This afternoon I followed a webcast about the protection of your brand in the web 2.0 jungle. A fact is that the reputation of a brand built during years can be destroyed in only a few minutes! Think about that! Just to remind you, the “web 2.0” is the huge
Category: Websites
Gmail Outage Tonight
Unusual but tonight, Gmail was unavailable as reported by the Google Apps Status Dashboard. Besides the fact that more and more people rely on the number-one webmail interface to handle their e-mails, this problem has impacted other Internet social services like Twitter! When the problem was detected by users, they
Easy Geolocalization of IP Addresses
If there was only one annoying operation for me, it will be to search contact information about IP addresses! Often, network administrators and security guys have to found out to who is assigned a given IP address (example: when analysis logs or doing forensics searches). Useful information linked to IP
This Message Will Self-destroy in 30″!
“Cloud computing”! This is a hot topic in IT security for a while. I won’t explain why security is so importing within the cloud. To have a good overview, I recommend to follow Craig Balding’s blog. For sure, you already have personal data stored on the web. You use webmail
Virtual Money with Real Risks?
The financial group ING announced a partnership with NetLog, the Belgian social network website. On a marketing point of view, this is a good action to attract young potential customers. ING (one of the top-3 bank in Belgium) will catch them on Netlog hoping that, later, they will switch to
Facebook Cybersquatting Soon?
Will Facebook once again make a buzz? Saturday, June 13th starting at 06:01am, Facebook users will be able to choose a username to customize their profile URL. Something like http://www.facebook.com/username/. After DNS cybersquatting, will we see a new effect of Facebook cybersquatting? There is already a FAQ available about this
Follow Several Security Threat Levels via Twitter
Twitter, the micro blogging platform, attracts a larger audience days after days. According to recent studies, lot of accounts stay un-updated for long periods of time. On the other side, there are more and more huge communities of active users who tweet on specific topics: The IT security is represented
DNS, Your Achilles’ Heel?
A few days ago, the site google.co.ma, the Moroccan version of the well-known search engine was reported as defaced (screenshot here). Only the URL ‘google.co.ma’ was defaced, the long version ‘www.google.co.ma’ was still working properly. What happened? In fact, Google was clearly not the target in this case but the
Google As Torrent Search Engine
A few days ago, four members of the Pirate Bay were found guilty by the Swedish court of justice. One of their lines of defense was based on the fact that they did not host files under copyrights but they just provided an index of them. Hmmm… Index? Does it
Where is Linux?
Today I participated in a survey organized by a major Belgian bank. The goal was to improve their web services (which is always a nice initiative). At the middle of the survey, came the following question: Of course, I answered “I don’t know“. How can they restrict the choice to