Ever since computer technology took over most of our official and unofficial filing and database system. The need to save it from damage or complete loss has become matter of paramount significance. The data you enter into a computer is important to you. It may be official documentation or the results of some experiments that you might need in the future and you cannot afford to lose it at any cost. Mostly, loss of data means loss of money and effort. Nobody likes that to happen. So mechanism of having a backup for your data has been devised to avoid an imminent heartbreak if not monetary loss! [Read more…]
Do you know about DKIM (Domain Keys Identified Mail)? It is a digital signature of the sender that is linked with the email so the receiving server can identify it and associate it with the sender. This removes any doubt about the authenticity of the message, otherwise, the message is considered as a spam. This helps securing email delivery system and keeps the cybercrime at bay. BRILLIANT! [Read more…]
You might have noticed that many top level websites are spamming your inbox. What is it? It might have taken you by surprise. According to a recent research, Lax security standards are allowing email spoofing from the most-visited domains. Though authentication systems are trying to resolve these issues but there are shortcomings from many of the top websites in authentication usage. This failure is further opening the door for “forged emails”. Till date DMARC is the most advanced and greatest email authentication system to deal with such issues. [Read more…]
Did you see your name, image or information on Google, Bing, or another search engine? Is information about you harming your image or reputation? We will explain how to make them disappear or request that they be dereferenced by the search engines. In short: how to delete information about yourself from the internet. [Read more…]
The Black Hat SEO (black hat) is a technique of SEO that is not in accordance with the recommendations of the search engines and can be penalized by them. Some practices may even be illegal and therefore punishable by law. The goal for the referrer who is doing it is to rank on the first SERPs (search results pages of a search engine) of strategic keywords.
This is a short-term strategy, a site that does not meet the guidelines of search engines that can be positioned in a stable and sustainable manner the requests of interest. Let’s take stock of some black hat SEO techniques regularly used to boost website visits. [Read more…]
You might know about Let’s Encrypt but just in case you do not, let me give you a brief introduction. Let’s Encrypt is a certification authority, which provides an easy and free access to SSL certificates for website owners and IT professionals. Since SSL certificates were not as easy to access and were definitely not free, Let’s Encrypt is expected to impact SSL sale market with its free, automated, open and cooperative access.
It is very important for web owners and IT professionals to study its impact on the SSL certificate sale market. [Read more…]
Millennium Bug also came to be known as Y2K. It refers to the problem arose on the turn of the century when we were in transition from Twentieth Century to the Twenty-first Century. Programmers of computers used only last two digits of the year when writing a date. During the early years of computers, the storage was very expensive proposition with up to $100 per kilobyte. So to cut this price, they only used the last two digits, which caused the whole problem. [Read more…]
What is SSL?
As website owners and IT professionals, I am sure you are well aware of SSL. But just in case, God forbidding you don’t, here’s a brief intro. SSL i.e., Secure Sockets Layer is a security mechanism that is devised to secure the transmission of data between the website and the end user. More specifically, the aim of Secure Sockets Layer is to secure the personal information of users such as your credit card numbers, social security numbers and your login details which are prone to attacks from hackers. [Read more…]
Let’s Encrypt is a Certification Authority (CA), which makes it easy and free to receive TLS / SSL certificates via an automated system called certbot, thereby allowing the use of an encrypted connection HTTPS. At the moment, the service is in beta test and receive a certificate in a fully automatic mode, it is possible only when using a web server Apache. The idea is simple: download and open to web server with a single command code request and install the certificate and configure it for use, everything is automated, like a boss! For example, let’s try to enable SSL on Apache. [Read more…]
Internet of Things, referred to as IoT nowadays is a technical implementation of devices that are connected to the internet. The internet has taken over almost every aspect of our lives. With the low rates (€€) of connectivity and devices with built in Wi-Fi, it’s no wonder connecting devices with each other or to Internet is taking over the world. Anything with an on and off button can now have remote access through Internet. These devices range from kitchen and laundry appliances to wearable devices such as your watch. People seem to forget sensors that can be placed anywhere in the world, to protect dikes, sewer systems and road systems. In this article we’ll talk about applicances, but we’ll mainly look into the security concerns. [Read more…]