Sep 16, 2019

How To Implement TLS 1.3 for iRedmail Roundcube in Ubuntu

As many of you know, I use iRedmail for my personal email server and I run it on an Ubuntu 18.04 VM on Linode. No big deal right?

Well, periodically I like to check to make sure my SSL settings are using the most up to date security by running servers tests against SSL Labs. I decided I needed to implement TLS 1.3. It turns out, it's really easy if you are using Nginx like iRedmail uses!

For the iRedmail Nginx configuration, all you have to do is edit the /etc/nginx/templates/ssl.tmpl file and add TLSv1.3 after TLSv1.2 in the ssl_protocols section! Should look like this:

ssl_protocols TLSv1.2 TLSv1.3;

That's it! Do that, save the file and restart the Nginx daemon by running sudo service nginx restart!

Now I'm running TLS 1.3!

Sep 11, 2019

What Makes Bitcoin the Internet of Money

When cryptocurrency is mentioned, people think about Bitcoin more than any other type of digital currency. It was among the first in this sector and it has been successful throughout its history. Although many people interact with Bitcoin, they may not understand the underlying technology.

According to experts, there are international laws involved in creating Bitcoin technology. It functions under blockchain technology which, as we are going to see, is the genesis of better financial operations around the world.

The Pillars of Bitcoin Technology

  • Decentralized verification - Before a transaction is termed complete, it is verified by numerous servers across the world. This reduces theft and fraud, making blockchain technology one of the most trusted today. It also eliminates the possibility of sending money twice.
  • Decentralized ledger - This is where Bitcoin has made its reputation. The transaction information is not stored in one location like with many other financial operations. It is distributed across different servers, which means that anyone can verify it. This increases the level of transparency.
  • Peer-to-peer network - Bitcoin is a global digital currency that mainly operates through a P2P network. This allows peers to collaborate in giving loans, mining, and every verifying transactions. This network is very hard to kill as it is now.
  • Use of digital signature - It sounds easy to forge, right? Wrong! Digital signatures that are used in Bitcoin technology are verified by several parties and they are the center of its success in minimizing digital money theft.

Bitcoin - The Internet of Money

According to experts at Nakitcoins, a website that helps people buy and sell Bitcoins, this digital currency is revolutionizing the world of money at a rapid rate just like the internet is changing the world. Many financial operations are copying these pillars of technology in various ways to improve their operations.

Banks have started applying the use of digital signatures to promote online banking. As of now, those who have successfully implemented this has started enjoying the fruits of reduced hacking and fraud cases.

Apart from financial institutions using Bitcoin technology, people have also accepted the use of Bitcoins to transact. It is a better option that has brought convenience to online buyers and sellers. Many businesses and suppliers across the world now use Bitcoin. Although other digital currencies are used, none have been as globally accepted as Bitcoin.

The other reason why Bitcoin has become very popular is that it is now a thriving business. Through various exchange platforms, people can buy and sell with the intention of making a profit. The digital coin has been making progress in its stability, which improves its reputation among everyone around in the world.

Banks have started applying the use of digital signatures to promote online banking. As of now, those who have successfully implemented this has started enjoying the fruits of reduced hacking and fraud cases.

Apart from financial institutions using Bitcoin technology, people have also accepted the use of Bitcoins to transact. It is a better option that has brought convenience to online buyers and sellers. Many businesses and suppliers across the world now use Bitcoin. Although other digital currencies are used, none have been as globally accepted as Bitcoin.

The other reason why Bitcoin has become very popular is that it is now a thriving business. Through various exchange platforms, people can buy and sell with the intention of making a profit. The digital coin has been making progress in its stability, which improves its reputation among everyone around in the world.

Conclusion

From these insights, it is evident that Bitcoin has indeed become the center of the world. It is penetrating every corner with many benefits. Anyone who gets an opportunity to work with Bitcoin hardly ever turns back.

Most importantly, Bitcoin technology and blockchain can be applied in many financial sectors so that they can also enjoy the benefits that come with it. Now that you know why Bitcoin is the internet of money, it is time to start interacting with the digital coins.




Sep 2, 2019

Highest Paid Blockchain Jobs [Infographic]

If you thought that blockchain only had to deal with cryptocurrencies, you are mistaken. Blockchain is being used in commercial applications now too. That means lots of careers await!

With that, here is an infographic I found that shows you the highest paid blockchain jobs out there! Check it out:


[Via MrDesigner]

Aug 26, 2019

Top 5 Tips on Logging in Java

Source - Pexels
One of the first decisions you have to make when building a website is which programming language you want to use. With all of the different options on the market, selecting the right programming language can be difficult. For years, developers have relied on the power of Java to build and power their websites. This language is both easy to use and very effective.

Did you realize the websites for LinkedIn, Indeed and Ali Express were all built using Java? If you are considering using this programming language, you need to consider a few important factors. If you are using Java to create a web-based or mobile application, monitoring runtime data is crucial. While some people rely on logging as a service, others prefer to do this manually.

Regardless of what method you use to monitor this data, you need to focus on logging as much information as you can. The following are some of the things you need to focus on when logging in Java.

1. Be Careful When Logging Sensitive Information

One of the biggest misconceptions most people have about logging is that they need to get as much information as possible. While having usable data is important, there are certain things you don’t need to store or log on your application. Logging things like a user’s login credentials or financial information is a horrible idea.

Most developers fail to realize that their plain text log files will be processed by a number of unsecured systems. This means that this sensitive information will be at risk. Not only is the practice of logging sensitive information negligent, it is also heavily regulated. This means that if you do not take the proper precautions to protect this data, you may be at risk of being fined.

2. Excessive Logging Creates Problems

Are you looking for a way to keep your website or application fast and responsive? If so, then you need to avoid excessive logging. Taking the time to figure out what data you want to monitor is crucial. The more files you are logging, the slower your site or application will ultimately get.

Not only will excessive logging lead to slower computing speeds, it can make it hard for you to actually read what a log file says. If there are too many log messages, you will be unable to pick out the ones that actually matter. You should really only be logging information that affects either the functionality of your app or the user’s experience.

By being selective with the data you are using, you can make finding and fixing problems much easier. Also, a faster app or website will be far more popular with consumers. The time you invest in cutting down on excessive logging will be worth it in the long run.

