What is blogging? isn’t it cool

Posted: Monday, May 3, 2010 by Ajin Kabeer in
2

Isn’t it interesting that some of the most significant ‘revolutions’ of the last twenty years have all had to do with writing? How retro is that? First we had email, then webpages, then mobile phone texting, and now blogs. All this reflects a trend whereby the world is becoming more formal in how it communicates. Instead of body language and endless conversations, communication has shifted towards endless words on a screen.

Bloggers are people with attitude. They say there’s a book inside everybody. Well, the Web and blogs have let the book out! There has literally been an explosion of opinion. Traditionally, public relations was about honing a silvery message that communicated exactly what the organization wanted us to hear. Now, we can hear all sorts of voices on the subject. It’s true democracy at work.
The advantages of blogs from an organizational perspective include the following:

  1. The consumer and citizen are potentially better informed and this can only be good for the long-term health of our societies and economies.
  2. Blogs have potential to help the organization develop stronger relationships and brand loyalty with its customers, as they interact with the ‘human face’ of the organization through blogs.
  3. Blogs, in an intranet environment, can be an excellent way of sharing knowledge within the organization.
  4. Blogs can be a positive way of getting feedback, and keeping your finger on the pulse, as readers react to certain pieces, suggest story ideas, etc.
  5. Blogs can build the profile of the writer, showcasing the organization as having talent and expertise.
The disadvantages of blogs are:
  1. Most people don’t have very much to say that’s interesting, and/or are unable to write down their ideas in a compelling and clear manner.
  2. I have often found that the people who have most time to write have least to say, and the people who have most to say don’t have enough time to write it. Thus, the real expertise within the organization lays hidden, as you get drowned in trivia.
  3. Like practically everything else on the Web, blogs are easy to start and hard to maintain. Writing coherently is one of the most difficult and time-consuming tasks for a human being to undertake. So, far from blogs being a cheap strategy, they are a very expensive one, in that they eat up time. As a result, many blogs are not updated, thus damaging rather than enhancing the reputation of the organization.
  4. Organizations are not democracies. The Web makes many organizations look like disorganizations, with multiple tones and opinions. Contrary to what some might think, the average customer prefers it if the organization they are about to purchase from is at least somewhat coherent.
There’s money in words; real value, real worth. I’m not a blogger but I do have this newsletter and I can tell you that these 500 or so words that I publish every week have seen a major return on investment for me.
As an individual, I would highly recommend that you have some sort of publishing strategy, whether it be a blog, newsletter, writing articles for magazines, website or whatever. This is an age where you will build your professional reputation word by word. Start off by finding something people care about and that you care about.

Follow Me For More Updates @aj1n - Twitter

File transfer in orkut and iGoogle chat

Posted: by Ajin Kabeer in
0

Have you ever wanted to quickly send a file to a friend who’s online? Now it’s easy! We’re excited to announce that you can now share pictures, documents, and other files with your friends while chatting in orkut and iGoogle. To give it a try you don’t need to install anything, simply start a conversation with a friend and click Send a file… in the ‘Actions’ menu:



This feature is also compatible with the file transfer functionality in the Google Talk downloadable software, so you can share files directly from the web with folks who use the desktop version.
File transfer is available in orkut and iGoogle only for now. We’re working on bringing it to Gmail as well, and we’ll keep you posted when that happens!

Cyberattack on Google: ‘Password system hit’

Posted: by Ajin Kabeer in
0

When alleged Chinese hackers infiltrated Google’s internal systems in December, they lifted source code for a password system that controls access to almost all of the company’s web services, according to a report citing a person with direct knowledge of Google’s investigation into the matter.
The New York Times reports that the December attack nabbed code for the system that controls single-sign-on for millions of users across myriad Google services, including Gmail and the company’s online business applications. Originally codenamed Gaia – a nod to the Greek godess of the earth – it is now known simply as Single Sign-On.



According to The Times, the attack began when an instant message was sent to a Google employee in China who was running Microsoft’s Messenger client. When the employee clicked on a weblink in the IM, attackers gained access to the employee’s PC, and from there, they tapped machines used by “a critical group of software developers” at the company’s Mountain View headquarters. Eventually, they also gained access to a software repository where source code for the Gaia system was stored.
Code was moved to machines housed by the Texas-based webhost Rackspace, The Timessays, before it was transferred to some other, unknown destination.
At some point, according to The Times, the attackers gained access to an internal Google directory called Moma, which houses info on the “work activities” of company employees. This may have been used to locate specific individuals inside the company. The attackers “seemed to have precise intelligence” about the names of the Gaia software developers.
However, The Times says, the attackers “do not appear” to have lifted the passwords of individual Gmail users.
On January 12, Google told the world that Chinese hackers had stolen unspecified intellectual property from the company’s internal system, and it said evidence indicated that “a primary motive” of the attacks was to gain access to the Gmail accounts of Chinese human rights activists. In light of the attack – and what it described as other, routine attacks on the Gmail accounts of such activists – Google said it had resolved to stop censoring search results in the country.
A little more than two months later, after talks with Chinese government, Google shut down its Chinese search engine, Google.cn, and redirected visitors to its Hong Kong-based engine, Google.com.hk, where it now provides uncensored search results in simplified Chinese.
VN:F [1.8.8_1072]

