If you don’t know anything about Anti-Counterfeiting Trade Agreement (ACTA) then you should watch at least this video. It doesn’t matter why you are using internet or you think that it doesn’t affect you, it does. It appears that SOPA and PIPA were just distractions to the real enemy of the internet, ACTA. They have created ACTA in the name of intellectual property rights and to create international standards to protect them. ACTA gives access to everything you do or say over the internet, everything. They will have access in everything that you send and receive over the internet even you emails and chats. And they do this to check if anything you send or receive has to do with intellectual property rights.
Category Archive: Articles
People nowadays use the best tool to hunt and find victims, the Internet. This includes thieves, pedophiles and all sort of bad people you can think of. Several months ago I read about a thief that was searching facebook to find who are away from home in order to break into their houses. People, without thinking the consequences, tell to everybody who is using facebook that they will be on another country via status updates. They might also have in their profile where they live or that can be easily found from all the other info in their profile. If you tell someone that you are not home for days then you make it very easy to come and rob you. This is just an example and there are many more.
There are many companies that their operations, and most of their profit, are based on the Internet. Some of those Internet companies earn most of their money by advertising products and other companies. Examples of such Internet companies are Facebook and Google. Users have the power to destroy any Internet company they want. Most probably you can not do such thing alone but a large group or movement like Anonymous might can. This article is written because I found it interesting and I don’t support any actions that will intentionally harm a company. I will describe two methods that can hurt advertisers and ad-serving companies and websites, if done massively, advertisement blocking and intentional advertisement clicking.
Stars like humans and everything else die. When a huge star dies (supernova explosion) it does not disappear completely but a dense core remains. If the mass of that remaining core is at least three times more than the mass of our sun, gravity is the winner force, star collapses and a black hole is born. There are billions black holes in the universe and it is believed that they can be divided into two categories. “Stellar mass” black holes which are 10-25 as massive as the Sun and “Supermassive” black holes which are millions of times as massive as the sun. If the small ones have so strong gravitational field, then I can only imagine how strong is the gravitational field of the big ones, which are millions of times as massive as the small ones.
Facebook has announced that hackers login to Facebook hacked accounts 600.000 times (not all of them successfully) in 24 hours. So far we had to worry only for our password, to be different from our other accounts (email, other websites), to be strong and don’t be hacked (Trojans, Keyloggers). Facebook added a new feature to regain your account if it is hijacked and it is called “Trusted Friends”. You can select three to five friends that will get a code and if you enter those codes you will get access to your account. You might think that this is a good thing and that you will get access to your hijacked account but this is the one side of the coin. You might also think, if this feature was created to help you then how is it possible to have another side?
According to Facebook, 600.000 logins every 24 hours are hackers that gain access to victims’ accounts. Once a hacker gains access to an account he can see all private information stored on victim’s account including photos and emails. He can add friends, send private messages and write on the wall. Usually, hackers post links on the victim’s wall to product and services that will give them profit if someone clicks and/or buy them. If the 600.000 hacks are unique every day (which are not most probably) in about 4 years everyone’s account will be hacked.
What is a WordPress child theme? Child theme is a WordPress theme but you don’t have to create it from scratch, you use another theme as a base called parent theme and you modify its functionality, layout and styling. You don’t have to be a code guru to create a child theme, in fact you don’t need to know PHP at all. Why should I use child theme? You have found a theme that you like but it needs some additions or modifications to make it meet your needs.
Francis Bacon’s Cipher or Baconian Cipher is strictly speaking a steganographic code and not a true cipher. To encode your message with Baconian cipher you replace each letter of your original text with a group of five ‘A’s and ‘B’s. There are two versions of the Baconian alphabet, in the first version the letters ‘I’ and ‘J’ have the same code and the same applies to ‘U’ and ‘V’. In the second version each letter has its own code.
WordPress is in my opinion the best choice for your blog. It is powerful and highly extensible. I have created a list of things that anyone can do to add layers of protection to his blog. Blogging means spending time to write and no one wants to see this time and effort wasted due to some hacker. In addition, it is not a good practice to be worrying all the time about hackers and system errors. This list will help you relax and forget about security and focus on writing.
Hackers plan their attack based on the information they have. A large portion of attacks is based on outdated versions of web server, Wordpress, themes, plugins and anything else they can exploit vulnerabilities found on old versions. Wordpress version is visible in any page and post. It is included in the header and anyone who visits your site/blog can see this information. It is wise to remove this information so hackers can’t find the version and plan their attack based on the vulnerabilities found on that version, especially if you don’t update Wordpress because you have made many changes to the code. There are many ways to remove Wordpress version if you search but not all of them remove the version successfully…