3. Making Sense of Cryptic Log Messages

When you start to parse the log files created by your application or website, you will need to view the details to make sense of them. One of the biggest mistakes beginner programmers make is failing to include enough information in these files. If these log messages are vague or cryptic, you will have a hard time making sense of them.

This is why you need to focus on putting things like timestamps, thread name, class name and log level is crucial. This information will act as clues when trying to figure out what is wrong with your app. The last thing you want is for your app to give you log messages you can’t understand.

One of the best ways to ensure you have no problem understanding what a log means is by using workflow rules. These if/then statements can create a predictable outcome and minimize problems during the development and deployment process. If you are curious about how to use this tool, you can find more information on workflow rules on DaniWeb crm's help pages here.

4. Incorrect Log Levels Can Create Confusion

Failing to create adequate log levels will lead to either a flood of unimportant data or the missing of significant events within your app or website’s infrastructure. You need to view choosing the right log level for your system as a priority.

For most logging frameworks, you can use terms like fatal, warn, debug or trace to label various log files. Ideally, you want to name these levels in a way that gives you information about how severe they are. Trace is generally the lowest log level, while fatal is the most serious. With these labels, you should be able to find out how severe the issues you are dealing with really are.

Source - Pexels


5. Ignoring Your Logs is a Bad Idea

The worst thing a developer can do is to work hard to create an adequate and detailed logging system  only to ignore the information it provides. You need to make a habit of looking at these files on a daily basis to ensure everything is working efficiently. Staying on top of the error logs can help you keep your app more dependable and functional.

Keeping Your Program Running

All of the time and effort you invest in logging will be worth it. By keeping track of how well an app is performing, you can detect issues before any real damage is done.

Aug 1, 2019

PR_CONNECT_RESET_ERROR connecting to Windows IIS web servers in Firefox only

I had a strange issue today at my day job that shall not be named. We have a test environment that our clients connect to that is running Windows IIS. Out of the blue, one of our clients said that in Firefox they couldn't connect to the test environment website, but all other browsers worked fine.

When you would connect to the site in Firefox, you would get the below error:


Secure Connection Failed

An error occurred during a connection to <website name> PR_CONNECT_RESET_ERROR



  • The page you are trying to view cannot be shown because the authenticity of the received data could not be verified.
  • Please contact the website owners to inform them of this problem.

None of the other servers in our other environments had this issue.

Well, after checking TLS settings on servers that didn't have the issue and comparing them to the servers that did have the issue, I figured it out.

Using IIS Crypto, I found that these servers had SHA disabled. Once I checked the box to enable it, and rebooted the servers the issue went away.


Apparently Firefox doesn't support SHA 256 and above yet... Seems like they would though right?

Anyway, that fixed the issue for us. If you know of another way to fix this, let us know in the comment!

Jul 8, 2019

All About Facebook's Libra Cryptocurrency (Infographic)

Facebook's new cryptocurrency, Libra has been in the news a lot lately. Many people have questions about it. The infographic below tells you all about Libra!

Check it out:




[Via MrBTC]

Jun 24, 2019

How to Manage Your Cryptocurrency Portfolio Effectively – Tips and Strategies

A few years ago, many traders and investors in the cryptocurrency sphere didn’t have a portfolio. Instead, they invested all their money backing one currency, which was normally Bitcoin. Putting their financial weight behind one currency meant they were hoping that either their Bitcoin investments were going to continue growing (and for the most part it did) or they had bought up a rival Cryptocurrency in the hope it would put on a “Bitcoinesque” show. Those days the number of Bitcoin exchanges was noticeably smaller and their functionality wasn’t that wide.

Then in late 2017 and early 2018, the unthinkable happened. Overnight (if not faster) the bottom fell out of the market as a few investment groups who held a large portion of Bitcoin all cashed in at once. The currency went into freefall and the dreams of becoming incredibly wealthy by owning Bitcoin were dashed against the rocks.

Today there are still some who clung on to their Bitcoin and weathered the storm, still waiting for the currency to get to the value they purchased it at. With the latest positive trends in Bitcoin's price, this could come to fruition in the not too distant future. The Bitcoin's crash left a sour taste in many people’s mouths, some sold and made huge losses, some held on, but it was a sign for each investor that they needed to be more attentive to their funds.

Diversifying Instantly Adds a Layer of Protection

In the wake of this fallout, 2018 ushered in a period of stagnation across much of the market, but against a bleak backdrop, some currencies began to shine out. Currencies like Ripple and Ether were beginning to grow and investors began moving money away from Bitcoin and Bitcoin-based currencies (Bitcoin Cash, Litecoin) towards more promising prospects.

Another trend emerged, investors were beginning to buy multiple currencies across different exchanges and they were beginning to hedge risks. Instead of lumping all of their money in Ripple, they spread their investment pot over a range of Cryptocurrencies, meaning that if Ripple failed, another currency might perform well enough to offset that loss.

The emergence of Portfolio Management Tools and Apps

If you’re an investor or trader in 2019 or you’re looking for getting into Cryptocurrency trading then there are a few tips that you should abide by. The first tip is to check out some of the portfolio management tools and apps available (even before you have invested in any stock) and familiarise yourself with the interfaces, features, and functionality.

Using a portfolio management app will have plenty of long-term benefits but it will also help you get up and running if you haven’t traded before. Using a new portfolio and broker tool, CEX.IO Broker we will show you why.

CEX.IO Broker

There are other portfolio management tools available so make sure you try some others before selecting your app of choice. CEX.IO Broker gives you great functionality regardless of your experience level so that makes it great for the cryptocurrency portfolio management.

Integration with CEX.IO Exchange

With any portfolio management tool, you will need to make sure it behaves in the way you expect it to and this means on the most basic level it needs to communicate with the exchange that you’re trading on. There are a couple of fantastic portfolio management apps that use a multi-exchange platform to give you functionality across many different exchanges.

This is useful if you are a seasoned trader with multiple exchange accounts and have the patience to buy Crypto across a number of exchanges. This is specifically a strategy for those in the know about Cryptocurrency as using multiple exchanges can come with pitfalls especially if you select the wrong exchange or happen to use the one that is susceptible to hacking.

CEX.IO exchange is a world-leading exchange that has never been hacked and continues to provide competitive fees and lots of trading options. This makes it a favorite for seasoned pros and ideal for those looking to get their feet wet in a safe environment. Building on this strong framework, the CEX.IO Broker offers you additional trading functionality to mitigate risk.

