go to sections menu

The Technology blog and podcast

This is for the technology blog and podcast Commentary, articles, and podcasts

header picture for Ingegno theme

You are here: February 2017

Go to Homepage [0], contents or to navigation menu

Cloud Flare in trouble?

Hi folks,

I saw two articles from Last Pass recently, and it seems as though the bug is repaired. Two Security Bulletins: SHA-1 Collision Attack and Cloudflare Incident posted on the 24th and Alerts for Cloudflare Sites in LastPass Security Challenge which was posted on the 27th of this month. Lastpass can be trusted on getting this type of information out accurately, and I trust that the issue has been fixed and nothing is at risk unless it is cached. Check these out.

Update: Fixed a broken link for the first story. Also, this was discussed on SN 601. Sorry about that!

Comments (0)

The world’s first braille smartwatch is on its way to buyers

I saw this article on Herbie’s facebook. The world’s first braille smartwatch is on its way to buyers is the name of the article. According to Herbie, its about $300 and this does sound interesting. Check this one out.

Comments (0)

How To Avoid Becoming the Next Big Phishing Headline

I saved a link to a video, which unfortunately, I can’t download. How To Avoid Becoming the Next Big Phishing Headline is the article, and it should be checked out. The video is free to watch.

Comments (0)

Some of what I’ve been reading this week

This is only some of what I’ve been reading in the tech world this past week.

How to Bury a Major Breach Notification February 21, 2017 Krebs On Security
The Healthcare Underground: Electronic Health Records for Sale February 21, 2017 Trend Micro
RAMNIT: The Comeback Story of 2016 February 20, 2017 trend micro
Shooting Gallery: A Breakdown of Phishing Targets in 2016 February 21, 2017 Phishlabs
Fake apps, fake games: An update on gaming malware February 23, 2017 Trend Micro

Hope you’ll find something of interest to read.

Comments (0)

Technology podcast 256 is now up!

On our RSS feed, you’ll find the podcast. Its numbered 256. Here’s the show notes on it, and I hope you enjoy the show! See you next time.

Welcome to the technology blog and podcast, this is podcast 256. On this podcast, we have 7 different segments for you including vocal thoughts on the AI squared issue, which one of my helpers of the blog sent an E-mail on. Be sure to read my post before podcast 255’s release entitled Making sure we give out accurate information for the reading of my thoughts. The Transit App has a function where you can put in intersections. I demonstrate that as part of segment 2. Segments 3 and 4 introduce and talk about a video where someone talks about the top ten tweets that could get you fired from your job. Segment 5 was quite interesting as I demonstrate a game Super Tile Smash app directory entry (apple vis) and they are listening. They posted a thread on Apple vis entitled: Our new game Super Tile Smash Forum post (apple Vis) ofr you to comment on. Segment 6 is news notes where i have some quick mention on what is on the blog that might be of interest. Since I haden’t posted in awhile, I even have some news notes from the prior week where I find after the fact some articles I’ve already commented on. Finally, a segment with some additional comments made to me in regards to Super Tile Smash via E-mail and contact information. I hope you’ll enjoy the program as much as I have putting it together for you. The program is an hour and a half long, and I’ll definitely see you on another edition of the podcast. See you soon!

Comments (0)

Roger talk: What we’ve been up to: Project Fika

Hello folks, I was tipped off to this Roger posting entitled What we’ve been up to: Project Fika and it talks about Rogertalk closing March 15, 2017 in exchange for a business platform called Fika. I know from reading the release here that it will include video and other business related things to get things done, similar to whats already out there. Sometimes, companies need to focus their attention to things that make money, as they need to stay afloat.

I liked roger for its security aspect within the app. While I was told they use straight mp3 files when using something like IFTT, the app itself was garnered very secure, and this is because no telephone numbers were ever needed. The thing I don’t like about whats app is the fact you need to associate your number, and unless the number is in everyone’s contacts, everyone sees this information. I do not personally want to give my cell phone number out publically, although i have done it occasionally for people having whats app, I only announced it once, and left it at that.

