Thursday, February 15, 2018

Netiquette IQ Blog Of 2/15/18 - Proper Use Of The cc: Field and World Hippo Day





World Hippo Day, Hurray.

 Donate here: 
http://go.saveanimalsfacingextinction.org/page/s/save-hippos?source=MS_EM_PET_2017.12.26_B2_Hippos_X__F1_S1_C1__all_RS&email=paulb@verizon.net&firstname=Paul&lastname=Babicki&zip=08560

 
 =====================


The Cc:  field

         All of the Netiquette outlined in the previous section applies to the Cc: field.  Care must be given for insuring that protection of privacy is absolutely provided for in this field which is visible to all recipients.  Those who are included here, as a rule, should be parties who have a direct interest in the subject.  These people should not be addressed in the salutation or body of text as their roles are passive and are not expected to reply or take action unless explicitly asked to do so.  If multiple responses are initiated more addressees should not be added unless it is clear that the previous information is appropriate to those added.  If this is not the case, the thread should be removed.  Those who are included in the Cc: field generally should not be active in responding to the message without good reasons.

         Many add bosses, supervisors or persons of higher rank in a Cc:  Most of the time, this is for good reason.  However, to include such persons to override an option, seek to impress or have motives outside the issue at hand, should  be seriously considered because of the risk of changing the tone, range or spirit of the communication.

         Conversely, there are circumstances in email threads for dropping someone from a To:, Cc: or Bcc: field. Since threads can last for a number of messages, what began as a courtesy for some might become a nuisance to those receiving them.   If there is diminishing or no further real significance for their involvement, Netiquette considerations should be given to determine if addressees should be dropped.  Also, beginning a new mail thread might be the most useful way to disengage from longer threads. 

         Besides maintaining appropriate form, content and consideration, good “Netiquette” goes beyond these disciplines.  Do not Cc: groups if your email is to your supervisor(s) or persons of authority.  This can be interpreted in a very negative way and can prove to be a significant embarrassment.
++++++++++++++++++++++++++++++++
   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.

Wednesday, February 14, 2018

IQ Blog Of 2/14/2018 - Buffer Overflow






        

Buffer Overflow from whatis.com
Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. When there is excess data, it gets written to an adjacent buffer and will overwrite whatever data is being held there. Buffers are vulnerable to attack when applications fail to validate input from the client or other processes and flag or discard data when too much is sent to a memory buffer.
Buffer overflow always ranks high in the Common Weakness Enumeration/SANS Top 25 Most Dangerous Software Errors and is specified as CWE-120 under the Common Weakness Enumeration dictionary of weakness types. Despite being well understood, buffer overflows continue to plague software from vendors both large and small. Vendors issue patches and updates for their software to fix buffer overflow vulnerabilities that have been discovered, but there is still a period of risk between the vulnerability being discovered and the patch being created and deployed.
 
Techniques to exploit buffer overflow vulnerabilities vary based on the operating system and programming language, but the goal is always to manipulate a computer's memory to subvert or control program execution. Buffer overflows are categorized according to the location of the buffer in the process memory, the two main types being stack-based overflow and heap-based overflow.
   ======================

   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.