Comprehensive Analytics

Another crucial thing that any self-respecting portfolio management platform will have is sophisticated features to analyze your trading experience. CEX.IO Broker collects historical data of your strategical moves, which allows you to take some lessons based on your own experience and benefit from it.

Other portfolio management apps have a wide range of analytics and data, some of them don’t provide much information beyond what is already available. But others like Blockfolio are revered within the community and provide critical insights into your Crypto investments. Blockfolio plugs into multiple exchanges but has no sync feature with these exchanges, relying instead on user input to help it manage and stay up to date with your buys and sells.

CEX.IO Broker provides the same Blockfolio sleek design and functionality as well as synchronizing with the CEX.IO exchange. It is worth trying Blockfolio out as it is free to use. It will also give you a very hands-on experience of what a good portfolio management app looks like, especially if you haven’t yet signed up to CEX.IO which you should do at the same time to feel out which fits your style best.

Security and Mitigating Risk

Last but not least, a crucial tip for managing your portfolio is to ensure that you're protecting your investment at all times and wherever possible you’re mitigating risk. Many portfolio platforms will offer comparison tools and notify you if things in the market change. Most do this in real-time although there are some that don’t have real-time functionality.

CEX.IO is very security conscious and even though thus far they haven’t been hacked they always advise that you keep your investment in private wallets and not on the exchange. The CEX.IO Broker also provides a comprehensive hedging strategy that will help you mitigate risk and offset any detrimental price changes.

In short, whether you’re a seasoned trader or not, if you have a portfolio you should have a portfolio management tool which at the very least alerts you to market changes in real time. If you find one of the better tools, these can actually not only keep you informed and ahead of the play, they can also help you protect your investment and expand your portfolio.

Jun 10, 2019

7 Reasons Why Mobile App Security Testing Is Crucial For Enterprises

To stay away from and diminish security breaks, we need to uncover shield vulnerabilities in all parts of our condition. We need to check the fringe (firewalls, switches, balancers, etc.) through framework organizations, mastermind division to web organizations, flexible and static mobile apps

We need to find shield openings of the web application before aggressors by making security testing a bit of the structure and improvement of the mobile application. We can in like manner discover vulnerabilities through versatile application security testing.

Why we need mobile application security testing?

1. Stay away from future attacks by estimating the acts of aggressors and imagining their moves

You haven't the faintest idea and can't ensure whether software engineers will or won't hack into your convenient web application, ambush your backend structures, and take your data. In any case, you can imagine possible future circumstances and reasonably related perils. You can make sense of the acts of software engineers to uncover absconds in the code and fix them before developers abuse them.

A penetration test is a kind of shield testing proposed thus. In a penetration test, analyzers use refined instruments and moved to learn of IT to figure the direction of an aggressor who enters the client's condition to get information or possibly get to higher assents without genuine endorsement.

2. Running live with the new flexible application without excess pressure

Preceding the association of another adaptable application to an IT circumstance, the compact application encounters required particular and customer affirmation testing's to ensure its course of action with the specific and business necessities. These affirmation testing's certification that this compact application satisfies the end-customers and can be maintained by IT gatherings.

Over social event specific and customer essentials, these flexible apps need to meet operational necessities, keeping the age condition as-is and not exhibiting security threats.

Experienced programming authorities and execution testing experts recommend us to grasp the philosophy from the thoroughly considered Design, Build, Go-live, to routine RUN and Support works out.

3. Change the building, for instance, orchestrate, fragments of the versatile application if significant

Through convenient security testing, you may discover security vulnerabilities that may later incite genuine security breaks after the flexible applications goes live.

Thinking about deformities in the source code, strike vectors, bottlenecks, and security openings before uncovering the flexible application, you can change the designing, the arrangement and the code of the application. Fixing issues at this stage are more affordable than keeping an eye on them later on when you find that the building of the application is defective or when a break happens. The cost at these stages will cover specific issues just as legal, PR, and anything are possible from that point.

4. Untouchable merchants are new to huge business IT condition and express endeavor safety efforts and compliances

Essentially every compact application uses some web benefits that continue running on the backend. Adaptable application security testing isn't simply attempting the source code yet likewise the direct of the application at the endpoint: how it works with limit, supports, singular data, how to verify the correspondence between the convenient application, its backend systems, and the web organization.

Exactly when software engineers need to spill data, they don't need to hack the compact application in light of the way that hacking web organizations are adequate.

Thusly, it is essentially progressively basic to perform adaptable application security testing if it is made by a pariah convenient application headway association. An external programming vender does not know or can't know all security techniques and standards. Adaptable application creators from a pariah, lacking foundation with enormous business IT structure, are not prepared to fittingly execute application security essentials to fulfill attempt necessities.

False security is considerably more horrendous than an unsteady application. If we expect and acknowledge an irregular condition of security, protection, and reliability, anyway when in doubt the security level is low, we may send fragile data genuinely to attackers. If we understand that the security isn't set, we don't send this data through this inconsistent channel.

5. Know the capacities and experience of the application progression association that fabricates your convenient applications

Security and application improvement are two unmistakable locales, and you don't anticipate that flexible application architects should be security experts. Fashioners' fundamental scope of capacities is in the frontend coding and User Experience (UX). They are set up to guarantee the application contains the required features and business functionalities. Originators are based on the User Interface (UI) to make their application easy to collaborate and fantastic to look at, less on the security side.

Nevertheless, you have to ensure that the end-movement of the versatile application has wellbeing endeavors arranged into it. In case the dealer doesn't have the security scope of capacities in-house, they should unite as one with associations that have security as one of their inside abilities.

Application security is a tidiness thing that each flexible application progression workplaces need and grasp in their applications. Unfortunately, relatively few do this since application security isn't poor. If the business doesn't show security as a need, security won't be completed or executed a tad.

By testing the security of the adaptable application, you can get to the capacities of the vendor.

(Examine this article to get some answers concerning the best 5 flexible application security issues you need to consider while making compact applications.)

6. Test the responsiveness of your undertaking IT gathering

By getting adaptable application security testing as a segment of a convenient application headway process and a compact assignment, you can test the responsiveness of your undertaking security gathering. We can check the period of the response, idea of the response, and the reaction accuracy.

If the security bunch doesn't properly react, by then, there is something erroneously in the process which ought to be tended to. On the other hand, if the assistance is re-appropriated, we can test the idea of this organization.

