Category: Network Lifestyle And Activities

Dealing with Internet trolls

Article

How to kill a troll | Naked Security (Sophos)

My Comments

Anyone who has a personal Internet presence on a message board, social network or similar environment or operates such a presence for their company or other organisation can end up facing the worst side of the Internet.

This is typically in the form of the “Internet trolls” who exist on message boards, social networks, blog comment trails and online chat rooms just to cause trouble. This has manifested in online harassment which is mainly in the form of schoolyard-grade activity like foul names or targeted embarrassment attempts. But there have been acts like physical threats against person, animal and property; stalking, sustained harassment and sexual harassment with young women being the main victims.

It included a situation that I faced regarding a café I regularly visited where their Facebook presence was tarnished with foul comments because the business didn’t permit a protest group to put some flyers about their campaign by their cash register. Here, I was defending the café in their stance regarding what had happened.

But what can you do? You could block the accounts where the behaviour is coming and implement technological measures that do this for you. Here, such measures work on logic like blocking relatively young accounts that mention you, accounts with very few followers that mention you or accounts that generate replies containing certain keywords.

On the other hand, you could embarrass the source of the comments. This plays on various analogies associated with social taboos like in-workplace sexual harassment where a person isn’t just hauled up before law courts but the court of public opinion doesn’t look favourably on them. This would be hard to implement in the online world due to the ease in which one can create an anonymous online presence such as with the use of multiple disposable emails or pseudonyms.

Some countries like the UK have given their online-harassment laws more teeth such as legislating for longer prison terms. To the same extent, we should be encouraged to use all of the civil and criminal laws available to us as a tool to deal with Internet trolls, but a key problem is working with the problem from a cross-jurisdictional angle. This is where you identify that the activity is appearing from another state within the same country in the case of countries like Germany, Australia and USA, or another country; such as someone residing in the UK being harassed by someone using a computer located in New York State in the USA.

As well, there have been various PR activities to pillory the trolls such as Mary Beard’s activity after being victimised by schoolyard-grade online behaviour. She wasn’t afraid to speak her mind on British TV and had her friends and supporters work together to “fight back” against the troublemakers. Businesses and organisations who have been “got at” by trolls can use their loyal support base who have an active online presence such as their regular customers to work together for this same goal. 

Let’s not forget that the channels that exist to report trouble on a social network, bulletin board, chat forum or the like do exist for you to report this kind of trouble.

Personally, I would encourage any campaign to crack down on Internet trolling to be done as a group of many people. They can pool resources and use their contacts to work together to defend the people who are being affected or make life hard for the troublemakers. This can manifest in using technological tools to limit their effect on the affected forums, using civil and criminal legal action against the troublemakers or use online and offline public-relations efforts with a view to pillory them.

Sometimes some disturbing situations that happen with social networking, Internet forums, instant messaging and the like may require you to simply ignore or block trouble on the Internet but others may require you to work actively against it.

Send to Kindle

Using Skype for chat during your favourite PC games

Article – From the horse’s mouth

You can use a regular communications tool for in-game chat

You can use a regular communications tool for in-game chat

Skype

How to use Skype for desktop Gaming

My Comments

Some of us may want to use Skype or similar online communications tools to chat with fellow games players when we play games on our regular computers.

There are some reasons where the software for in-game chat functionality can be difficult to set up and manage and the conversations on most in-game text / voice-chat functions is like a simple party line where everyone and his dog can join in uninvited. This opens the door to Internet trolls and other miscreants who can upset your gaming sessions.

To my knowledge, Skype is the only program that can support group text and voice communication. On the other hand, other online-communications software like Viber, Lync and Pidgin offers varying levels of functionality to allow your gaming clan to chat together. Most will offer group-based text chat with some offering group-based voice chat. But what is common with Skype, Viber and their peers is that you chat with those participants whom you and your mates invite.

Skype with uncluttered Modern user interface

Skype – an important part of a gamer’s arsenal

For Skype, you would need to have the latest version of Skype running on your Windows, Macintosh or Linux computer. Then, set up and test your wired or Bluetooth headset to make sure it is working properly with Skype if you want to have voice calls. You do the similar procedure with Viber or other communications software. With your Bluetooth headset, you would need to use the “Hands Free Profile” function for the voice communications and if you are using a stereo Bluetooth headset or Bluetooth headphone audio adaptor like the Sony SBH-52, you may want to make sure that the sound device that your game uses for effects and music is the Bluetooth Headphones or A2DP device if you want others around you not to be hearing the game effects or repeated music loops.