Vulnerabilities IN THE IE 8 XSS Filter – UNDER-LINUX

Posted: by Ajin Kabeer in
0



"It is a fact that when a security feature creates uncertainty, it is time to ask if it should not be taken from the field, or even, if not better rethink the whole concept and restructure it again (redundant with) the zero. But that’s not the way Microsoft seems to be, since the third update your filter XSS (Cross-Site Script) for Internet Explorer 8, in an attempt to further protect the power system, makes the sites that were not vulnerable, become vulnerable. Hackers could exploit the flaw to inject JavaScript code in HTML pages, and run it with normal privileges of their own web page normally visible.”
The presence of filter XSS vulnerabilities in Internet Explorer 8 was first discovered in November 2009. Meanwhile Microsoft had already released two updates to try to fix the problem: MS10-002 in January 2010 and MS10-028 in March this year, which can correct some of these vulnerabilities. A new update is already being planned to be released in June this year, to correct the vulnerabilities related to the SCRIPT tag, which was described last week, Black Hat conference in Europe.
But even with all this discussion of the problem, David Ross from Microsoft, yet continues to insist that the browsers must have the capability of filtering for XSS. He sincerely believes that the existence of protection against XSS attacks standard in most cases, outweighs the potential risk of bugs.
While the popular NoScript plugin, used in most browsers Firefox installed, always asks the user interaction to determine whether blocking or scripts found on the web pages during browsing by the user, the filters responses from the server to block XSS in Internet Explorer 8, operates quite differently. Instead of making requests to the user for each malicious code found, it changes them. And this “functionality” may well be exploited by attackers to modify the server responses, and thus able to inject code that will.
Clearly, for this, the attacker must have some level of control over the content of the pages visited by users, as those achieved in social networking sites, forums and wikis. And the example in the Black Hat conference was none other than the greatest of all the social networking world – Facebook.
Google itself and its services are also affected. But the Internet giant has a “weapon” to the benefit of users who use the Internet Explorer browser with the locking system. It sends a header X-XSS-Protection: 0 to disable this feature. But since the last update made in Internet Explorer 8 in March this year, already supports blocking the header X-XSS-Protection: 1, mode = block. This tells the browser to woe instead of modifying the server responses, if in doubt, it must make the block all content from the suspicious site.
The Google Chrome also has a 4-blocker known as XSS XSS experimental Auditor. to run, it checks if there are any before returning JavaScript code to generate a vulnerable Web page that is included in the request. If confirmed, the system may be experiencing a classic case of reflective XSS attack involving a manipulated link. but do not worry because the browser will block the script execution. WebKit, the main engine of Chrome browser also supports headers XSS. But the lock mode is not implemented yet, but scheduled for inclusion in a future version of Chrome.
If you are a user’s Internet Explorer browser might start thinking about migrating to Firefox, and can use the extension NoScritp. Remember that the “safe than sorry.” No sense in getting stuck in a browser that is not worrying much about their safety. Remember that most attack vectors in Inter5net are made by flaws found in Microsoft tools, is your browser, or even your operating system. And you? What browser do you use in your day to day, and what their tactics to ensure its security on the Internet? Leave your comments below.

VN:F [1.8.8_1072]

Peter Answers : - The Virtual Tarot

Posted: by Ajin Kabeer in Labels:
0

What To Say About Peter Answers Its Just An Virtual Tarot. I Know Many Of You Don't Know What Is Peter Answers , I will Make It Clear , Its Just A Website Which You Can Ask Questions And Get Answers At An Instant.Try It By Yourself.

Few Things To Keep In Mind While Asking Questions:-

Visit [  http://www.peteranswers.com ] where there are two text boxes: "Insert Petition" and "Insert Question."


Ask your audience for a question. If it's a question you know the answer to, proceed to the next step. If it's a question you don't know the answer to, you can ask them for the answer, telling them that if they say the question and answer out loud, Peter will hear them with his psychic powers. If you don't know the answer, you won't be able to follow the next step, and Peter will answer with a very generic statement like "You shall not doubt of me at all, keep trusting on me and soon I'll answer." In other words, the trick won't work!

  • All The Best :) -

    Save Your Computer

    Posted: by Ajin Kabeer in Labels:
    0

    Save Your Computer From Mal-wares And Viruses , All You Have To Do Is To Buy The Original Anti-virus Software.

    Here Are Some Top Antivirus Up To Date :-

    [ Arranged In Order According To Their Rating ]

    #1:- BitDefender Antivirus
    #2:-Kaspersky  Anti-virus
    #3:-Webroot Antivirus With Sweeper
    #4:-Norton Antivirus
    #5:-Eset Nod32 Antivirus
    #6:-AVG Anti-Virus
    #7:-F-Secure Anti-Virus
    #8:-G Data Antivirus
    #9:-Avira Antivirus
    #10:-Trend Micro

    A well-balanced antivirus solution is effective, efficient, and easy to use. Combining all the right features with a usable interface; our top antivirus software choices deliver the best security and usability without a serious investment in time, money, or system resources.

    Buy It Today And Extend Your Pc's Life !

    Ten Things You Can Do To Reduce Global Warming

    Posted: Friday, March 19, 2010 by Ajin Kabeer in
    0


    • Reduce , Reuse & Recycle
    • Use Less Heat And Air Conditioning 
    • Change a light bulb
    • Drive Less And Drive Smart
    • Buy Energy Efficient Products
    • Use Less Hot Water
    • Use The "Off" Switch
    • Plant A Tree
    • Get A Report Card From Your Utility Company
    • Encourage Others To Conserve 


    If You Can't Do It , You Are Knowingly Destroying The Human Earth : - Ajin