Saturday, July 4, 2015

Netiquette IQ Blog For 7/4/15 - Happy Fourth Of July! - US Flag Etiquette

Posted by 
Nick Bert  in Ramblings from havanaherald.net
Thursday, July 2. 2015

With Independence Day Saturday, here’s a short course on U.S. Flag etiquette. Please have a safe and happy holiday.

Few of us know how to display an American flag properly; even fewer are aware of all the details of flag etiquette. It can get complicated, so we went to the source – the U.S. Flag Code – to find out the right way to handle Old Glory...

Many Americans think we are displaying our patriotic pride by wearing a U.S. flag on our sleeves, chests or elsewhere.

But the U.S. Flag Code prohibits wearing Old Glory on an article of clothing or printing its image on anything disposable, such as paper plates, napkins and
other picnic decorations.

Every day, many people violate Section 8d of United States Code Title 4, Chapter 1. Read on to learn the proper handling of the American flag…

When to Fly the U.S. Flag

Some people like to display flags 24 hours a day, year-round, but they may not be doing it right. Flag etiquette requires that a U.S. flag be properly illuminated at night and taken down during foul weather, unless it is made from all-weather material.

The American flag can be flown every day, but the government has designated certain days when flying it is especially important.

The U.S. Flag Code recommends that the flag fly from sunrise to sunset on the following holidays:
New Year’s Day, Inauguration Day, Martin Luther King Jr.’s Birthday, Lincoln’s Birthday, Washington’s Birthday, Easter Sunday, Mother’s Day, Armed Forces Day, Memorial Day, Flag Day, Independence Day, Labor Day, Patriot’s Day, Constitution Day, Columbus Day, Navy Day Veteran’s Day, Thanksgiving Day, Christmas Day.

More Flag Etiquette Tips

Here are more basic flag etiquette guidelines:
• An upside down flag is a distress signal.

• The flag of the United States should never be dipped to any person or thing.

• No flag should be torn, soiled or damaged in any way.

• No marks such as logos, insignias, letters, words, designs, or figures should be attached to the flag.

• The flag should never be used to carry or hold anything.

• Never use the United States flag for advertising. Its image should not appear on boxes, paper napkins, plates or anything made to be discarded.

• Do not use the flag for clothing or as a costume.

• The U.S. flag, when displayed with flags of other nations, should always be hoisted first and taken down last.

• Multiple flags of various nations should always fly at the same level during peacetime.

You can find out more about U.S. Flag etiquette, such as properly displaying it with other flags and at homes and businesses, flying it at half-mast, and proper disposal at various sites on the Internet. The information above came from lifescript.com.


==============================================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
video

Netiquette IQ Quotation Of The Day - Your GPS And Privacy

As the Internet of Things grow, privacy will dramatically change forever. The quote below echos this.


Jim Farley, Ford Motor Company’s top sales executive, who is known for making off-the-cuff comments, told a panel at the CES: “We know everyone who breaks the law. We know when you’re doing it. We have GPS in your car, so we know what you’re doing.” Although he quickly added, “By the way, we don’t supply that data to anyone,” and later issued a full retraction, the comments, even if overblown and meant to be provocative, fueled the concerns. [NY Times, The Next Data Privacy Battle May Be Waged Inside Your Car, Jaclyn Trop, January 10, 2014]

==============================================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
video

Friday, July 3, 2015

Netiquette IQ Blog Of The Day - Some Common Fallacy Definitions

I have maintained many times, particularly in my book, noted below, that Netiquette has, as part of its core, Logic and logical thought. The article below does a nice job in summarizing this without shaving to provide significant detail. For a more in-depth explanation, please read my book.===============================================

How To Respond To Fallacious Arguments On The Internet [Stuff to Watch]
Tim Brookes
On 17th March, 2015 from makeuseof.com
Web Culture

By Tim Brookes on 17th March, 2015 | Web Culture |  2 Comments
You should already know that arguing on the Internet is a fruitless endeavour that’s likely to raise your blood pressure, but sometimes you absolutely have to make your point. We get that.

But how often is your (naturally well-worded and kind-mannered) argument rebutted with an attack on your character, or a seemingly nonsensical comparison? Wouldn’t it be great if you could deflect these fallacious arguments while enlightening your detractors as to why their challenge falls short?
Well, with the help of these eight videos addressing common fallacies online, you can!
Debate club members and law students aside, there are a lot of problems with the way people argue on the Internet. You’ve probably lost track of how many times you’ve told someone to “never read the comments” without giving it a second thought as to why. Is it because other peoples opinions are really that bad?

