My First Post      My Facebook Profile      My MeOnShow Profile      W3LC Facebook Page      Learners Consortium Group      Job Portal      Shopping @Yeyhi.com









Monday, February 15, 2021

Tim Berners Lee created the web. Now he’s out to remake the digital world.

Tim Berners Lee is lately busy thinking over following questions:
  • The Internet Hasn’t Lived Up to Expectations, What is the Way Forward?
  • The internet was supposed to be an infrastructure that gave everyone access to self-actualize and create value no matter how competitive it became, but we are failing at that.

Let's note that the beauty of the web is that it is not just a solution or digital product, but it was invented as an infrastructure for other internet related solutions to be built upon, and it hasn’t really failed in that regards as we have seen the rise of various software solutions, mobile apps, websites, artificial intelligence, and the likes. The web has become a hub for people to create various forms of value even as technology and the internet continue to penetrate into every aspect of human life.

As people began to create imaginative solutions and platforms, the battle to stand out and lead various business categories, trumped the initial purpose of the internet as the web has now been dominated by certain gatekeepers and the various value chain is now being manipulated to the benefits of a selected few. There are various factors that have contributed to the present toxic and unhealthy state of the internet but they all seem to revolve around these three factors: access to the value in the ecosystem, data control, and market monopoly.



But now, Berners-Lee, 65, believes the online world has gone astray. Too much power and too much personal data, he said, reside with tech giants like Google and Facebook — “silos” is the generic term he favors, instead of referring to the companies by name. Fueled by vast troves of data, he said, they have become surveillance platforms and gatekeepers of innovation.

Releasing his creation for free 30 years ago, the inventor of the world wide web, Tim Berners-Lee, famously declared: “this is for everyone”. Today, his invention is used by billions – but it also hosts the authoritarian crackdowns of antidemocratic governments, and supports the infrastructure of the most wealthy and powerful companies on Earth.

Now, in an effort to return the internet to the golden age that existed before its current incarnation as Web 2.0 – characterised by invasive data harvesting by governments and corporations – Berners-Lee has devised a plan to save his invention.

This involves his brand of “data sovereignty” – which means giving users power over their data – and it means wrestling back control of the personal information we surrendered to big tech many years ago.

Berners-Lee’s latest intervention comes as increasing numbers of people regard the online world as a landscape dominated by a few tech giants, thriving on a system of “surveillance capitalism” – which sees our personal data extracted and harvested by online giants before being used to target advertisements at us as we browse the web.

The idea behind solid is to create a platform where every user of the web can create their own Personal Online data stores(Pods) that would be used to store their personal and private data and be used to regulate the way any service provider can use these data; an individual can host this data on a solid server with their personalized access to the data that is used to decide if software applications can read or write on the data, therefore, the user has total control over his/her data and does not have to worry about leaving any data behind whenever they delete a mobile app as the app cannot store their data but can only read or write on it.

The company (Inrupt is responsible for Solid), is already receiving positive responses as it claims that there are already is already claiming that there are already 1200 new Solid community members, more than 30 open-source developers building apps on the platform, and 60,000 developer accounts.

Others say the Solid-Inrupt technology is only part of the answer. “There is lots of work outside Tim Berners-Lee’s project that will be vital to the vision,” said Kaliya Young, co-chair of the Internet Identity Workshop, whose members focus on digital identity.

Berners-Lee said that his team was not inventing its own identity system, and that anything that worked could plug into its technology.

Inrupt faces a series of technical challenges, but none that are “go-to-the-moon hard,” said Bruce Schneier, a well-known computer security and privacy expert, who has joined Inrupt as its chief of security architecture. And Schneier is an optimist. “This technology could unlock an enormous amount of innovation,” potentially becoming a new platform as the iPhone was for smartphone apps, he said.

“I think this stands a good chance of changing how the internet works,” he said. “Oddly, Tim has done it before."

Wednesday, December 23, 2020

iMovie Not Enough Disk Space: How to Clear Disk Space on iMovie

Best Ways to Fix “iMovie Not Enough Disk Space” Error


iMovie is a software developed by Apple and it is their most basic video editing product. There are more advanced video editing applications of Apple, so iMovie has limitations. But still, I find it very useful as a free and default App.

But sometime you get to see an error message while importing a video. The error says - "there is not enough disk space available at the selected destination"





When we talk about “iMovie, not enough disk space” error, of course, the first thing that comes to mind is that you’ll have to clear up space to resolve the issue.


So how exactly can you reduce the space that is consumed by the iMovie app? If this is only the case, then you have a lot of options to pick from. Here’s a rundown of those options:


  • Move your files into another drive
  • Check for and delete duplicated clips
  • Export files you don’t necessarily need at the moment
  • Erase iMovie projects that are not up-to-date
  • Clear up your iMovie library of unnecessary projects and events
  • Delete clips that already have no use for you

These six are your options for resolving the “iMovie not enough disk space” error. While it may sound easy, there are steps that need to be taken to pull them off perfectly.


So cheers!

Thursday, December 3, 2020

Various Social Engineering Threats

Social engineering is the clever manipulation of people to gain access to privileged information. It can occur on the telephone, in person, or via email.