This must have been a hard decision for the company, although, people may have complained too much about things the blocking feature should’ve taken care of, so they got tired of it. The blind community wine too much when we have something good a company is offering, but it would not surprise me if it was both, a company decision, driven by false abuse compalints solved by people complaining aabout name calling, etc. which people are doing in this community.

Roger, you’ll be missed. Sorry to see you go.

Comments (0)

News notes for this week

Some of the articles are already here, but here are some of the other things I’ve read as of late.

  • This site as I was just curious what was there now, says it is down for maintenance or unavailable. I read Kreb’s article earlier on Feb 15, and it is a good one. I didn’t cover this in news notes, for the next upcoming podcast, however, Krebs always does a good job with these. Guess we’ll find out more later.
  • Unix: A Game Changer in the Ransomware Landscape? Trend Micro Intellegance blog February 13, 2017
    • This article caught my attention because it talks about web hosting services, and a number of places that have unix as a platform and how actors can take advantage of things to do a number of things to the computer including making it useless for its task.
  • What’s In Shodan? Analyzing Exposed Cyber Assets in the United States Trend Micro February 15, 2017 and Devices Exposing Critical Industries and U.S. Cities Trend Micro February 15, 2017
    • These two articles talk about the same thing, and i cover this in my news notes for the upcoming podcast. This is definitely of interest because of the fact that a huge number of devices can be potentially targeted because some aspects of the devices are public facing either by design, or by mistake. For those who don’t know, Shodan is a site similar to google, but they analyse ports and whats out there, where Google indexes web sites in general. The research is interesting, and an eye opener.
  • CERBER Changes Course, Triple Checks for Security Software Trend Micro February 14, 2017
    • This is a big ransomware headache, and what I read today from this article absolutely scares me. Two things stick out in regards to this article. First, it says it doesn’t toucch the program data, it only encrypts your files. It also says it checks three times for antivirus software. From my understand of reading these articles, ransomware won’t let you do anything else until you pay up, so your antivirus or other security software is useless. I wonder why they did this?
  • Brute Force RDP Attacks Plant CRYSIS Ransomware Trend Micro February 9, 2017
    • RDP was talked about on Security Now, I don’t remember exactly what it does, but this definitely sounds bad. Are there better things to do?
  • Mirai Widens Distribution with New Trojan that Scans More Ports Trend Micro Feb 13, 2017
    • Finally, as we haven’t had enough with this ransomware, and now that the code is out, its only going to get worse. This is the next thing coming, where it can plant more stuff to worry about. This can’t get worse, can it?

    If you have any comments on these, fire away. I’ll have more later.

    Comments (0)

    Mirai Widens Distribution with New Trojan that Scans More Ports

    I read today an article entitled Mirai Widens Distribution with New Trojan that Scans More Ports and it was very interesting how this bot has just morphed in to something that can just cause havoc. Sometimes, releasing source code can be a good thing, but in this case, it is for all bad. This is something probably good for the security community at the time it was done, but now, who knows what else can happen. If we were to defend from this, how would we be doing this successfully?

    Comments (0)

    Top 10 Spammer Indicted for Wire Fraud

    On the 6th of February, Top 10 Spammer Indicted for Wire Fraud was published, and I always love covering news that is great. We need good news after reading about really bad breaches we have no control over. Check out the good news here.

    Comments (0)

    Fast Food Chain Arby’s Acknowledges Breach

    Hello folks, on February 9th, I saw this post from Krebs on Security entitled Fast Food Chain Arby’s Acknowledges Breach but I honestly don’t remember ever reading anything initial from the blog talking about it. I can’t blame myself because i read so much stuff. There are links to other similar breaches including Wendies which then confirmed the breach two months later. I don’t remember ever eating at the chain called Arby’s, but it would be comparable to something like subway from what I know of it, or similar to a delli.

