for Desktop, Industrial, Security, Healthcare, POS and Keyswitch applications for over 60 years. Cherry is the global leader in the design, development, and manufacture of computer keyboards, mice, magnetic and chip card readers and the best mechanical keyswitches in the industry. Founded by Walter Cherry in 1953 and best known for our class-leading MX keyswitches, Cherry brings that same quality and durability to its entire product line.

Feb 18, 2019

5 Cybersecurity Risks Most Companies Have

The main cyber security risks in businesses 

1. Employees

The individuals that are involved in an organization are the major weak link in cyber security.

Employees fall for phishing emails. They click links or download stuff which turns out to be malware thus costing the organization a lot of money.

Educating the employees about cybersecurity and ai is the best approach to avoid this. 


2. Passwords

Every account which is associated with the cybersecurity firms or any other business must be secured using a strong password. If possible, 2-factor authentication should be applied too. Make it clear to everyone working in the company that they should never reuse a password that they are using in other web platforms.

In fact, employers should make it a company policy that every worker should change his/her password each month, even though the efficacy of this is being debated.

Additionally, tell your workers that they should never share their passwords with other people.

3. Patch Management

After the Petya and WannaCry attacks, the advantages of updating software were made clear. Those two attacks spread through exploiting a critical weakness within the Windows OS called Eternal Blue. Eternal Blue is what permitted the spreading of malware around business networks.

4. Other Weak Links

Some problems that organizations encounter are not brought about by their cyber security measures. They are brought about by the cyber security measures of some other organizations which they are working with.

You can implement the best cloud cybersecurity protocols however if the 3rd party which your organization is working with gets compromised, the attacker can gain access to your organization.

There are dedicated servers or network segmentation which can be used so that different organizations cannot connect directly to your organization. That will protect your company from the 3rd parties’ weak cyber security links.


5. Bring Your Own Device (BYOD)

BYOD is a common practice that most companies embrace. When workers come to work with their gadgets, they will also go outside with them or use them to work whenever they are away from their workplace.

The workers’ personal devices do not have the best kind of security are the office gadgets. They may easily be compromised by hackers. 

If you allow BYOD, then ensure you have a good cybersecurity and data protection policy in place. Steps, like permitting access to office networks via a virtual private network and ensuring that the workers implement 2-factor authentication, are recommended.

Conclusion

From those cybersecurity threats described above, it is obvious that educating employees is very important. Your employees must know the best cyber security measures and the danger they may be putting their employer in if they do not adhere to all cyber security measures.

About the author: Evelyn Poindexter is a professional interpreter from Great Britain with over 2 years of experience. Her hobby is writing however and she puts her mind into pieces she composes in order to get the best feedback from various audiences. She also hosts the website at besttechexpert.guide.

Feb 11, 2019

Azure: State of virtual disks on VM is 'detached' after an ASR test failover

At my day job that shall not be named, we ran into a very interesting issue over the last month and a half or so. You see, we run our production environment in Microsoft Azure, and the way we've configured our Microsoft SQL database cluster is by following this Always On Setup in Azure.

On top of that, for performance in Azure, we are using Microsoft Storage Spaces. If you aren't familiar with Storage Spaces, you basically take a number of physical disks (They are actually virtual disks in Azure) and pool them together so you are striping data across them. This increases your IO, and thus increases your performance. It's pretty slick!

Typical Storage Spaces/Storage Pool Setup


I digress...

Anyway, we wanted to add a new pool to both of our servers, so naturally we added the virtual disks in the VM, then created our pool in Microsoft Storage Spaces, and created our virtual drives on top. Simple right?

Well it was simple until we used Azure Site Recovery (ASR) to replicate these new disks to our DR zone in the East US region. When we did our test failover, and powered up our servers in the East US region, we noticed that the servers showed our virtual disks as being detached. WTF is that all about?!?!

Well after going back and forth with Azure tech support for weeks, my Systems Engineer finally figured out a fix by running a PowerShell command.

The command he ran was:

 Get-VirtualDisk | Where-Object -FilterScript {$_.IsManualAttach -eq "True"} | Set-VirtualDisk -IsManualAttach $False  

After running this on the production nodes from an elevated PowerShell, we no longer had the issue of the virtual disks replicating in a detached state when we initiated ASR test failovers!

Now why did Windows mark these new virtual disks to be manually attached in the first place? We still don't know that, but if you run into this issue yourselves at least you know how to fix it.



Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | stopping spam