Probably not. Other people’s opinions aren’t worse than yours, but it’s often the inability to listen to bad arguments that makes comment sections so painful to read. Whenever someone does put forward a compelling point of view that challenges the status quo, they’re so often shot down by one of these dominant logical fallacies – and the point is lost.
The next time this happens to you, you can just post a link to one of these videos instead. Consider it a public service.
The Strawman Fallacy
Quite possibly the most common point of contention you will find online, the strawman is an attempt (be it intentional or otherwise) to simplify an argument, so that it can be more easily defeated. This includes taking facts or figures out of context and even completely bypassing the existing argument by oversimplifying something entirely.
The Ad Hominem Fallacy
Ad hominem attacks are also par for the course in Internet comment sections, just as they are in the political world. Put simply, an ad hominem attack would generally ignore the primary argument and attack the person making the argument instead – thus suggesting that their point of views are wrong because of some apparent character flaw.
The Black and White Fallacy
Also known as a false dichotomy or false dilemma, the black and white fallacy rears its ugly head when a limited range of options are presented as being the only options. One example would be to suggest that wanting more of one thing would mean that you would — by erroneous definition — want less of something else. These two matters of argument are frequently non-inclusive.
Moving The Goal Posts Fallacy
As the football-inspired name might suggest, this fallacious route of argument involves changing the “win condition” of an argument constantly so that a particular viewpoint cannot be defeated. If you’re arguing against someone doing this, you’re very much unlikely to “win” – they will attempt to find some way of rendering your point impossible to prove. You should just show them this video instead.
The Fallacy Fallacy
The fallacy fallacy is a bit like the ad hominem fallacy, in that it relates to the individual making the claim directly. It supposes that if this person themselves has committed a fallacy in drawing their conclusions, that their conclusions must therefore be incorrect. This isn’t true – even though someone’s argument may be constructed using fallacious means, the conclusions could still be correct.
The Texas Sharpshooter Fallacy
The Texas sharpshooter fallacy reverses the roles of cause and effect, where an argument is constructed and subsequently confirmed using the same information. The name is derived from a story about a Texan shooting at the side of a barn, who then gets up and paints his targets on the wall to give the illusion that he has great aim.
The Authority Fallacy
The authority fallacy places supposition on the fact that because someone in a supposed position of power said it, it must be true. This doesn’t necessarily relate to those in positions of established authority, but those frequently perceived to have authority — like friends, family or respected figures who lack the expert field knowledge to back up their claims.


==============================================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
video

Netiquette IQ Technical Term Of The Day - Strong Cryptography



Posted by
Margaret Rouse
Strong cryptography is used by most governments around the world to protect communications. It involves secreted and encrypted communication that is not amenable to cryptographic analysis and decryption to ensure it cannot be accessed by unauthorized entities.
Strong cryptography is secreted and encrypted communication that is well-protected against cryptographic analysis and decryption to ensure it is readable only to intended parties.
Network Security Visibility
Ensuring comprehensive network security visibility is no easy task. Uncover expert tips on how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions, and anomaly-based monitoring technology.
Bottom of Form
Depending on the algorithms, protocols and implementation, a cryptographic system may be vulnerable to analysis, leading to possible cracking of the system. The ideal is an unbreakable system of which there is just one well known example: the one-time pad. The one-time pad is a system in which a randomly generated single-use private key is used to encrypt a message. The message is then decrypted by the receiver using a matching one-time pad and key. The challenge in this system is exchanging pads and keys without allowing them to be compromised.
Strong cryptography is used by most governments to protect communications. While it is increasingly available to the general public, there are still many countries where strong cryptography and encryption are kept from the general public, justified by the need to protect national security.
While the definition of strong cryptography in general may be broad, the The PCI Security Standards Council defines strong cryptography requirements for use in the payment card industry (PCI) specifically:  
“Cryptography based on industry-tested and accepted algorithms, along with strong key lengths (minimum 112-bits of effective key strength) and proper key-management practices. Cryptography is a method to protect data and includes both encryption (which is reversible) and hashing (which is not reversible, or “one way”). At the time of publication, examples of industry-tested and accepted standards and algorithms for minimum encryption strength include AES (128 bits and higher), TDES (minimum triple-length keys), RSA (2048 bits and higher), ECC (160 bits and higher), and ElGamal (2048 bits and higher).”
Demonstrating the strength of a given cryptographic system is a complex affair that requires in-depth consideration. As such, the demonstration is best achieved by a large number of collaborators. Planning tests, sharing and analyzing and reviewing of results are best conducted in a public forum.
This was first published in June 2015
Contributor(s): Matthew Haughn

==============================================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================
video