7. Fulfill outrageous industry security rules and agree to rules

Security Testing is essential for significantly secure ICT conditions. It is basic for the ISO 27001 affirmation, HIPAA, FIPS 140-2, OWASP logic, and for some circumstance directed by cybersecurity law.

Security testing has been an essential bit of an item application headway cycle, and there is no reason security should not be a required bit of a convenient application improvement cycle.

Jun 3, 2019

Two More Alternatives To Twitter and Facebook For Conservatives

Back in April we wrote about an alternative to Twitter and Facebook for people who value free speech and don't want to worry about getting banned for their political beliefs. In that article we named Gab.com as that alternative.

Well, having spent some time there over the last month or so, we realized two things about Gab:

  1. It is legit full of racists. I'm talking real racists too, not the bullcrap label that Democrats put on all conservatives in general. I'm talking the real deal here.
  2. The community there is very small, so those racists stand out quite a bit more than they would otherwise.
Needless to say, it wasn't the alternative we were looking for really.

Since then we discovered two more alternatives. One of them seems really promising!

Telegram

The first one is called Telegram

From their page:



I heard about them from the folks over at Infowars after they got completely de-platformed by Instagram and Facebook. If you didn't hear about that, our political site Mainwashed did a video about it below:



Paul Joseph Watson, a regular on Infowars, claimed he received 3000 followers overnight on Telegram.


Other than the guys at Infowars, I really haven't heard much more about it though. If you've used it, please let us know what you think in the comments!

Parler

The other alternative to Facebook and Twitter for conservatives we heard about is called Parler! The CEO of Parler was recently featured on the Laura Ingraham show:



In fact, The Hill also reported about it saying that President Trump's campaign team was checking it out as a viable alternative to Twitter.

From the piece:
President Trump's 2020 campaign manager is reportedly scouting a social media site aimed at a conservative audience for a potential new platform for the Trump campaign. 
Politico reported Tuesday that Trump campaign manager Brad Parscale is considering creating an account for Trump on the social media platform Parler, which has attracted right-wing activists banned from other social media platforms such as Facebook and Twitter.
The very next day after these two reports we noticed a mass exodus from Twitter to Parler. A huge group of people we follow with our Mainwashed account have made the move to Parler.

We did setup an account over there for Mainwashed, and even became verified! In fact, after our first day we had over 1,000 followers!


It looks like you can gain lots of followers the old fashioned way (that you used to be able to do on Twitter) by mass following like-minded users, and having them follow you back. So far there doesn't appear to be a limit to that. Not sure if that's a good or bad thing, I'll leave that up to you to judge.

Never the less, the community at Parler is booming and vibrant. It is very active and to us it looks very promising!

I even put out a poll on my person Twitter account seeing which one of these Twitter and Facebook alternatives was the best one:



As you can see, after over 1300 votes, Parler was the clear winner at 71%!

What do you think about these platforms? Have you tried any of them? Let us know what you think in the comments!

May 27, 2019

Anatomy of an IoT Attack



Connected devices are increasingly being used for cyber attacks. They often lack critical device protections and organizations fail to segment their networks in order to reduce the attack surface.


May 24, 2019

Ransomware - Anatomy of an Attack



See how an effective ransomware attack comes together. This is why today's enterprises require effective security. Via Cisco.


May 22, 2019

Worth the upgrade - Ubuntu 19.04 First Impressions



Here we are again with another Ubuntu release in the form of 19.04 'Disco Dingo'. Apart from making me a proud Aussie, what else does this distro have to entice users to upgrade?


May 13, 2019

Google Cloud's High-Speed Network (Infographic)

Have you ever wondered what's under the hood of Google's High Speed Cloud Network? Well the wait is over, because Google has released a pretty interesting infographic showing us all how it works.

Via Google's Cloud Team's Email:

When your data and users live across oceans, you need more than a fast ship to connect them. Google Cloud's high-speed network has points of presence in over 35 countries, with environmentally friendly solutions that offer you the speed and bandwidth you need.
Click image for full size PDF version


Pretty impressive isn't it? Let us know what you think about it in the comments!

Apr 29, 2019

How to Deleted Online Social Media Accounts No Longer In Use

Protecting your identity online is essential for your brand, reputation and credit worthiness, far more important than updating your Instagram and Facebook every day. Several times a year the news will cover a serious data breach of information being held by major banks, insurance companies and/or social media platforms. Once the data is taken, it can be misused or even lead to identity theft. Deleting your old social media accounts is a vital step to help ensure some measure of identity protection. It is imperative that you keep your online access to your current accounts safe and protected and delete any old accounts.

Here is a guide that will help you delete your old accounts on the most popular social media sites.

Facebook 

Moving onto the biggest social network platform of all time, Facebook, with over a billion users, keeps things simple and makes it incredibly easy for you to deactivate your account.

Once you go into the "settings" tab from the down arrow in your browser, select your Facebook information and then select delete your account and information". When you are in this menu you will go to delete your account and must add the password to confirm.

Foursquare 

Foursquare hit the internet over a decade ago to let friends know where you are and figuring out where they are. In order to delete your Foursquare account, you will have to access the platform from your computer. Move onto the "privacy" settings tab where you have to scroll to the end of the page and find an option to delete your account. When you select this option you will go to a page where you need to confirm whether you want to delete your account or not.

Google 

Google is the undisputed search engine leader with one of the most interconnected ecosystems. By creating one account for Google you are able to access a plethora of different applications and websites without having to create separate accounts. In order to delete your Google+ or Gmail account, you will need to delete your entire Google account.

Go to "Google account settings" and choose "delete account and services". There you will see the "delete products" option, where you can access all of your Google applications. You need to sign in to all of the websites first before you can delete your account.

Instagram 

Facebook's younger brother is possibly the most used social media platform by Millennials, according to Hootsuite. Thanks to its focus on visual communication, it is the go-to place in order to find talented artists.

Deleting your account is very simple and takes little time to properly accomplish. While you can manage your privacy settings using the mobile app, you must go through an internet browser in order to delete your account. Simply go to the "delete your account page", and there you will have to provide a reason for deleting your account. Once you provide the reason, you will provide your password and then select the option to permanently delete the account.

