Home Tags Posts tagged with "social"

 

Social networking tips

According to a worldwide study 3 out of 4 couples married in the last decade met on the internet.

If you also want to find interesting people please read carefully this tips.

 

–          Please choose an interesting and realistic profile picture.

 

Social-Media-People

 

 

The picture reflects the features you want to be shown about your personality, so be very mindful in the selection.

Avoid glasses, boobs and make up.

Of course do not add another person. Remember, is a profile picture of you, not a soccer team poster.

If the picture portrait you doing something or in a specific place, make sure that is something usual.

For you to show how great the Everest climb was you will want to create an album, not a profile picture.

 

–          Do not include all your personal information in your profile and make it visible to only your friends, never public.

Even to your friends, hide information, hide as much information as you can without appearing arrogant.

 

–          Stay away of any statement.

Avoid religious, sportive or political references as much as possible.

If other people post in your wall do not like the post or comment, leave it to the public.

 

–          Think ten times before posting something and a thousand before commenting.

You will not have a second chance to re post that so count until ten and when in doubt, throw it out.

Also pictures.

Pictures are the image you project to the world about you.

Most people don’t read so they only take information from your pictures.

 

–          Be responsive, educated and quiet.

Reply to every single message and invitation you receive, even if you don’t know who the person is.

 

–          Ask for advice about your profile.

Most of the time your friends and family are the best on correcting you from what is wrong.

Use that objectivity power they have and ask them what they think you should modify in your profile.

And obey.

Also look yourself at your profile from another person device so you can see how it looks to other people or use the ‘View as’ feature.

 

–          Be specific in the information.

You should not include too much personal information but if you decide to add some do not overpopulate that area.

Let’s say you want to add some music you like, ok but just a few.

Trust me, by telling the world that you like music you are not doing any favor to yourself, pretty much the contrary.

–          If there is something you really can’t stand it is better to subtle let that know to viewers.

It can be anything, maybe you don’t tolerate blond people or black people ok, with just one little sarcastic comment is more than enough to maintain blondes and darkies away from you.

 

–          Show humor in your profile.

Without being goofy you need to make sure everyone understand you don’t take yourself or your internet profile seriously.

 

–          Allow yourself to make mistakes.

There need to be something in your profile that shows uncaring.

Even if you’ve been thinking during a month about it, it needs to reflect careless.

If you are perfect like me you probably wouldn’t find any mistakes so take advantage of the social network itself to do that for you.

Just by not posting a background picture or by not selecting the correct city you live in, people will think you don’t know how to do it or you don’t care about it.

 

 

 

….

the world must know the truth!

 

 

VN:F [1.9.22_1171]
Rating: 5.0/5 (5 votes cast)
VN:F [1.9.22_1171]
Rating: +5 (from 5 votes)

0 3677

 

The Boston Globe

 

How to be a hacker

 

I’m sure if you are reading this page is because you are smart.

So you are also able to bust into people’s computer, stealing passwords and credit card numbers using nothing more than your brain.

I used to be a hacker myself so let me tell you that everything you’ve see on movies about hacking has utterly failed to communicate just how completely boring it actually is.

 

Hacking is easy

 

The majority of events that you describe as ‘hacks’ are pretty trivial.

Any of us is perfectly capable of cracking passwords or bringing down a website, even you.

Don’t trust me? Google it.

You see? Is just a matter of clicking here and there, some readings, some downloads and you are hacking whatever you want.

It takes very little thought to run someone else’s scripts and hacking tools someone else has made.

Note for the 99% of you who have opened another browser to start hacking things: you can do it but you will get caught so please, for the sake of our overcrowded prisons, stay calm.

 

Social engineering

 

The biggest security hole every piece of software or hardware has to try to deal with can be summed up in the below statement.

Humans are stupid.

hacker-attack-password

 

It’s this stupidity that hackers take advantage of for the simplest and most effective hacks of all.

First, there are all the problems we have with our passwords, which are the central element of our security systems.

All of us have terrible easy to guess passwords.

Let’s pretend for a second that you are the exception that proves the rule and your passwords are not dumb.

Well, there’s also another issue: the idiots you’ve given your passwords to for safekeeping.

In other words, the employees of any company that handle emails and passwords.

When you sign up on a social network or a shopping site you don’t conduct an interview with their network security team.

You just access the page and give them your email and your password.

Chances are, those guys don’t even have a clue on how to store your information securely and by simply social engineering you can trick them into giving out anyone’s personal information.

 

Sit and wait

 

When most people think of hacking, they probably picture someone sitting in a dark room frantically typing, every keystroke chipping away at the firewall, just steps ahead of the authorities.

The details may vary but they’ll certainly picture something tense and fast paced, where every second counts.

At no point during this hack do they imagine the hacker wandering off somewhere for several months.

Viruses, Trojan horses, and worms are a group of semi-related programs that, once created, spread around completely on their own, which can take a lot of time, but allows them to damage or compromise a lot of computers.

This is how some of the most impressive hacks of all time have been pulled off.

Like the Trojan horse which blew up a natural gas pipeline in Siberia.

So not only does this type of hacking involve making the virus, with all the tedious weeks of programming, and math that goes into that.

Once that’s done come the months and months of waiting.

It’s about as exciting as planting a tree, except with the fun possibility that the FBI will come kick in your door.

 

 

….

the world must know the truth!

VN:F [1.9.22_1171]
Rating: 5.0/5 (6 votes cast)
VN:F [1.9.22_1171]
Rating: +6 (from 6 votes)