    In any case, this can’t be good for consumers, as if you went back after getting your card replaced, the cycle starts all over again. We know this happened after the target and wendies breaches. It would have been more on wendies than target, but it is still a problem today. As consumers, we need to figure out how we can hold companies accountable for these types of activities. If you have constructive thoughts, I’d love to hear from you.

    Comments (0)

    InterContinental Confirms Breach at 12 Hotels

    On the 6th of February, I saw this article entitled InterContinental Confirms Breach at 12 Hotels which reminds me of the multiple trump hotel breaches. While this story indicates that trump hotels acknowledged the breaches, I honestly don’t remember this as part of reading them back then. Here is the first story and here is the second one. If you read that there was confirmation, please let me know, as I don’t remember reading that they confirmed anything.

    This story also has stories dealing with other breaches the blog covered from the past year. This hopefully will slow down, at least I hope they do, as there are better things to do than cover breaches which is why the podcast slowed down, but since it picked up, we need to be vigelant about this.

    This story goes in to detail on what happens, so please take a look.

    Comments (0)

    Fashion company’s rude response shock s job applicant

    Shaun sent this article entitled Fashion company’s rude response shock s job applicant on the 27th of January. I’m getting a chance to read this, but there is a difference between a breach and a hack. The fact that the company apologized is a first step on fixing something which should never happen in the first place when looking for a mjob. The applicant, according to the article, had plenty of experience and a finished schooling and deploma to top it all off. That is definitely going to be a public nightmare for this company.

    Comments (0)

    How Google Took on Mirai, KrebsOnSecurity

    In the catching up department, I remember this story well, in fact, this was one of these stories where great thought was put in to this from what i can tell. How Google Took on Mirai, KrebsOnSecurity goes in to the detail on how this great resource that has tipped me off in to the enourmous breaches we’ve been seeing lately and how i was made aware of them thanks to Krebs. The botnet in question has been covered in great length by Security Now as well as Kreb’s blog. Check out this one.

    Comments (0)

    Extremely dissatisfied with the developers of tweetbot in regards to accessibility improvement promises

    Hi folks, in the Mac world, accessibility is still a concern just as in the windows world. While I’m not a full time mac user, and I’ve dabbled in this world a little bit, I came across this apple vis post from a mac user about an app which is accessible for the most part. Contacting the developer yielded mixed results and comments are asking for far and wide coverage of the fact the developer doesn’t seem to care about whether their app works. Why would an app be accessible but yet it can’t read the names of the people tweeting? The windows apps I’ve used have done this, so I know its possible. Please contact this developer if you use the app and let them know your concerns. This is not acceptable, and if I used an app that way, I’d write them just like the folks in this thread have done.

    Comments (0)

    Technology podcast 255 for February 10, 2017

    Hi folks, I’m happy to release the podcast numbered 255. Below, you’ll find the show notes. I hope you’ll enjoy Find the file on our RSS feed where the show notes also live.

    Welcome to the technology podcast, this is podcast 255. On this edition of the podcast, we start with an interesting Uber find, as I was curious on whether they allowed us to book a trip in advanced. I take you through a demo, and you may read more about the cities that Uber supports by going to this page which asks: Can I make a reservation? You may also go to the page that talks about Scheduled Rides s
    for extra peace of mind
    as it gives you the list of cities involved. Our news notes segments are making a comeback. Next, wetalk about Alexa and something cool. Finally, Freshbooks has some new features to help improve your security in regards to authenticating with Freshbooks, and they publish their security Review. To read more, check their Freshbook’s Security and Reliability Safeguards which allows you to read more about their policies. We hope you enjoy this hour long podcast, and thanks for listening!

    See you soon!

    Comments (0)

    Making sure we give out accurate information

    Hello folks, I hope you’re enjoying the blog, and I’ll be releasing a podcast real soon, it just needs to be finalized. Today, while I have thought about this post, I’m going to be upfront, and as accurate as possible.

    Remember in January when we published Urgent issue with AI squared access technology and the page in question had support hours over the weekend to help people through the issue they said was urgent and that things were compromised? Well, it isn’t that bad to begin with, according to what I found out today.