Linked In 

LinkedIn is the social network for professionals looking for new opportunities to connect with other professionals and grow their business and careers. If you are on the platform, the profile should be complete and up-to-date. If you are no longer using the platform, delete the account. At the top right corner of any page of LinkedIn, you will first have to access the "privacy and settings" tab. From there, choose the "account" tab and then select closing your LinkedIn account. You will have to give your feedback and verify your account before you can delete it. From there you will see a post telling you of the consequences of deleting your account and then the final page which will be for confirmation.

MySpace 

This social media platform has been bought and sold several times since its glory days (2005 to 2009). In 2016 their database was breached and leaked to a dark market website. To delete your MySpace account, you will first have to login to the account that you want to delete. From there, select the "gear" icon and choose the "account" tab. There, you will see an option to delete your account. Before you can delete your account you will have to provide a reason after which you will receive an email for confirmation. Open the email and follow its instructions.

Pinterest 

Pinterest is a web-based pinboard or bulletin board, a place to bookmark images found online. To delete your Pinterest account you will first have to go to the triple dot icon on the website and select the "edit settings" option. From there you will have to go down to the "account" page and select "deactivate account". From there you will click "yes" to receive an email, which you need to open and follow in order to permanently delete your account.

Snapchat 

Snapchat is a service that, for a short time, rivaled Facebook and was the go-to social media app for many people. As is the case with Instagram, you cannot delete your account from the mobile app; you must delete it from a proper browser.

From the website browser, go to "delete your account" and enter your username and password. Your account does not delete instantly and it takes about 30 days to remove all of the information.

Twitter 

Regardless of how famous your really are, everyone has a Twitter handle. Many people follow and get their news from the tweets of everyone from legitimate newsmakers and media organizations to raving fans of our favorite sport teams. Deleting your Twitter account is incredibly easy. It takes at least 30 days for all of your tweets to get deleted. Select "settings and privacy" from the form on the menu and go into the account tab. From there you will have to deactivate your account and enter your password to confirm the action.

Tumblr 

Tumblr probably has one of the most bustling communities on the internet, which is also why it is very easy for anyone to delete their account. While you are able to delete your account, the content other people have reposted will remain available on the site. To delete your account, click on the person-shaped icon on the website, and go to "settings". There select "delete account", entering your email and password to confirm the process. Tumblr also states that it takes them a few days to properly wipe all of your content.

Whatsapp 

Whatsapp is a free messaging app to send Voice over IP (VoIP), images, video calls and documents using a mobile device. To delete your account, simply open your Whatsapp and go to the "settings" menu. From there, select account and go to "Delete my account", after which you will have to enter your phone number in international code and tap "delete".

YouTube 

YouTube is second only to Facebook as a social media platform, owned by Alphabet, the owner the parent company of Google. A well-managed channel can help to improve website ratings. A channel not in use should be deleted. Deleting your channel from the largest video-sharing platform on the internet is quite simple. You will first have to sign into your YouTube account and go to your advanced settings. From there, choose "delete channel" and then opt for "delete channel permanently". This will launch a prompt where you can confirm if you want to delete your channel or would still like to keep it.

Final Words of Advice 

According to industry experts and a recent article in Consumer Reports, it is a best practice to reduce the risk of having your personal and professional data being misused or stolen by keep your current accounts secure and deleting accounts no longer in use.

Apr 22, 2019

Conservative alternatives to Google, YouTube, Facebook and Twitter

We've been blogging a lot lately on the big tech companies and their censorship of conservative thought. If you watch CNN or MSNBC for your news, you might think these sorts of things are just a conspiracy.

Well, they most certainly aren't. In fact, Project Veritas recently did some reports exposing Twitter and Facebook's bias. Here are those videos:





In January a story broke about how Google manually manipulates search results in an effort of censorship.

Via The Daily Mail:
A document that appears to be a leaked internal Google discussion thread, reportedly indicates that the tech giant regularly manipulates certain controversial search results. 
An anonymous source inside the company disclosed the thread to Breitbart, which reported this week that Google has a 'blacklist' containing search terms that are deemed sensitive and thus should be manually filtered.  
Included on the list of 'controversial search queries' are several terms related to abortion, Parkland shooting survivor and gun control advocate David Hogg and Democratic Congresswoman Maxine Waters.   
The thread, if authentic, would appear to go against Google CEO Sundar Pichai's sworn testimony in front of Congress last month that the company does not 'manually intervene' in its Google search results. 
Google also owns YouTube and there are plenty of stories where YouTube has banned, or demonetizes conservative channels.

Via USA Today:
...If something vaguely conservative and intellectually stimulating manages to get past Google’s content gatekeepers, they just remove it. YouTube, which is owned by Google, routinely demonetizes, restricts and censors conservative content. One target of YouTube was Dennis Prager’s PragerU, which had 40 of its videos restricted. Prager sued the social media video giant this year following these unfounded restrictions. YouTube has also been known for banning pro-life videos.
You get my point right?

Well there are alternatives that people can use. Alternatives that value free speech, privacy and don't manipulate and ban people for their beliefs! Here they are:

FACEBOOK and TWITTER Alternative:

Gab


GOOGLE Alternatives:

StartPage

Duck Duck Go

YOUTUBE Alternative:

BitChute



I'm sure there are others, but these are the ones people are most talking about. All claim to make privacy a priority, and value your rights.

Do you know of any others? Let us know in the comments!

Apr 15, 2019

How To Backup All Of Your Photos and Videos From Facebook

Last week we mentioned that we were abruptly suspended from Twitter. Just a few weeks before that we were temporarily suspended from Facebook as well. In fact, I spent roughly 60 days in the first quarter of 2019 banned from Facebook!

With all of this censorship I thought it would be a good idea to backup all of my photos and videos from Facebook in case I got permanently banned. Since I was doing it, I figured you might want to know how to do it too. It's pretty easy really.
  • Login to Facebook from your computer browser
  • Navigate to Settings from the drop down menu at the top of the page


  • In the left menu, click on Your Facebook Information then click on Download Your Information


  • Check all of the information you want to backup (I only left Photos and Videos checked) then click the Create File button


  • After a while you will be able to download a zip file will all of your information from the Available Files tab

That's it. Pretty easy right?

I highly recommend this if you are a conservative on Facebook, especially if you are active with your political posts. As it gets closer and closer to the 2020 Presidential election, things are only going to get worse! I'd hate for folks to lose years of family photos and videos due to Facebook bias.

Did this help you out? Let us know in the comments!

Incidentally, if you didn't know, we've moved to Gab! The social media platform that values freedom of speech! Follow us there!

