Can't wait to start making good use of this service and add tips hints and additional information using Sidewiki....
in reference to: Share : Master advanced features - Toolbar Help (view on Google Sidewiki)Technology Tips blog for improve computer & technology use! Technology tips relating to all aspects of technology, from web development, search engine optimization, technology news, internet news, web 2.0, social networking, search and software. This Technology Tips blog has a bit of everything.
Search
Tuesday, September 14, 2010
Sunday, April 11, 2010
Inbound linking strategies explained + Tool to help out
Monday, January 11, 2010
Best Looking Wallpapers i'v seen in a while
By the way you don't need to sign up for the site and click the "Submit" button to get access, just click on the splash page image. Hope you like.
http://www.desktopography.net/
Follow the on Twitter - https://twitter.com/aeiko_
Saturday, October 31, 2009
Requesting your users to update their website profile
A common practice among many website that I use is that on the odd occasion they request that you update the original information that you provided to the website. I don't know about you, but anyone email asking me to update any information makes me suspicious. There are so many spam emails going around these days that every time I receive an email that requests that I update my account details or requests information, whether they be legitimate or not always raises my suspicion as to its origins and motives. Could it be the launch pad of some sort of phishing attack or something along those lines.
I believe that website owners and developers need to put their heads together devise a set of new standards for the process requesting users to update their account details or other information that may be required! Even if the email comes from a legitimate site that looks well formatted while also coming from and email address, such as accounts@munchit.com.au, these days it just isn’t worth taking the risk of responding to these emails with so many tricks that the data thieves and hackers out there use and have up their sleeves.
A practice that I am going to adopt in the future with the process of requesting information updates from users, is to send them an email providing information that on a certain date the website will be requiring some additional information. Stated in the email it will state that an “sms” will be sent to the user (Already captured during sign-up). The "sms" will inform the user that an email has been sent to them on that date which will contain a link to the website. Also provided in the "sms" will be a confirmation code uniquely used to identify the user. When the user checks their email and clicks the link they are taken to a page where they have to enter the code before the fields required to enter their log in details are revealed. Once the log in is complete the user will be directed to the page that will capture the new information that the site owner requires.
I believe this more structured and secure approach that although will require a bit more development effort and cost it is something that would be worth implementing. I think users would generally feel happier about providing the additional information to the site as they would have previously been notified that they were going to receive an email of this nature.
Let me know if you think this is a feasible automated approach to dealing this common suspicion around these types of email requests? Can you think of any other innovative ways to reassure users that updating information and collecting new information from the user to use on the website is a safe process?
Thursday, December 18, 2008
<strong> and <b> / <em> and <i> - Which is for what?
A question that has been bugging me all day today when I was conducting some SEO work today was is the <strong> and <em> tag any different to the <b> and <i> tag. The conclusion I have come to after researching the topic is that you use the <strong> and <em> instead of <b> and <i> tag when you are trying to emphasize keywords on a page as readers treat the two tags differently. They achieve the same visual effect however the <strong> and <em> tags are "logical" tags. This means that they are for when the developer wants to add emphasis to particular words or phrases. A reader for a user with disabilities may say the word louder for example. The <b> and <i> tags are for visual layout effects on a page and do not have the same effect on a reader or add any weight to your keywords in the search engines. I suggest when crafting a page and that if you want to format something purely for visual effect then you use the <b> or <i> tag, as they will reduce you page size very slightly, hence increase load time. This post by Nikki Pilkington also states that there is no effect in the SEO world.
http://nikkipilk.sc10.co.uk/blog/2008/09/30/tip-49-the-bold-and-the-beautiful/
Tuesday, December 16, 2008
Improve Your Businesses Wireless Security
Create a Wireless Security Policy
Create a policy that specifies who can use the network, and how to protect the network This is one below is taken from a Cisco template I found on a website;
- Acceptable use policy, to specify what types of network activities are allowed and which ones are prohibited.
- E-mail and communications activities, to help minimise problems from e-mails and attachments.
- Antivirus policy, to help protect the network against threats like viruses, worms, and Trojan horses.
- Identity policy, to help safeguard the network from unauthorised users.
- Password policy, to help employees select strong passwords and protect them.
- Encryption policy, to provide guidance on using encryption technology to protect network data.
- Remote access policy, to help employees safely access the network when working outside the office.
Educate your Employees
Educate your employees and get them involved in protecting the network. Use informational posters and training about security, passwords, and privacy to help you keep your business information and communications secure.
Secure the WLAN
- Use strong encryption: When you install your network, set up the strongest wireless encryption you can. WEP encryption is adequate, but WPA and WPA2 are better options.
- Secure communications: Encrypt data that travels on the network, and authenticate users to be sure you know who is using the WLAN.
- Change the default network name to something that is hard to identify so it is unrecognisable.
- Use MAC address control lists combined with encryption to restrict user access.
- Be sure that management ports are secured with non default names and passwords.
- Hide the access points to prevent tampering.
- Use video surveillance cameras to monitor your office building and site for suspicious activity.
Protect Your Company from Outside Threats
Protect wireless devices with the same security you use for the your company network. (i.e. firewalls, VPNs, and antivirus software)
Protect Your Wired Network from Wireless Threats
Install wireless intelligent protection switching (IPS) devices to prevent unauthorised, "rogue" access points and other wireless threats.
Monday, December 08, 2008
Review of Untangle UTM
Untangle is aimed at SMB appliances and is geared toward 250 users or fewer, and is meant to work on one server although not released as an enterprise product it is targeted at SMB’s who previously may have used a combination of open source projects.
There is an enterprise-scale version slated for a 2009 release with the free version including a spam, virus, spyware, phish and attack blocker, as well as a web filter, protocol control, open VPN, intrusion
prevention, firewall, router and web reporting.
The paid version of Untangle includes active directory integration and advanced policy management, as well as remote access portal and configuration back-up.
Pricing for up to 10 users is US$25 a month, and it's double for up to 50 users. From 51 to 150 users it will cost US$150 a month, and for more than 151 users US$250 a month.
For more information go to
http://www.untangle.com/