    My actual call to the VFO group was totally unrelated to this, but when the gentleman said to go to the certificate fix page, I told him why I was calling and that I had installed Window-Eyes to this PC already but the issue i was calling about needed a full installation zip file.

    He told me that the people who needed to help me were gone, and I thanked him, I happened to ask him about the whole certificate fix issue we encountered since he braught it up.

    The gentleman said there was never a compromise at all. They had published it was compromised, but the cert in question was only expired, never compromised. I asked why they put it was compromised, because that means things more serious, and he said it was simply mislabeled.

    When enquiring on whether they were to fix it, he indicated they wouldn’t because it was a long time ago.

    If I was running the page, I would have personally changed it, and released a new press release indicating this.

    With the amount of breaches that we have on a monthly basis, it is very important that companies get as much information out there, and if it changes, update it.

    I’ll release an article I read via Krebs that actually impressed me, and I’ll talk about that more in debth, as it deals with a particular breach and links to others. I’m surprised that AI Squared did not update this page to simply state that it was expiring, and made it sound like something extreme was going on when it was just an expired cert which was expiring on the date mentioned, and they were patching everyone before it expired.

    If the certificate was truly compromised, we would have to patch immediately, and the certificate would be immediately revoked. If we were running the software, we’d be OK, but if we rebooted, we could be in trouble.

    AI Squared, please make sure you put the accurate information next time, so that people are not confused like I was. I didn’t think it was compromised, and E-mails asking whether it was, was told to look at the Cert page they published. That page seemed to not make me pleased since the deadline was a week or so away, but yet, compromised certs are revoked immediately upon discovery if I have been paying to Security Now’s teachings. Bad move, AI Squared, please learn from this next time.

    I was told the cert is good for awhile yet, so there should not be a problem for at least 20 years.

    Thanks for reading, and make it a great day.

    Comments (0)

    editorial, what age should we get cellphones or is there more

    This article from stuff
    Is an interesting read.
    In brief, is discussed how yung is to yung to have a smart device.
    Firstly I don’t share the opinions of the artical writer fully but
    partly agree with it all the same.
    I will respond to this article with one of my own.
    My question dear readers is not if children or teens should get access
    to phones but should children and teens get access to the net.
    No lets go even further should some adults be banned from using the net
    or cellphones entirely.

