Thom Heemstra's blog

You are here: Home / Archives for Security

Importance of CMS Maintenance

12th May 2017 by thom Leave a Comment

CMS or Content Management System is basically a set of related programs or software that is used nowadays to create and manage our digital content, such as websites.(Techtarget) CMS basically power these websites and enable them to make the necessary amendments in them with ease and without having to provide prior knowledge. (MTM, 2016) In this article we’ll focus on why CMS Maintenance is so important. [Read more…]

Filed Under: Money, Security Tagged With: back-up, doom scenario, Knowledge Base, security, SEO, white hat SEO

The Rise of Personal Cloud Technology

5th May 2017 by thom Leave a Comment

Cloud technology is the need of the hour and most sought after tool to secure ones’ data after the security breaches being reported by reputed online companies such as Yahoo. In 2013, Yahoo reported hack in its system and over 500 million users’ accounts were affected, this is huge number to say the least. (Eugenio, 2017) This glitch in Yahoo’s decision making as not to make security of data its top priority has cost the company and its users significant loses. This should come as a fair warning to all the users and companies whose data is floating on the Internet. [Read more…]

Filed Under: Internet of Things, Privacy, Security Tagged With: cloud, doom scenario, Encryption, Privacy, security

Cryptocurrency and Privacy – Is there anything called Anonymous Payments?

28th April 2017 by thom Leave a Comment

cryptocurrency illustration tag cloudWith the digitization of the world and everything around us, it was just a matter of time that our monetary affairs came in the fold of it. The transformation of trading payments from barter trade, to gold and silver coins, to paper money to credit cards has been an interesting journey. But to think, this was end has been negated big time with the introduction of new payment method called Cryptocurrency. [Read more…]

Filed Under: Money, Privacy, Security Tagged With: bitcoin, blockchain, cryptocurrency

The Pi Hole Ad Blocker – What is is and how does it work?

17th March 2017 by thom Leave a Comment

An Ad Blocker, as the name suggests, block ads that hover on websites every time you try to surf. According to Techopedia, Ad blockers block certain kinds of ads that include pop-up, ad banners and other usual kinds you have to tangle while surfing web and seriously, their frequency can be really exasperating. In this blog we’ll talk about Pi Hole. [Read more…]

Filed Under: Internet of Things, Privacy, Responding to news, Security Tagged With: advertising, linux, pi hole, SEO

IT Disasters: Cost and Preventive Measures

10th March 2017 by thom Leave a Comment

Animals have inbuilt warning system designed by nature to alert them before any natural disaster hits them. They escape the disaster area before the event happens. But human beings have no such faculty. Instead, they have been given brains to make the necessary arrangements in case they face disasters of any kind. [Read more…]

Filed Under: Security Tagged With: doom scenario, internet reputation, Knowledge Base, security

The Importance Of Good Backups

3rd March 2017 by thom Leave a Comment

Ever since computer technology took over most of our official and unofficial filing and database system. The need to save it from damage or complete loss has become matter of paramount significance. The data you enter into a computer is important to you. It may be official documentation or the results of some experiments that you might need in the future and you cannot afford to lose it at any cost. Mostly, loss of data means loss of money and effort. Nobody likes that to happen. So mechanism of having a backup for your data has been devised to avoid an imminent heartbreak if not monetary loss! [Read more…]

Filed Under: Security Tagged With: 3-2-1 rule, back-up, g suite, Office 365

DKIM Signing With Office 365

24th February 2017 by thom Leave a Comment

Do you know about DKIM (Domain Keys Identified Mail)? It is a digital signature of the sender that is linked with the email so the receiving server can identify it and associate it with the sender. This removes any doubt about the authenticity of the message, otherwise, the message is considered as a spam. This helps securing email delivery system and keeps the cybercrime at bay. BRILLIANT! [Read more…]

Filed Under: Security, Tutorials, Webhosting Tagged With: dkim, dmarc, Office 365, security

DMARC and the Forged Emails Dilemma

3rd February 2017 by thom Leave a Comment

You might have noticed that many top level websites are spamming your inbox. What is it? It might have taken you by surprise. According to a recent research, Lax security standards are allowing email spoofing from the most-visited domains. Though authentication systems are trying to resolve these issues but there are shortcomings from many of the top websites in authentication usage. This failure is further opening the door for “forged emails”.  Till date DMARC is the most advanced and greatest email authentication system to deal with such issues. [Read more…]

Filed Under: Security Tagged With: dkim, dmarc, spam, spf

Step by step tutorial on how to delete information about you on the internet

20th January 2017 by thom Leave a Comment

Did you see your name, image or information on Google, Bing, or another search engine? Is information about you harming your image or reputation? We will explain how to make them disappear or request that they be dereferenced by the search engines. In short: how to delete information about yourself from the internet. [Read more…]

Filed Under: New Media, Privacy, Responding to news, Security Tagged With: Europe, google, internet reputation, Knowledge Base, security

Black Hat SEO, A Sure Way To Get Banned By Google

13th January 2017 by thom Leave a Comment

The Black Hat SEO (black hat) is a technique of SEO that is not in accordance with the recommendations of the search engines and can be penalized by them. Some practices may even be illegal and therefore punishable by law. The goal for the referrer who is doing it is to rank on the first SERPs (search results pages of a search engine) of strategic keywords.
This is a short-term strategy, a site that does not meet the guidelines of search engines that can be positioned in a stable and sustainable manner the requests of interest. Let’s take stock of some black hat SEO techniques regularly used to boost website visits. [Read more…]

Filed Under: Security, SEO Tagged With: black hat seo, google, SEO

  • « Previous Page
  • 1
  • 2
  • 3
  • 4
  • Next Page »
Follow @th33mstra

Thom Heemstra
@th33mstra

  • RT @nicktolhurst: “We only went to Washington to visit its world famous Cathedral. We had no idea what was happening elsewhere there.” http…
    about 2 weeks ago
    Reply Retweet Favorite
  • RT @nicktolhurst: Your reminder once again... Boris Johnson’s majority is larger than the hard right ERG group. And Labour are extremely…
    about 1 month ago
    Reply Retweet Favorite
  • @DavidJEWood @ritakhoury10 This is the same view as in the pic https://t.co/822ccVQ24P
    about 2 months ago
    Reply Retweet Favorite

Recent Posts

  • Recent Developments in Blockchain
  • Top 5 SEO Mistakes Made By Marketing Agencies
  • Why Is Link Building Important For SEO?
  • Internet Privacy Issues And Ways It Can Be Compromised
  • 10 Practical Tips to Improve Online Privacy

Categories

  • Announcements
  • Artificial Intelligence
  • Big Data
  • BlockChain
  • Internet of Things
  • Money
  • New Media
  • Privacy
  • Responding to news
  • Security
  • SEO
  • Tutorials
  • Webhosting

Copyright © 2021 · Agency Pro Theme on Genesis Framework · WordPress · Log in