IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

5 Ways IT and Social Media Are Connected

5 August 2015 By Goran

The worlds of IT and social media are more connected than many people realize. Although a typical person might think that social media is more for amateur or corporate use, and IT is more for professional use, there are a surprising number of ways that their paths combine regularly.

To illustrate this, consider the following five themes: first be sure to know what the big three are, then use this knowledge to understand the security risks involved, use social media to promote professional and technical knowledge, find reasons to create more efficient and shareable code, and use the system as a way to find kindred workers and job opportunities.

Social-media

What Are The Big Three

When you dive into social media analytics, you’ll immediately find lots of references to the big three. These are, obviously, Facebook, Twitter, and YouTube. Without that basic understanding, the rest of the IT and social media connections aren’t going to make sense. If you want to step yourself through the process, you at least need accounts in those three places to understand how to set them up and what they connect. Instagram and SnapChat are two other systems to consider integrating as well. [Read more…]

Filed Under: General Tagged With: IT and social media, job opportunities, Security-risks, social system

The Security problems of Torrents

1 December 2007 By Saran

torrents.jpgEver since it was introduced, torrents have flourished into one of the world’s most widespread file sharing protocols in use today. It was introduced as a method of sharing huge files without the worries of heaving one source or having to consider the varying bandwidth’s people are linked to the internet through all the world’s providers ( different providers offer different bandwidths and speeds and they vary from country to country). The system is a no-fuss file transfer protocol that does not rely much on bandwidth. Another advantage is that there is no spy-ware or pop-up advertising on bit-torrents.

The system has a server that hosts the bit-torrent file sharing system and all the users have a client side program that connects to that said server facility. When a user conducts a search, the server provided the user with the most likely source of the said file and allows the user to get the said file from those sources that are mirrored or specified in the server’s database. The future of bit-torrents is to eliminate the need for centralized servers running the host applications and to get both server-side and user or client side programs installed onto a pc without a need for the remote server.

Now for the dark side, the said ongoing improvement of eliminating the server side of the system is to eliminate the need for toughened security at the server end where one can get the history and IP addresses a user has gone through. There is also growing concern for the said file sharing technology has now being used as a propagation grounds for pornographic materials over the internet. Do a quick search on torrents sites and you’ll se what I mean. Also, being a straight-forward file sharing system, as the data travels through the internet anyone intercepting the said file can easily get any information they want for the simplified processing and file transfer is accomplished by taking away most of the security features other systems employ. The elimination of security makes transactions (file transfers) faster but less safer and vulnerable to attack.

Filed Under: General, IT Security Basics, Malware, Network Security, Real-World Issues, Spyware Tagged With: Huge-file-sharing-protocol, Security-risks, Torents

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security