    We all know how cool technology is, social networks, blogs like this
    one, twitter, facebook, calls overseas with skype, free services like
    vibre, whatsapp, group shares, cloud services like mega, dropbox google
    drive, calendars like the google one, diaries, scheduals, games,
    research, net searches, the list goes on.
    We also know about the down sides of technology.
    No, these are not hackers, viruses, malware, ransomware, and all that,
    its deeper than being hacked or getting your identity stolen.
    No, its worse than that.
    Let me ask you a simple question, how many times over the last 10 years
    have you played a board game, played cards, gone out side and played any
    games at all, socialised with friends, not got stressed because the net
    has gone down, etc, and if your answer is not for ages if ever you are
    probably close to the truth.
    It is known that we use our devices to much.
    Our activity has reduced.
    Our wish to take risks has reduced to, we are scared to break something.
    We need our mail and the net.
    If the net goes down we are at a loss.
    For those born pre net era life was different.
    For those born post net we know no other.
    The fact just about anyone can use a computer is a blessing and a curse
    for when it breaks we are almost powerless to fix it and this trend will
    continue on and on.
    Crimes asside, and the usual rifraff I write on here this article got me
    thinking and thinking hard about a time before I had access to the net.
    That time for me was at the end of the 80s, and the 90s up through till
    the revolution in 2002.
    I remember playing board games with my family, children playing outside
    in the street, games on games.
    Sure there was tv, but it had its place.
    Research required you to physically do it, if you had something to do,
    you either called for it on a normal phone, or got out of the house to
    do it.
    You had friends, real friends, and you talked or wrote as the case may be.
    You got on with things because you knew you had to.
    Even when computers really came out they had their place.
    I can’t say I watch much tv even though I have a pre smart 24 inch job.
    Even though its got audio description on.
    I do have dvds but don
    ‘t watch to much.
    I have drives full of files but I never sit to much and listen all day
    if I can help it.
    I try vary hard to ballence my life on the pc and off it.
    I don’t use a modern smart phone nore care for one just yet.
    I see several issues with our world.
    1. computers are everywhere.
    We are getting on them to quickly, from our humble consoles to that
    latest ipod everything has them.
    They are cool, and they rock, but we have forgotten their place.
    We are not to far from becoming dependent on technology but there is
    still enough time if we move there are still a couple older generations
    left to teach the new.
    The following things need to happen in my mind.
    1. children should not have computers or smart phones or any
    electronics to be honest.
    They should play outside, break legs and other things as they used to do.
    I have never broken a leg in my life but no one has the choice anymore.
    All the health laws mean people are so worried of being sued that we all
    sink into a non risky weak state.
    2. a computer should be shown to a teen or those at school as a
    research tool, first, secondly a gaming one, and only for the moment
    educational games and maybe old style video games.
    3. once you are at the age you can vote or drink whatever is later,
    that will be the age you can be left to do whatever till then strict
    rules should be in place to stop people going online not knowing the risks.
    Playing on your devices is fine but being more interested in them than
    real world is not.
    Its why on holiday I force myself to leave my computer at home and not
    use it.
    I do take a recorder or a music player with recording facilities, a
    camera is also good to.
    Maybe a note book if you are able to see to write in and a diary there
    are still paper ones round the place.
    I don’t know how we’d block this, but all those violent games and such
    while fun just are no good for children.
    Heck adds for games games in general are no good.
    Twitter and other things are no good for children, in fact once they
    master a life outside the machine realm, then by all means introduce
    them to it.
    We are creating people that never have been outside and have almost no
    need for it.
    And before you judge, I do have family that are locked to their devices
    all the time all day long and not using them as was intended.
    I have a friend recently dead who was an impulse buyer.
    He brought lots and lots of stuff of and online.
    He is dead!
    He can’t take all his stuff to heaven with him, most of it is unused,
    and what do you do.
    While some of his stuff can be sold for little cash, most of it is not
    interesting for the people that have to deal with it.
    So it will all go to landfill.
    His house is junk, it is in agood ariea but it will be destined to
    become another monster apartment block like everything else.
    This guy has no legacy, his wife still alive languishes in a home with
    almost no cash and not much to show for her past life.
    Granted this is an extreme case, but is this what we want for future
    To start, live on material things and then it all goes poof and no more?
    True our digital identities will remain till hackers take them and we
    are kicked off the net entirely but our ghosts even digital ones are not
    alive, text is no substitute for communication and those people on our
    twitter and facebook accounts are not our friends.
    The people you email well some of them may be your friends sort of as
    well as those on social networks.
    But if you die, you have nothing to remember you by or only an aspect to
    remember you by.
    The only differences from real buildings and those constructed online as
    that they never age.
    Nice isn’t it, but what about if not only do they never age, they never
    Or more simple terms, if you have an online house it never gets older,
    its always sunny, the food in the fridge never goes off, its never eaten
    in fact its only an idea of food.
    You never get older, but neither do you have a past.
    You never sleep but then you don’t have much of a life either.
    True, you can game, play music, socialise, chat, go on dates, have sex,
    Watch tv, read the news paper.
    You can never break a leg, drive, eat, sleep, get sick, die, physically
    touch, or talk as such.
    You are not a name, a person, just a user id, a link, an ip, you are not
    black or white, have no religion, aren’t much at all.
    Thats all well and good.
    But the net has connections to the outside.
    We mirror the net, the net mirrors us, but there are differences in the
    There is no crime on the net but there are no laws either.
    There are no police on the net but its not like you can do any crime
    online that doesn’t have an offline exit.
    You could hire a murderer but never be killed online.
    You could steal someones identity, infect someone’s computer with a
    virus, but you couldn’t do much if you stayed online.
    You are imortal but time never moves.
    You are but you aren’t at the same time.
    Thats all well and good but as I said everything in the net has a hard
    link outside.
    If you do a crime online it will eventually link outside so no escape.
    Things do change outside the net and as soon as things leave the net
    they are subject to our universe and its rules.
    We are forgetting where we sit in the big machine.
    We don’t sit anywhere in the big machine, we are part of it but we are
    still linked outside of it so we aren’t at the same time.
    Fact is the world emulates the net and the net emulates the world except
    it doesn’t.
    So this all means in short that we are becoming more interested in the
    online than offline world.
    We are not machines yet, and that means we need equal access to both.
    And if we continue as we are, then we will find out just how useless and
    insubstancial our ghosts are.
    If we lose our hard links we are nothing.
    I know future movies and scifi likes to have humans in some cases not
    needing boddies ever, and that we are big minds, etc but lets face it,
    we forget about the outside then we may as well live in the sun for all
    it will do us.
    I think everyone needs to decide where they slot in instead of jumping
    on the bandwaggon.