Apr 8, 2019

We've been suspended from Twitter. We're moving to an alternative!

Well, we pissed off the liberal engineers at Twitter today. They unleashed a righteous ban hammer not just on my political website's (mainwashed.com) Twitter account, but on all of my accounts including the account for Bauer-Power as well!

This isn't that surprising, I mean Project Veritas exposed that Twitter engineers are actively censoring conservatives.

Check it out:



What is surprising is that they banned my conservative account, and every other account that I've ever logged in as. Including my son's Twitter account for his YouTube channel!

Well, we give up. You win Twitter! If you only want socialists and liberals on your site, they can have you. We found an alternative to Twitter (and Facebook for that matter) that values free speech! It's called Gab!

From their page:
A social network that champions free speech, individual liberty and the free flow of information online. All are welcome.
If you are concerned about freedom of speech on Twitter and Facebook as well, you should definitely jump ship and give Gab a try! If you do, give us a follow at https://gab.com/bauer-power!

My new favorite mobile Twitter client

Ever since being in Facebook jail for 2/3rds of the first quarter this year, I've spent quite a bit of time on Twitter instead. Facebook is actually teaching me how NOT to use their service! 🤣

Ironic isn't it?

Well, since I'm spending so much time on Twitter, one thing I noticed with the stock Twitter app is that it drained my battery very quickly. Some folks say changing it to night mode helps, but it's still a battery hog.

Enter my new favorite client, Friendly for Twitter!

From Google Play:
Like our Friendly For Facebook app, it is built as an extension of the light Twitter mobile website. It preserves your battery, storage, data and use a smart notification system.

◆ DOWNLOADER ◆
Friendly T helps you to download Twitter videos, gif or pictures to your device.
◆ BATTERY SAVER ◆
Less services and background tasks. Option to disable all notifications. Design and animation optimized to use less power.
◆ SMART NOTIFICATION ◆
Notification system with option to enable/disable Direct Message and option to choose a check frequency.
◆ LITE ◆
Lightweight client with storage and cache optimized. Fast on all devices.
◆ MULTIPLE ACCOUNTS ◆
Add as many Twitter accounts as you want.
◆ CUSTOM ◆
Change theme color of Friendly T. Easy dark mode access.
◆ AD-FREE ◆
No banner. Block all Sponsored Tweets.
One thing to note too, with the stock app I was frequently getting logged out for some reason. That no longer happens with Friendly for Twitter. The biggest thing though is that it saves my battery life!

Do you use a third party Twitter app? Which one do you use? Let us know in the comments!

Apr 1, 2019

How To Fix SPF Fail: Too Many DNS Lookups

At my day job that shall remain nameless, we use a lot of hosted platforms that are set to send out emails on our behalf. The problem with that comes when creating a SPF record so all these services can essentially spoof your emails!

Why would this become a problem? Well, just to give you an example, let's say you are using Office365 for email, but you also use SalesForce and maybe some other platform. On top of that, maybe you have an internal SMTP server or servers for whatever reason. This ends up making a very long SPF DNS record!

Well, I found a really good article from the folks at Black Knight Solutions that shows you how to create large SPF records the right way:
Consider the following SPF record for 'sampledomain.com' - note that the entries are for example purposes only. 
sampledomain.com TXT
v=spf1 a mx a:mail.domain.com a:mail.domain.ie a:server5.somedomain.com a:server7.somedomain.com mx:server95.somedomain.com include:thatdomain.com ip4:192.168.0.1 ip4:192.168.0.2 ip4:192.168.03 ip4:192.168.0.4 ip4:192.168.0.04 -all

This record above is too long and needs to be shortened; you will have to split this up into two or more records and include them in the main SPF record.

Create the following SPF records on the domain name: 
spf1.sampledomain.com TXT
v=spf1 a mx a:mail.domain.com a:mail.domain.ie a:server5.somedomain.com -all 
spf2.sampledomain.com TXT
v=spf1 server7.somedomain.com mx:server95.somedomain.com include:thatdomain.com -all 
spf3.sampledomain.com TXT
v=spf1 ip4:192.168.0.1 ip4:192.168.0.2 ip4:192.168.03 ip4:192.168.0.4 ip4:192.168.0.04 -all 
Note: You can create more records as required.

Then amend the initial SPF as follows: 
sampledomain.com TXT
v=spf1 include:spf1.sampledomain.com include:spf2.sampledomain.com include:spf3.sampledomain.com -all"

Once DNS updates, all records would be read as one by recipient servers.
Essentially, you need to break up all your multiple entries into separate SPF records, then only reference those records in your top level record! Makes sense right?

After I did this, the error is was getting when running a SPF check tool (SPF Fail: Too Many DNS Lookups) went away!

Did this help you out? Let us know in the comments!

Mar 25, 2019

How To Tell If You're "Shadow Banned" on Twitter

Have you heard of the term shadow banning on Twitter? In short, it's when Twitter feels that you are violating some broadly interpreted term of service, so they limit the reach of your account... and they don't tell you about it! The funny thing about it though is that it seems to only happen to conservatives.

From The Independent:
The issue of online "shadow banning" has once again provoked a major debate about free speech and censorship, after US President Donald Trump accused Twitter of silencing Republicans. 
Shadow banning essentially means that a user of Twitter or any other online forum is not actually banned outright. Instead, all of their posts are made only visible to themselves. 
For example, if a Twitter user was shadow banned, they would still be able to see their tweets but no one else would. The idea is to limit the reach of a user without them being aware that they have been silenced – potentially preventing them from retaliating against the moderators responsible for the ban.
Well, Shadow Banning is a very real thing. In fact, a recent hidden camera video from Project Veritas shows how Twitter engineers use Shadow Banning to silence conservatives:




So why am I bringing this all up? Well, our Mainwashed political Twitter account recently got shadow banned and we didn't even realize it! How did we figure it out? I'm glad you asked!

We found an online Shadow Ban check tool! All you have to do is enter your Twitter handle, and click check!



I'm not sure who exactly we pissed off, but we're taking it as a compliment that we did! It means our message is getting out there!

Anyway, if you are a conservative person on Twitter and your reach has been significantly stifled, try this tool out. You might just find that you've been Shadow Banned!

Mar 18, 2019

The Rise of Kubernetes [Infographic]

At the company I work for during the day that shall remain nameless, we're starting to look at containerized application deployments instead of running applications on servers in an "old school way."

