Saturday, April 12, 2014

Netiquette - Effective Email Use For a Job Search - A presentation GIven BY Paul Babicki



Paul Babicki explains how to use email effectively in a job search

By Rita Williams


graphic design

Whether you’re new to the job market or a seasoned veteran, you probably already know that a tremendous amount of your job search takes place over e-mail. Gone are the days when you had to send your paper cover letters and résumés to future employers via a post office.
Now, job seekers send nearly all their correspondence via e-mail, including thank you notes, portfolios, follow-up questions to recruiters – the list goes on and on.
If you want to learn how to use e-mail effectively in your job search, then you may want to attend PSGCNJ’s general meeting on Monday, February 17th, where Paul Babicki will discuss his book Netiquette IQ: A Comprehensive Guide to Improve, Enhance, and Add Power to Your E-Mail.
Referencing his book, which covers all facets of email communication, Babicki will explain:
  • how to write well and avoid using clichés
  • how to shape an eye-catching subject line in an email
  • what the email time-stamp tells others about your personality, i.e., whether you are  a night owl, versus an early riser
  • how to troubleshoot technical errors, and
  • how to craft an e-mail security policy
Kirkus Reviews calls Netiquette IQ “a mashup of Strunk and White, Miss Manners, Aristotle and Microsoft Help, all laid out in a well-organized, very readable text sprinkled with amusing examples and phrased in the tart, aphoristic style of an exacting schoolmaster (‘The better it sounds, the more it is trusted’).”
So, let Paul Babicki show you how to hone and refine your Net expertise! Bring a friend and come to hear him speak at PSGCNJ’s general meeting on Monday, February 17th, from 10:30 a.m. to 1 p.m., at the First United Methodist Church, located at 48 West High Street, Somerville.
video

Netiquette Quote of The Day From Steven Hawking - Via Netiquette IQ


The Heartbleed virus has caused a great deal of damage. Almost all of us have experienced a destructive virus. I, for one, am puzzled that anyone would want to bring harm to people they have never nor will ever know. Mr. Hawking's quote below is a most compelling one and I hope it will serve to have us all reflect on the damage we can do and can avoid doing!
+++++++++++++++++++++++++++++++++++++++++++++++++++++


I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We've created life in our own image.” - Stephen Hawking
++++++++++++++++++++++++++++++++++++++++++++++++++++++
In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

video


Friday, April 11, 2014

Netiquette Security - The Ultimate Guide For "Heartbleed" From US-CERT - Via Netiquette IQ



The best source of Internet security is US CERT, United States Computer Emergency Readiness Team. This should be a source for all on-line companies, groups and users.
========================================


·         OpenSSL 1.0.1 through 1.0.1f
·         OpenSSL 1.0.2-beta
Overview
A vulnerability in OpenSSL could allow a remote attacker to expose sensitive data, possibly including user authentication credentials and secret keys, through incorrect memory handling in the TLS heartbeat extension.
Description
OpenSSL versions 1.0.1 through 1.0.1f contain a flaw in its implementation of the TLS/DTLS heartbeat functionality. This flaw allows an attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time. Note that an attacker can repeatedly leverage the vulnerability to retrieve as many 64k chunks of memory as are necessary to retrieve the intended secrets. The sensitive information that may be retrieved using this vulnerability include:
·         Primary key material (secret keys)
·         Secondary key material (user names and passwords used by vulnerable services)
·         Protected content (sensitive data used by vulnerable services)
·         Collateral (memory addresses and content that can be leveraged to bypass exploit mitigations)
Exploit code is publicly available for this vulnerability.  Additional details may be found in CERT/CC Vulnerability Note VU#720951.
Impact
This flaw allows a remote attacker to retrieve private memory of an application that uses the vulnerable OpenSSL library in chunks of 64k at a time.
Solution
OpenSSL 1.0.1g has been released to address this vulnerability.  Any keys generated with a vulnerable version of OpenSSL should be considered compromised and regenerated and deployed after the patch has been applied.
US-CERT recommends system administrators consider implementing Perfect Forward Secrecy to mitigate the damage that may be caused by future private key disclosures.
References
·         OpenSSL Security Advisory
·         The Heartbleed Bug
·         Perfect Forward Secrecy
Revisions
·         Initial Publication
======================================
In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

video



Netiquette Quote of The Day - Figures of Speech- Via Netiquette IQ


My blog yesterday listed the most common figures of speech. These literary devices can find their way into many of our emails, letters, even resumes and proposals! Today's quote from Samuel Beckett reflects this. It is far better Netiquette and it will produce better results, to use power words rather than figures of speech!
=========================================


========================================
"I know those little phrases that seem so innocuous and, once you let them in, pollute the whole of speech. Nothing is more real than nothing. They rise up out of the pit and know no rest until they drag you down into its dark." ATTRIBUTION DETAIL »
-Samuel Beckett
===================================
In addition to this blog, I have authored the premiere book on Netiquette, " Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County, NJ.

video