    Comments (0)

    Hacker Selling 126 Million Cell Phone Details of “U.S. Cellular” Customers

    Hacker Selling 126 Million Cell Phone Details of “U.S. Cellular” Customers is an interesting story. The update at the bottom says that it isn’t U.S. Cellular data, but if you read it closely, it could be. I’m not going to pay the 500 plus dollars to find out, but it is scary just the same. Wonder if it could be former data, meaning the data comes from customers who may have left for any reason?

    Comments (0)


    TEXAS COPS LOSE EVIDENCE GOING BACK EIGHT YEARS IN RANSOMWARE ATTACK is a week old, but yet we still have cases out there and we will continue to have them. The fact that they thought they had backups but found them to be encrypted mean that they didn’t do a good job. I personally feel that if you think you’ll get your files back, pay, then learn to do more to protect yourself. If you feel that you may not get your stuff, then don’t pay.

    This reminds me of the school case at the beginning of the year I reported. In that case, they felt that they had a shot of getting their stuff back. The article indicates that that they were told they didn[‘t have a shot. Wonder what the difference between this and the other case besides of the fact it deals with police departments and a server holding evidence?

    Comments (0)

    the state of tech

    Comment on the following and then look at my comments
    The article is explaining exactly what I feel is happening.
    With technology becoming more simpler than it needs to be, we are losing the knowledge to fix it when it breaks or secure it.
    On the plus side, it means technitions and others will have better jobs but on the minus its going to become a problem.
    I am not sure if I aggree if we have slipped that far back but we are close to it.
    I grew up with dos, I worry if I don’t have everything up to date.
    Every driver, every software I can, as long as its free or low cost.
    I want to make sure within reason that I am fully updated where I can.
    I don’t fully aggree with his security stance.
    I also don’t aggree everyone should use linux.
    Firstly windows is all over the place, reguardless of what people may think, all desktops are not dynosaws.
    Computers may be getting smaller but everything has its function.
    The net doesn’t need to be filtered but on the other hand, if you took away all the nice sides to tech, background tasks and multitasking would have to take a dive to.
    I couldn’t dream of having to go back to a single task system.
    Yes in the old days things were easier to handle.
    If things went wrong you knew.
    But all this new stuff its all in acrinims and code, like oob, wbm msxml, etc.
    We don’t know whats broken and well its a problem.
    On the otherside as long as things are secured.
    I don’t mean secured to the nines where it impacts system performance but secured just enough so the user needs to watch their ass its fine.
    A lot of this new stuff is designed so we don’t have to bother with it to much.
    When I started my technical job I got no training I started by running every file on my dos 5 system and seeing what it does.
    No one does this anymore.
    If you run every program you can on your windows system you know what it does and you learn.
    True you can’t trash your box but keep searching google for things and see what they do.
    I didn’t have that resource.
    2. hacking is bad.
    Because of the criminals, hacking suddenly is bad, it never was bad as such its just what the media says.
    Not all hacking is bad.
    In fact in some cases with industry there are security bounty programs.
    Yes, find the holes and see if you can hack our system and you will get 100 grand and maybe a job!
    Next there is all this spying.
    We are making to much of a fuss.
    In most cases if you don’t screw up then you are not a problem.
    No government has the resources to go after those of us that lead average lives.
    Yet we are scared into thinking that everyone is after our ass.
    From reading things online, and my own experience.
    Your average hacker isn’
    ‘t after your average home user.
    Why, no cash in it.
    Big businesses, governments and others known to have cash are targets.
    Its known unpatched systems and a lot exist we know that are targets.
    3. miss information, there is a lot of this.
    Your antivirus software or security software shouldn’t slow down your box, if it does its badly programmed and should be dumped.
    The best protections are our heads, and maybe some passive software, not our expensive software packages.
    If thats true, then 3 games I play, pluss a bunch of documents I use daily and programs I run as well as stuff I write are trogens or something like that.
    As for dangers online, kids ie 5 year olds and up shouldn’t even have access to computers.
    They’re to stupid and dumb and only know enough to get trouble.
    Chatrooms can be and have been proven to be dangerous we know this.
    That new torrent is not the best unless you use vpns, and if you can afford it buy it.
    If you can’t then there are probably some opensource things round the place.

