Thursday, February 15, 2018

Netiquette IQ Blog Of 2/15/18 - Proper Use Of The cc: Field and World Hippo Day





World Hippo Day, Hurray.

 Donate here: 
http://go.saveanimalsfacingextinction.org/page/s/save-hippos?source=MS_EM_PET_2017.12.26_B2_Hippos_X__F1_S1_C1__all_RS&email=paulb@verizon.net&firstname=Paul&lastname=Babicki&zip=08560

 
 =====================


The Cc:  field

         All of the Netiquette outlined in the previous section applies to the Cc: field.  Care must be given for insuring that protection of privacy is absolutely provided for in this field which is visible to all recipients.  Those who are included here, as a rule, should be parties who have a direct interest in the subject.  These people should not be addressed in the salutation or body of text as their roles are passive and are not expected to reply or take action unless explicitly asked to do so.  If multiple responses are initiated more addressees should not be added unless it is clear that the previous information is appropriate to those added.  If this is not the case, the thread should be removed.  Those who are included in the Cc: field generally should not be active in responding to the message without good reasons.

         Many add bosses, supervisors or persons of higher rank in a Cc:  Most of the time, this is for good reason.  However, to include such persons to override an option, seek to impress or have motives outside the issue at hand, should  be seriously considered because of the risk of changing the tone, range or spirit of the communication.

         Conversely, there are circumstances in email threads for dropping someone from a To:, Cc: or Bcc: field. Since threads can last for a number of messages, what began as a courtesy for some might become a nuisance to those receiving them.   If there is diminishing or no further real significance for their involvement, Netiquette considerations should be given to determine if addressees should be dropped.  Also, beginning a new mail thread might be the most useful way to disengage from longer threads. 

         Besides maintaining appropriate form, content and consideration, good “Netiquette” goes beyond these disciplines.  Do not Cc: groups if your email is to your supervisor(s) or persons of authority.  This can be interpreted in a very negative way and can prove to be a significant embarrassment.
++++++++++++++++++++++++++++++++
   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.

Wednesday, February 14, 2018

IQ Blog Of 2/14/2018 - Buffer Overflow






        

Buffer Overflow from whatis.com
Buffer overflow is an attack vector that can be exploited by sending more data to a fixed length block of memory (buffer) than the fixed length block of memory is allocated to hold. When there is excess data, it gets written to an adjacent buffer and will overwrite whatever data is being held there. Buffers are vulnerable to attack when applications fail to validate input from the client or other processes and flag or discard data when too much is sent to a memory buffer.
Buffer overflow always ranks high in the Common Weakness Enumeration/SANS Top 25 Most Dangerous Software Errors and is specified as CWE-120 under the Common Weakness Enumeration dictionary of weakness types. Despite being well understood, buffer overflows continue to plague software from vendors both large and small. Vendors issue patches and updates for their software to fix buffer overflow vulnerabilities that have been discovered, but there is still a period of risk between the vulnerability being discovered and the patch being created and deployed.
 
Techniques to exploit buffer overflow vulnerabilities vary based on the operating system and programming language, but the goal is always to manipulate a computer's memory to subvert or control program execution. Buffer overflows are categorized according to the location of the buffer in the process memory, the two main types being stack-based overflow and heap-based overflow.
   ======================

   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.

Tuesday, February 13, 2018

Netiquette IQ Blog Of 2/13/18 - Browser Extension



Browser Extension
A browser extension is a small software application that adds a capacity or functionality to a web browser. A browser extension, also called a plug-in, can take advantage of the same application program interfaces (APIs) that JavaScript can on a web page, but the extension can do more because it also has access to its own set of APIs.
While extensions are typically used to add features and enhance the functionality of a website, they can also be used to remove unwanted website elements such as pop-up ads and features such as auto-play for online videos.
Here are a few examples of browser extensions:
  • AdBlock - enables content filtering and ad blocking.
  • HTTPS Everywhere - provides another layer of security by making websites that support the extension automatically connect through HTTPS.
  • StayFocusd - limits the amount of time the user is allowed to spend on designated websites.
  • Highly - allows the user to highlight webpage text and share it through social media, email, Slack or iMessage.
Browser extensions are usually written in HTML, CSS or JavaScript. Like other types of software, browser extensions can be coded for undesirable behaviors and be misused to deliver malware. Though most add-ons are reviewed prior to being listed, malicious extensions that violate browser developer program policies are not uncommon.
For example, in January 2018, it a security company called ICEBERG reported that four malicious extensions available from the Chrome Web Store were designed to conduct click fraud and black hat SEO. In 2017, Proofpoint reported that eight compromised Chrome extensions had sent malicious code to almost four and a half million users.

When deciding whether or not to install an extension, always keep in mind the type of resources the extension can access and where it will send the data it collects. Treat with extreme caution any extensions that do any of the following:
  • Interact with local files
  • Interact with the Windows Registry
  • Interact with cookies
  • Access any browser tab or window
  • Execute commands in the user's shell
======================
   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.

Monday, February 12, 2018

Netiquette IQ Security Bulletin - SB18-043: Vulnerability Summary for the Week of February 5, 2018




National Cyber Awareness System:

02/12/2018 12:46 AM EST

Original release date: February 12, 2018
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerabilities.
======================
   Good Netiquette And A Green Internet To All!  =====================================================================
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:


Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County.