Thursday, August 16, 2012

FaceBook Everywhere

Facebook Everywhere



It's hard to find an individual who or a corporation that isn't on Facebook. The social networking site has become an ever-present hub for everything online. For some less savvy users, Facebook is the Internet.

With developments like Facebook Connect and Open Graph , Facebook is virtually opening its doors to any third party that wants in on the action. You may have already noticed that Facebook displays ads targeting your specific demographic information, based on the personal information you've posted and activities you've participated in.

What you might not have noticed is that other sites have started targeting your Facebook demographics as well. Any time you browse the Web without first logging out of Facebook, other sites can get access to any profile information you've marked as fit for public consumption.

Don't want every site on the Internet to see you coming a mile away? Just remember to log out of Facebook every time.

Cyber security


Everybody talks about cyber security. But quite frankly, most computer users are woefully uninformed about what it takes to make sure their systems are secure.

Good security requires more than anti-virus (AV) software. It means taking action to protect yourself from cyber criminals who try to access your information when you make an online purchase or when you do your banking. It's about making sure no one can get a peek at the sensitive data you have stored on your computer.

Update and patch


 Everyone needs to get into the habit of installing all updates and patches, especially for applications such as Windows Media Player, Oracle's Java Run time Engine and Adobe Flash Player, all of which have seen a number of vulnerabilities recently.

But all updates and patches, no matter what software is involved, are there for a reason and shouldn't be ignored.

Don't send personal information over public Wi-Fi


 Data sent over a wireless network can be easily intercepted.. If you want to access your bank while sitting at the coffee shop, you may be better off using your 3G carrier on your mobile device.


Install a good Internet-security software package


 Who wants to spend money for something that’s free? A lot of companies offer a free version of their security software package, but in most cases it provides the barest minimum coverage.

Understand how social engineering works


 Social engineering is one of the top tools used by cyber criminals, and every computer user should be familiar with how it might be used to trick him or her.

Social engineering often uses popular events to lure users to fake sites laden with malware, or uses techniques like spear phishing and specially targeted email with malicious links. Sometimes it's just a good old-fashioned confidence trick in digital form.

Learning how cyber criminals are trying to trick you can go a long way toward protecting yourself.



Don't trust everyone online


 Going hand in hand with  advice about social engineering is warning not to trust everyone you meet online.

"Keep your mind switched on while dealing with people," "Don’t trust everyone in your social media networks, especially people you don't know well."

This is especially important to remember when using a service like Twitter, where you follow someone, or someone follows you, based on shared interests rather than an actual relationship.



Strong anti-virus software and firewalls do a great job of protecting our computer systems. But even when virus definitions are fully updated and firewalls properly configured, there are still insidious threats that can worm their ways in, stealing your data or hijacking your PC and leaving you none the wiser.



The security and IT specialists upon whom we all rely can only do so much. At the end of the day, if the average user isn't vigilant , the strongest security precautions in the world won't stop some of the more dangerous digital intruders, with potentially disastrous consequences.

To keep you on your toes (or shivering in your boots), here are 10 schemes and scams that might have slipped under your radar. Click "next" in the upper right to proceed.

DNS Redirection



You might get an unsolicited phone call from a tech-support representative claiming to be from Microsoft or another big-name IT corporation. But the caller won't be who he claims to be. After warning you that "suspicious activity" has been detected on your computer, he'll offer to help — once you give him the personal information he requires to get his job done.

That job isn't fixing your computer. In fact, he's really just after your personal information.

If you receive a call like this, hang up, call the company the bogus technician claimed to be from, and report the incident to a legitimate representative. If there really is a problem, they'll be able to tell you; if not, you just thwarted a data thief.


Internet service providers (ISPs) such as Time Warner Cable and Optimum Online claim they're trying to help with DNS redirection, but the reality seems to come down to money. Domain Name System (DNS) redirection overrides your browser's normal behavior when you can't reach a webpage. Instead of displaying the normal 404 "File Not Found" error, the ISP sends you to a page of the ISP's choosing — usually a page full of paid advertising and links.


Innocent though that practice may be, computer viruses can do the same thing, redirecting your browser to a hostile page the first time you misspell a domain. With ISPs, you can opt out of their DNS redirection (you'll find links below all the ads); with viruses, stay on your toes. Make sure you know what your browser's default 404 page looks like, and take action if you see anything different.