    Things I don’t aggree with.
    All kids shouldn’t need to program their systems.
    This is not the 1960s or the punch card days.
    Kids need to use word and excell and search google for resources.
    When I started I learned my blindy wordprocesser and thats it and its all kids need to learn.
    Kids shouldn’t use smartphones or anything till they are at least 20, I never used a smart phone till just after university.
    Before that I did have a phone for calling numbers but that was all.
    Children shouldn’t have access to the net till they are at least in highschool
    The net is not a little place with resources in it.
    It is now another real world, another world with its shops and stores and robbers and other criminals like our world has.
    Everything goes and sometimes it doesn’t.
    The only difference from the net to the real world are the following.
    1. you don’t need to eat drink or sleep.
    2. while you can order things for your offline self you can’t consume anything online.
    3. cash, yes you can shop in stores for things you want offline and maybe things for online games but you can’t buy anything as such like a car to drive online as such.
    You can’t consume drugs online offline you can but never online.
    Its never dark on the net, but then there isn’t a sun either.
    There are no quakes or fires or anything as such on the net either.
    There are no storms or beaches or anything.
    Cyberspace is not like systemshock 2, the matrix or anything, its just another place you can do a few things.
    Everyone on twitter and face book is not your fucking friend!
    In fact you don’t know who anyone is usually.
    The net is unsafe and dangerous.
    There is no discrimination either but still.
    Taking this in mind, then you should know that the net other than all that is close to the world.
    Sadly text is not the best form of communication.
    Even now I am making assumptions on people I read, where they live, even building entire lives for that person, but those are errors I don’t know who the fuck they are unless I talk to them physically.
    Security and privacy do not exist.
    There are several reasons.
    The most important one is not that we blab our location to the world.
    That does not matter.
    When we buy things we send our credit card info to the world.
    That again doesn’t matter really.
    The government knows who we are and thats stored online and again it doesn’t matter.
    Even if your internet and entire identity is stolen and misued and you end up in jail that still doesn’t matter.
    The most important thing which no one grasps is that we like to gossip, posting on social media and other things.
    And we like to brag just about everything about ourselves.
    I don’t mean to stop, but at least think what we are sharing.
    That allone should reduce our risks.
    That next bit of security software is not security its just a chance for something else to get wrong.
    Oh and that software is not exactly configured for you its made by someone else telling you what they think you should do.
    I am not saying don’t be secure, you should have something to moniter things and such but don’t automate so when it goes nuts then you don’t know what is happening.
    Be carefull where you go and visit.
    Above all if you have teens and kids, you will sadly have to keep your install disks near by.

    Comments (0)

    go to sections menu

    navigation menu

    go to sections menu