Profile cover photo
Profile photo
Havaweb
4 followers -
Cheap Website Design
Cheap Website Design

4 followers
About
Posts

Post has attachment
Toxic mercury vaccine preservatives claimed good for children - YouTube http://ow.ly/B6CAq
Add a comment...

Post has attachment
Bottom Line Websites that use personal information should purchase a security certificate and implement the HTTPS protocol. Other websites that do little more than serve web pages don’t need it. For the time being, the added overhead and cost is probably not worth the small SEO advantage Google grants for having it. Image: K Ross http://ow.ly/AIgQv
Add a comment...

Post has attachment
Importance Anytime a website or a browser transmits information, there is a risk that someone else could be listening and attempt to steal the information. This is simpler than it sounds. Publicly available software can easily watch the connections on a public network and read the data going in and out. If you log onto a website that uses HTTP with your email address and password, that information is sent as plain text and is easily readable. You may want to remember this the next time you use public WiFi. With HTTPS however, that information is encrypted using the public and private keys. A listener won’t be able to decrypt the information without using some very expensive hardware and specialized software. Generally speaking, only government funded agencies have those kinds of resources http://ow.ly/AIgOY
Add a comment...

Post has attachment
Two Levels of Security Transport Layer Security—TLS— and its older cousin SSL (Secure Socket Layer) use a combination of public and private keys to encrypt and decrypt information. They do this by using small pieces of data called certificates that conform to the x.509 standard. Data is encrypted and decrypted using a complex algorithm based on a series of data bits called public and private keys. The public key is known to everyone, the private key is known only to the certificate issuer. This is similar to a password known by two people. If one sends the message, the other needs the password to read it. When a browser receives a certificate from a website, it verifies that certificate with the authority that issued it. If the authority is trusted and the certificates match, then the browser’s user is assured that the website is who it claims to be and they were not somehow redirected to another website. This is similar to using a signet ring to emboss a wax seal on an envelope. Anyone could open the message, and everyone will know who sent it because of the seal. That seal shows in your browser as a closed padlock to indicate the secure connection. http://ow.ly/AIgOe
Add a comment...

Post has attachment
HTTP and HTTPS The HTTP protocol—Hypertext Transfer Protocol—is a way for network servers to transmit documents and information to client computers connected to the network. When your browser connects to an HTTP server, it requests a page and if the page exists and you have the proper authority, the server sends the document using the HTTP protocol. Your browser then displays the document. HTTPS adds security and as you probably already know, the S stands for Secure. It does this by adding another layer to the software that controls how the computers talk to each other. This layer is called SSL/TLS. http://ow.ly/AIgN3
Add a comment...

Post has attachment
How HTTPS and Security Certificates Work and Their Importance Posted on 08/12/2014 by MJ Logan HTTPS and Security Certificates Help Safeguard Personal and Private Information Google recently announced they would begin providing a small algorithm boost to sites that used the HTTPS protocol in favor of the HTTP protocol. Since that announcement, many new website owners, managers, and webmasters have been asking about the differences and whether or not they should implement it. In a nutshell, HTTPS is a more secure way of transmitting web page data over the internet. http://ow.ly/AIgLC
Add a comment...

Post has attachment
Key Lengths Suppose a password were only two characters long. It would not take long to determine the password using a trial and error method. The longer the password is, the harder it is to guess. The same is true for the keys used by security certificates. Keys are created in lengths based on the powers of two. For example, two to the eight power is 256. The method of encryption used for public and private keys requires longer key lengths. A length of 1024 bits was once considered fairly secure, but that has changed with increases in computing power and advances in mathematics. Up until December 31, 2013, the standard length for subscriber certificate keys was 1024 bits and many websites are still using keys based on that length. Although difficult to break, those keys are no longer considered sufficient and may be vulnerable. The 2048 bit key is now considered the minimum. http://ow.ly/AIgPV
Add a comment...

Post has attachment
Hashtag Mistakes Perhaps the biggest mistake is overuse. Social media users consider too many hashtags annoying. Using unrelated hashtags that don’t belong is also considered bad manners because they add noise to search results. In most cases, a single relevant hashtag is all that is required. A second one can add relevance, and a third is considered the absolute maximum. Loading a tweet with hashtags, especially unrelated hashtags, can trigger filtering on twitter and cause tweets to be hidden. When making up a new hashtag, try to keep it short. Too long and it uses up too many characters on twitter and introduces the possibility of spelling errors. Consider carefully before mixing upper and lower case. Users can be lazy and upper case is an extra keystroke. Easy on a keyboard, less easy on a mobile device. http://ow.ly/AIgG5
Add a comment...

Post has attachment
The Hashtag The hash mark is a pound sign ( # ). When it precedes a word, that word becomes a search term called a hashtag on social media sites like Twitter, Facebook, Google Plus, and Instagram. As an example, if you search for #selfie on Twitter, you will find many tweets with pictures that people took of themselves. Hashtags as a social media device began sometime in 2009 when Twitter began linking them to keyword searches. The Oxford Dictionary added the word ‘hashtag’ this year, making it an official part of the English language. http://ow.ly/AIgER
Add a comment...

Post has attachment
Use Hashtags Effectively to Increase Social Media Reach Posted on 08/14/2014 by MJ Logan Hashtags on Social Media Sites are Searchable Keywords A new television commercial pokes fun at an inept office worker using a copy machine to take a ‘selfie’ which he references with ‘hashbrown’ instead of hashtag. His coworker rolls her eyes and makes a quick exit when he invites her to join him instead of photobombing. “That’s not how it works,” she tells him. Everyday in the social media world, users implement hashtags in a variety of ways. Some of those ways are effective, others not so much. Effective use can increase your social media reach by attracting new followers to your website and opening new doors to content discovery. Use them incorrectly and like the guy with his head in the copy machine, you’ll chase away those potential followers. http://ow.ly/AIgC4
Add a comment...
Wait while more posts are being loaded