Open DNS Resolvers



Another danger lies in the way some DNS servers are configured. An "open resolver" can offer information it isn't authorized to provide. Not only are open resolvers exploited in distributed denial-of-service (DDoS) attacks , but an attacker can "poison" the DNS cache, providing false information and incorrect resolutions that must be detected to be corrected.

If your browser trips over a case of cache poisoning, the agents in charge of a hostile server can glean detailed information about your system — especially if you're in the middle of an important transaction. How can typical users solve this dilemma? The chilling answer: They can't. It's up to Internet service providers to address the problem.

Fraudulent SSL Certificates



A Secure Sockets Layer (SSL) certificate reassures your browser that the site you've connected to is what it says it is. If you're looking at "HTTPS" instead of plain old "HTTP," you know there's security involved, such as when you log in to your bank account or pay your phone bill. The most trusted SSL certificates are issued by designated Certification Authorities worldwide.

But what happens if that trust between browser and website is exploited? Acquiring or creating fake SSL certificates is unlawful, but happens often enough that we need to be aware of it. On multiple occasions in 2011, the discovery of false certificates suggested an attempt to spy on Iranian citizens as they used Gmail and Google Docs. According to the website of computer security firm F-Secure, "It's likely the government of Iran is using these techniques to monitor local dissidents."

Session Hijacking



If you spend afternoons using your laptop in a café with an open Wi-Fi network, you might not be the only person logged into your Facebook or eBay account. Firesheep , an add-on for Mozilla's Firefox browser, lets its users sneak a peek at other people's browser activity if they're all on the same wireless network.

While the illicit observers can't get a glimpse of secured pages, many sites secure only their login pages; once you're logged in, your presence is maintained purely through cookies, packets of data that your browser stores to keep track of your browsing needs.
Though it can be used for darker purposes, should serve more as a warning to websites with private user accounts: They need to take security seriously. Guarding the main gate isn't the limit of their responsibilities; attackers don't need to storm the castle when a guest leaves the door open.

Man-in-the-Middle Attacks



While you're still sipping your latte on that unsecured network, even your encrypted messages may not be all that safe. A Man-in-the-Middle (MTM) attack occurs when an attacker intercepts communications and proceeds to "relay" messages back and forth between the lawful parties.

While the messaging parties believe their two-way conversation is private, and might even use a private encryption key, every message is re-routed through the attacker, who can alter the content before sending it on to the intended recipient. The encryption key itself can be swapped out for one the attacker controls, and the original parties remain unaware of the eavesdropper the entire time.

Disguised Filenames



Modern operating systems accommodate speakers of languages such as Arabic and Hebrew by featuring codes which can reverse the direction of type to display such languages correctly: written right-to-left instead of left-to-right.

Unfortunately, these "RTL" and "LTR" commands are special Unicode characters that can be included in any text, including filenames and extensions. Exploiting this fact, a malware purveyor can disguise ".exe" files as other files with different extensions. Your operating system will display the "disguised" name, though it still treats the file as an executable — launching it will run the program and infect your computer. Practice caution with any and all files from unknown sources.

Banking Trojans



A Trojan is malicious software that disguises itself as innocent program, counting on you to download or install it into your system so it can secretly accomplish its malicious tasks. The infamous ZeuS Trojan and its rival SpyEye take advantage of security holes in your Internet browser to "piggyback" on your session when you log in to your bank's website.

These monsters are in the Ivy League of computer malware; they avoid fraud detection using caution, calculating inconspicuous amounts of money to transfer out of your account based on your balance and transaction history.

While financial institutions continue to increase the layers of security involved in large transactions, such as requiring confirmation through "out-of-band" communications — such as your mobile device — digital crooks have lost no time adapting to the changes, with banking Trojans able to change the mobile number tied to your account and intercept that confirmation request. If you're a tempting target, fear is an understandable response. It's just another part of a digital arms race that shows no signs of slowing down.

Facebook Everywhere



It's hard to find an individual who or a corporation that isn't on Facebook. The social networking site has become an ever-present hub for everything online. For some less savvy users, Facebook is the Internet.