SHOULDER SURFING

Shoulder surfing refers to looking over someone's shoulder to obtain information. Be mindful of people nearby when working with sensitive business information. If you step away from your computer, lock it so that others can’t see or access confidential information.

Use a privacy screen to cover your laptop or tablet screen while in use. If you witness someone hovering, acknowledge the person to see what they need. Bring to your supervisor's attention if you are suspicious of their intentions.


TAILGATING

Tailgating is an unauthorized person attempting to gain access to secure office space. Be mindful of people entering behind you. Do not allow tailgating.

Refer anyone without a company badge to reception or security. If you feel threatened or notice suspicious behavior, report the incident to concerned department in your org. In the event of imminent harm, contact local emergency services.


EAVESDROPPING

Eavesdropping refers to secretly listening in on conversations to capture information. Be mindful of who is around when discussing or conducting company business. Do not discuss company business in hallways, shared building spaces, or public places.

Keep confidential discussions behind closed doors.


VISHING

Vishing (voice phishing) happens when you receive a phone call from someone impersonating a trusted source, like your bank, a client, or an employee. They may say there's a problem with your bank account, or credit card and direct you to a web site or phone number where you will be asked to provide personal or company information to verify your identity or account. Beware! They are trying to steal your money, identity, or gain access to organization systems. If you access the Vishing web site from your workstation or smart device, it's possible for hackers to access anything stored there.

Follow your policies and procedures; do not provide personal or payment information to unsolicited callers. Do not attempt to call the number back. Do not take direction from the caller about navigation or use of your tools and systems.

Do not disclose any information unless you are able to verify them, and they are authorized (e.g., if they state they're an employee try to reach them on IM). If you receive a call or a text you suspect to be vishing or smishing, contact spoof@majftech.com with as much information as is available.


SMISHING

Smishing happens when you receive a text message (SMS = smishing) from someone impersonating a trusted source, and the same threats apply as with Vishing.

Do not text scammers back. If you receive a call or a text you suspect to be vishing or smishing, contact spoof@majftech.com with as much information as is available.


PHISHING

Phishing is a form of social engineering in which a fraudulent message is sent to you with the intent of tricking you into opening an attachment, clicking a link, or responding to the message. Phishing typically occurs over email, but can happen during a phone call, through a chat program, in a text message, or even in-person!

Successful phishing attacks can steal your credentials (passwords), install malware on your computer, trick you into disclosing confidential company data, or convince you to take unauthorized actions that benefit the phisher. It is no surprise, that phishing is one of the most common attacks leading to data breaches you see in the news.cWith all the technological defenses in place to prevent phishing emails from landing in your inbox, it’s still one of our biggest security vulnerabilities! Our best resource in defending against phishing is YOU!



Learn the warning signs of such emails:

  • Unexpected sender or content
  • Threats, urgency, and secrecy
  • Phishing or Spam?
  • Promised lottery or super amazing deals


What to do If you think you have received a phishing email:

  • DO NOT reply to the message.
  • DO NOT click on links or open attachments.
  • DO report the email by creating a new email message, attaching the phish email, and sending to spoof@majftech.com.
  • DO NOT send or "forward" the phishing email to anyone as this can cause further exposure.
  • DO permanently delete the phishing email.
  • Does the message push for urgent action?
  • Does the message threaten bad things will happen if you don't do what it says?
  • Is it unusual to use email as authorization for wire transfer? 

GDPR and PCI DSS Intro - General Data Protection Regulation (GDPR) & Payment Card Industry Data Security Standard

General Data Protection Regulation (GDPR) is a new data privacy and security law in Europe.

When will it go into effect?
May 25, 2018.

What is the primary purpose?
To provide EU citizens with greater control over how their personal data is collected, protected and used.

To whom does this regulation apply to?
GDPR applies to how Company must handle all EU customer and employee data.

Is there a penalty for non-compliance?
Yes, the risks are significant financial penalties and legal exposure. Fines up to 4% of annual worldwide revenue or €20 million are possible.



PCI-DSS (the Payment Card Industry Data Security Standard) mandates specific security safeguards for handling credit card data.

Companies are required to adhere to PCI standards as part of our contractual agreements with banks, partners, and credit card companies. Failing to adhere to these requirements could result in significant fines and possibly termination of Companie's ability to accept credit cards for transactions.

Embedding Privacy and Security Impact Assessments into our various business processes to ensure that privacy and security are consulted throughout the lifecycle of data-related initiatives;

Formalizing processes around Data Subject Rights to ensure that we can respond comprehensively and within the timeframe set out in the GDPR;

Updating our Privacy Policies to ensure they are GDPR compliant;

Developing our Data Retention and Deletion Capabilities;

Updating our Vendor Contract Templates to ensure they are in accordance with GDPR requirements; and

Developing our Privacy Resources and Specialist Training Modules to ensure all teams have the information they need.




Eclipse : Set maximum line length for auto formatting

This is easy!

Preferences -> Java -> Code Style -> Formatter / "Edit..."

Tabs: "Line wrapping" , "Comments"

Field: "Maximum line width"