One thing we're starting to look at is Kubernetes. If you haven't heard of it before, here is a short description from their page:
Kubernetes (k8s) is an open-source system for automating deployment, scaling, and management of containerized applications. 
It groups containers that make up an application into logical units for easy management and discovery. Kubernetes builds upon 15 years of experience of running production workloads at Google, combined with best-of-breed ideas and practices from the community.
From what we've seen, Kubernetes will drastically change the way my company hosts, runs and deploys our applications to clients. With that in mind, I found this really cool infographic about Kubernetes. Check it out!



[Via Mapr]

Mar 11, 2019

Should I Bother with Mobile Marketing?

Have you ever wondered whether or not your mobile marketing campaigns are worth the time and effort you spend on them? There's no denying that they're cost effective, but are they getting the kind of results you hoped for? Should you try something else instead?

Before you abandon your mobile marketing efforts for good, consider this. The team at App Geeks found that in 2015, 92% of adults had a mobile phone. Fast-forward to this year, and the evidence in favor of mobile becomes even more compelling: 55.79% of web searches were conducted through a mobile device.

There are several other similar statistics in the infographic below, so we won't go into those right now. We've shared a copy down below so that you can see for yourself.

It won't take long to read through, but don't let that fool you—it's packed with information. What's nice about its format is that it is all pure facts. There's no airy-fairy, flowery prose to wade through either.

Considering the medium they're talking about, this makes sense. After all, with mobile marketing, you need to get your message across quickly and succinctly. There are places to publish a novel, but this isn't one of them.

What's also interesting with the research they conducted is that they looked at case studies of how companies used this form of advertising. So you get the statistics proving why you should look into it, as well as the practical examples of it in action.

But why are we still talking about this? You want to check out the infographic, don't you? So here you are—enjoy. And don't forget to leave us a note if you want to see more posts like this one.



Mar 4, 2019

5 Signs That Your Cyber Security Needs Upgrading

Unfortunately for too many businesses, it is simple to get left behind. Doing this can render you vulnerable to hackers and in the risk of suffering serious financial and reputation harm. Does your company show the signs of poor cyber safety? Listed below are just five of the major signs which you might need an upgrade.

1. Your defenses are not proactive

Cybercriminals and hackers have gotten so sophisticated that relying solely on traditional security defenses like firewalls and anti-virus software is something of the past. In 2018 it is not sufficient to assume that your perimeter protection will block all known threats, or respond to incoming attacks once they happen -- cyber-attacks are too damaging to your business for it.

Instead of attempting to take care of cyber-attacks while or after they've occurred, it's more economical to concentrate on prevention and early detection. Many cyber security firms provide proactive community monitoring to help detect threats and react before they can inflict damage and disturbance.

2. Your business is growing

The cyber security requirements of almost any business evolve continuously as a result of business growth. As your business expands you might be interested in investing in technologies offering productivity and cost-saving advantages such as cloud computing along with the Web of Things (IOT). Doing so without concurrently strengthening and assessing your own defenses can put the whole of your organization at risk from cyber criminals.

If your business is going through a period of considerable expansion you should put some thought in how this will affect your current IT infrastructure. As you encounter expansion your cyber defenses need to develop also.

3. You start seeing regular attacks on your systems

One of the most significant indicators that you want to boost your electronic defenses is if you are beginning to see normal attacks taking place from the system. Cyber-attacks are sadly becoming part of the lifetime of virtually every company in the united kingdom , but getting murdered may also show that your feeble defenses make you a simple target.

You shouldn't assume that in the event you have suffered one attack, you've been unlucky and are unlikely to endure another. Hackers will always attempt to compromise weak targets, and if your company has been targeted in the past you're advertising the fact your systems aren't especially robust.

4. You haven't upgraded your security in a while

Technology changes quickly and with hackers becoming more skilled and advanced, you will need to move constantly. When it's been a matter of decades without any substantial changes to your security system then you could be in a very vulnerable position. Once again, it's a good idea to work with experienced professionals to help direct any improvements.

5. You're not keeping up with new regulations

Have you been captured off-guard from the General Data Protection Regulation (GDPR)? With new guidelines governing businesses which manage any kind of private information, many companies are made to examine and update their own systems and procedures to attain compliance.

It's very important to be aware that a crucial component of the GDPR will be the requirement to safeguard the personal data your organisation procedures . This means that you must demonstrate that suitable measures are set up to defend your company against cyber attacks. It can be a good idea to utilize outside GDPR specialists who will be able to provide advice and advice on the Actions you Will Need to take

When you consider telephone theft, then you may think of someone physically stealing your cellphone. However, with our lives today saved to our telephones, we need to be more concerned with individuality hackers stealing our private data, not only the phone itself. When it may feel safe to work with a Wi-Fi hotspot at a cafe, there is always a possibility your personal information has been hacked into, and this is very often far more valuable than your wallet or keys.

Our telephones have become an extension of ourselves, almost like getting an excess limb. A Norton report from 2013 shows that 1 in 3 smartphone users have undergone cybercrime. So how can we stay as safe as you can when using our mobiles?

There are a few simple methods to staying safe online, like updating the cell software frequently or installing anti virus virus applications, however the most obvious tip is to keep away from Wi-Fi. If you are always on the move, this can be tricky to avoid at times, and that is where a VPN (Virtual Private Network) can be convenient. Ideal for remote working, VPN's will be the online model of computer firewalls, allowing a secure connection on a general network. Whether you're using your pc, phone or tabletcomputer, information running to and from the VPN server is securely encrypted. As a consequence, you can surf at will at a public area without danger of your information being hacked into.

How can you setup a VPN?

All of iPhones are currently encrypted mechanically, whereas Android mobiles are not. It is possible to set up a VPN for free on your android within your Wi-Fi phone configurations, but many experts suggest heading for paid services over free solutions for complete security. These solutions are offered for iPhones and Androids, also there are Apps like Express VPN that guide you through the procedure of establishing a server on your cell phone.

If you think locking your display will stop any data from being stolen, then think again. Although this is a fantastic beginning, it doesn't stop most tech-savvy fraudsters from gaining access to some data.

Other benefits of a VPN (besides security) include having the ability to see live TV or catch up when travelling overseas. Some people buy one to only unblock Netflix or alternative streaming sites. Basically, it will make it look as if you are in a different country letting you watch sites you might not otherwise have access to. However, this will only work if you pick the perfect server location.