With developments like Facebook Connect and Open Graph , Facebook is virtually opening its doors to any third party that wants in on the action. You may have already noticed that Facebook displays ads targeting your specific demographic information, based on the personal information you've posted and activities you've participated in.

What you might not have noticed is that other sites have started targeting your Facebook demographics as well. Any time you browse the Web without first logging out of Facebook, other sites can get access to any profile information you've marked as fit for public consumption.

Don't want every site on the Internet to see you coming a mile away? Just remember to log out of Facebook every time.

Thursday, June 28, 2012

Choosing a Stand Up and Ride Bicycle

Choosing a Ride

Shopping for your new Stand Up Ride can be confusing. Since this sport is relatively new, there are no shops that have all the machines to ride and compare. So as you research your new ride, ask these basic questions to make sure you get the ride that’s right for you:

-What are you using it for? Exercise, fun, competitive events, commuting to work?

-What do the roads, sidewalks, and bike paths look like where you’ll be riding?

-Will you be transporting your ride with your car much?

-Will you be transporting your ride with public transportation?

These questions may seem like common sense but it’s easy to lose focus when you start looking at price, how many gears it has, how fast it goes, and what bells and whistles are on it. All these factors are important to consider but if you start with the basic questions, you should start to be pointed in the direction you should go.


All these rides take some time to learn and a little more time to get comfortable and proficient. The learning curve depends on the person but there is not one ride that is significantly more difficult to learn than the other. Price is absolutely a big factor in your purchase, but remember, regardless of what you pay, your ride will be worth the same if you don’t use it…nothing. 






Thanks for another great article with great tips from my bud at Stand Up And Ride 

Thanks Ken  

Saturday, June 23, 2012

The Dreamslide is like an elliptical fitness machine brought to life.



Dreamslide America



American Headquarters
813-420-8700

 

Feel & handling of a high end bike.

Workout of a an elliptical trainer.


The Dreamslide is like an elliptical fitness machine brought to life.
Riding the Dreamslide combines the motion of walking, jogging & running with the feel and handling of a high performance road bicycle.

Part bike; part stationary fitness trainer.
Like a road bike, the Dreamslide has low rolling resistance road tires, handlebars, crank arms, drive chain, chainring, etc. Like a stationary trainer, it has platforms for your feet to stand upon and a gait that's like walking, jogging or running.

Adaptive Pedaling.
Unlike on a bicycle, the cranks of the Dreamslide move independently, adapting to the rider’s muscle power. When you "pedal", your rear foot moves upwards around three times faster than your front foot descends, generating more torque with less effort by providing a longer power stroke. In the recovery stroke, it's also easier to lift your foot (that's moving forward) up off the pedal platform - another factor that increases power and further mimics the feel of normal bipedal motion.

Natural Motion = Less Fatigue.
Step onto the Dreamslide & it becomes part of you. The Dreamslide simulates natural, human bipedal motion - without the bone, joint & muscle damage that come from the pounding experienced through power walking, jogging and running. The Dreamslide distributes your body weight comfortably and evenly over the entire area of your feet. When you tire of "pedaling", simply coast for a moment and you'll be ready to "pedal" again. Handlebar ends rotate so both your upper and lower body work together to transfer weight and increase power, propelling the bike more efficiently.
The Dreamslide's natural bipedal motion also decreases knee & arterial damage. By tossing away the saddle, the Dreamslide prevents male reproductive damage which can otherwise come from long term riding of a standard bike with a saddle.

So much fun, you'll forget you're exercising!

Found On

Looking for a DAILY aerobic exercise that makes time fly by? Unlike exercising indoors on a stationary elliptical trainer, riding the Dreamslide is so much FUN that 30 minutes will pass like 5-10 would otherwise. Your surroundings are constantly changing and your view is superb (high & wide). The bike is light, accelerates quickly and maneuvers intuitively. People are mesmerized by the Dreamslide bicycle and want to learn more about it. Expect to be the center of attention wherever and whenever you want, just by bringing the bike along. It folds instantly so you can carry it or you can roll the Dreamslide like a suitcase by grasping the built in grab handle.
Best of all, whether you ride the Dreamslide aggressively for excitement or more casually, the experience is bliss.

Thanks Larry!

As found on Ridethisbike.com/

RideTHISbike.com
Cycling for fun, fitness & practicality.

Phone: 504-324-2492