Picking a VPN

There are a good deal of VPN suppliers around, and before you entrust them with your valuable information, it's a good idea to get your homework . So, what do you need to look out for when selecting the correct solution for your cellphone?

This all depends on what you are using it for. Prices for starters is critical, most suppliers offer yearly subscriptions and shopping around will let you get the very best bargain. But, there are more important qualities to look out for such as server location, encryption protocols, and any data or bandwidth constraints.

What you'll be using your own VPN for, will decide exactly what you need from these types of features. As an example, protocols change in safety, so if you're using it to unblock an streaming website then a'PPTP' protocol is adequate. But if you were planning to be sharing files and obtaining data then you need to be searching for a supplier that supports an OpenVPN. A list of the top suppliers for Android can be discovered on BestVPN.com.

Some state that checking a supplier's privacy policy is easily the most crucial element when deciding on the perfect product to buy. A supplier that logs all your information defeats the object of having a VPN in the first place. A service which is not required by legislation to log your surfing or data is just the one to choose if you're using it for highly confidential information transfers and to keep your data secure.

Feb 25, 2019

CHERRY INTRODUCES MW 8 ADVANCED: RECHARGEABLE, HIGH-PRECISION MOUSE



Kenosha, Wis.Cherry, the foremost provider of computer input devices, presents the MW 8 ADVANCED wireless mouse. This mouse offers innovative features and is built to meet the highest standards of the most discerning user. The MW 8 ADVANCED joins Cherry's portfolio as the new flagship mouse, combining timeless design with state-of-the-art technology.

Best materials and high-quality workmanship 

The CHERRY MW 8 ADVANCED features an elegant metal surface made of brushed aluminum that conveys the highest-quality workmanship. The rubber pads have the Voronoi cell structure on both sides of the mouse to ensure a good grip.

The MW 8 ADVANCED fits the hand perfectly, making it a pleasure both to look at and to use. To top off the MW 8 ADVANCED, Cherry added additional sophisticated features. For instance, the mouse includes an extra durable mouse wheel with optical scanning, a magnetic lock for the USB receiver, and a transport bag. These features make the MW 8 ADVANCED equally well-suited to mobile and stationary applications.

High-precision PixArt sensor 

The CHERRY MW 8 ADVANCED not only looks and feels nice but is also a top performer. From a technical point of view, MW 8 ADVANCED boasts the high-precision PixArt "track-on-glass" laser navigation sensor with optical scanning, ensuring the mouse can work on nearly any surface – including glass – without a mouse pad. In addition, the sensor resolution can be adjusted in four steps between 600, 1000, 1600, and 3200 DPI (dots per inch), ensuring the MW 8 ADVANCED is suitable for use with 4K monitors.

Wireless connectivity through 2.4 GHz wireless or Bluetooth 

The MW 8 ADVANCED also has multiple connectivity options. Users can simply connect the mouse to a compatible system using the built-in Bluetooth 4.0 functionality. Alternatively, one can use the supplied USB receiver to establish a 2.4 GHz wireless connection secured with AES-128 encryption.

Switching between the two modes of connectivity is a breeze, and is done by sliding the switch at the bottom of the mouse. Using this feature, you can connect the CHERRY MW 8 ADVANCED with a notebook and desktop PC at the same time, quickly switching between the two with the simple slide of a switch.

Integrated battery for long service life 

The integrated Lithium battery with a generous capacity of 550 mAh ensures a long service life, with one charge lasting up to 70 days. A two-color status LED provides information about the battery charge, the selected resolution, and the connection to the PC.

About Cherry 

Cherry is the leader in input peripherals for Desktop, Industrial, Security, Healthcare, POS and Keyswitch applications for over 60 years. Cherry is the global leader in the design, development, and manufacture of computer keyboards, mice, magnetic and chip card readers and the best mechanical keyswitches in the industry. Founded by Walter Cherry in 1953 and best known for our class-leading MX keyswitches, Cherry brings that same quality and durability to its entire product line.

Feb 18, 2019

5 Cybersecurity Risks Most Companies Have

The main cyber security risks in businesses 

1. Employees

The individuals that are involved in an organization are the major weak link in cyber security.

Employees fall for phishing emails. They click links or download stuff which turns out to be malware thus costing the organization a lot of money.

Educating the employees about cybersecurity and ai is the best approach to avoid this. 


2. Passwords

Every account which is associated with the cybersecurity firms or any other business must be secured using a strong password. If possible, 2-factor authentication should be applied too. Make it clear to everyone working in the company that they should never reuse a password that they are using in other web platforms.

In fact, employers should make it a company policy that every worker should change his/her password each month, even though the efficacy of this is being debated.

Additionally, tell your workers that they should never share their passwords with other people.

3. Patch Management

After the Petya and WannaCry attacks, the advantages of updating software were made clear. Those two attacks spread through exploiting a critical weakness within the Windows OS called Eternal Blue. Eternal Blue is what permitted the spreading of malware around business networks.

4. Other Weak Links

Some problems that organizations encounter are not brought about by their cyber security measures. They are brought about by the cyber security measures of some other organizations which they are working with.

You can implement the best cloud cybersecurity protocols however if the 3rd party which your organization is working with gets compromised, the attacker can gain access to your organization.

There are dedicated servers or network segmentation which can be used so that different organizations cannot connect directly to your organization. That will protect your company from the 3rd parties’ weak cyber security links.


5. Bring Your Own Device (BYOD)

BYOD is a common practice that most companies embrace. When workers come to work with their gadgets, they will also go outside with them or use them to work whenever they are away from their workplace.

The workers’ personal devices do not have the best kind of security are the office gadgets. They may easily be compromised by hackers. 

If you allow BYOD, then ensure you have a good cybersecurity and data protection policy in place. Steps, like permitting access to office networks via a virtual private network and ensuring that the workers implement 2-factor authentication, are recommended.

Conclusion

From those cybersecurity threats described above, it is obvious that educating employees is very important. Your employees must know the best cyber security measures and the danger they may be putting their employer in if they do not adhere to all cyber security measures.

About the author: Evelyn Poindexter is a professional interpreter from Great Britain with over 2 years of experience. Her hobby is writing however and she puts her mind into pieces she composes in order to get the best feedback from various audiences. She also hosts the website at besttechexpert.guide.



Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | stopping spam