Create a group-chat session by dragging the friends, teammates and others together. If you do want a group voice call, you can create this with Skype but avoid the temptation to create a video call because this takes up the bandwidth.

Then you minimise Skype or your other communications software and start your game. Make sure that other unnecessary programs aren’t running while you are playing so you can dedicate your computer’s resources to the gameplay and communications.  If you are running a multi-screen setup, you may find that you could run text-chats on one of the screens.

Using a regular Internet-communications service rather a game-hosted Internet service gives you that advantage to have better control over how the peer-to-peer games banter turns out so you can all get the most out of the game.

Send to Kindle

Doncare has launched a mobile-phone app to help people in domestic-violence situations

Article

Doncare launches LiveFree App to fight domestic violence | The Weekly Review

From the horse’s mouth

Doncare Community Services

Press Release (PDF)

Facebook Page

App Site (iTunes App Store)

My Comments

Doncare Community Services, along with Doncaster Rotary Club, have just launched an iPhone app that provides information about domestic and relationship violence. This provides the general information that women need to know about handling these situations along with knowledge of legal and similar resources they can avail themselves of.

A typical situation that concerns online domestic-violence resources is that these resources are typically furnished as Web pages which can yield a privacy risk for the victim of this violence due to the fact that Web browsers list what you have browsed. This is a key risk for  lot of these victims who live in a highly-controlled abusive relationship. Here, the perpetrator is often likely to check on recent Web-browsing activity that the person has done on the computer equipment used in their home as part of wanting to know what they think and do as well as whom they see. These people even have to do this browsing from their workplace’s computer, a friend’s computer or a publicly-accessible computer like one installed in a library or café.

The native mobile app has the advantage that they can download the app from the platform’s app store, use it and delete it quickly if they fear that the perpetrator is snooping around their phone. Then they re-download the app from the app store as and when they can.

One limitation about this app is that it is focused on resources and legal options that are available and relevant to Victoria, Australia. An improvement that I would have would be to download information about options available in other jurisdictions, something that can be provided during the setup phase or at a later point. This effort could be positioned as part of a localisation effort that would take place during the app’s lifecycle.

At least this is an example of what can be done by family-violence support organisations regarding using the smartphone and tablets that people own. This is where a free, easily-downloaded, easily-uninstalled app that has this critical information and access to critical resources can be used as a tool by people who are at risk.

Send to Kindle

Facebook launches a “Safety Check” program for use during emergencies

Facebook Safety Check iPhone notification screenshot courtesy Facebook

Facebook Safety Check notification on iPhone

Articles

SAFETY CHECK: Facebook Tool Simplifies Users’ Communication During Disasters, Crisis Situations | AllFacebook

Facebook’s new Safety Check lets you tell friends you’re safe when disaster strikes | NakedSecurity (Sophos)

From the horse’s mouth

Facebook

Introducing Safety Check (Press Release)

Feature Description

My Comments

Facebook has just released a system which works during natural disasters or other civil emergencies to allow people to be sure that those friends of theirs who are in the affected areas are OK. This system, known as Safety Check, was born out of a “notice board that Facebook built in to their system during the 2011 Japanese earthquake and tsunami. It would still complement other methods like phoning or texting those you know in the affected areas.

If an emergency happens, this would affect a known geographical area and Facebook would determine if you or your friends are in that area or not. Typically, this would be brought on by emergency services and the media advising Facebook of these situations. This would be based on the City data in your Profile or rough-gauging where you are interacting with it from. It would also use the Last Location details if you opt in to and implement the “Nearby Friends” app as another metric.

Facebook Safety Check dashboard screenshots (regular computer and mobile) courtesy Facebook

Facebook Safety Check dashboard- regular and mobile (handheld) views

Here, you will have a notification that will pop up if you are in the affected area and you mark this as “I’m Safe” if you are OK and safe, or mark as being “Out Of Area” if Facebook miscalculates your location and determines that you are in that area when you are are not in that area. The latter situation can happen for people who are in a large metropolitan area or conurbation and the disaster or crisis situation only affects a small part of that area.

This status will show up to your Friends as a Notification and in their News Feed to reassure them.This is augmented by a special “dashboard” page created for the emergency that shows a filtered list of your friends who are in the area affected by the crisis so you cab know who has “called in” to say they are OK,

This same setup also benefits those of us who are outside the affected areas and want to simply be sure that none of our friends have been affected by that crisis. Here, we receive the News Feeds and Notifications about our Friends who have “checked in” as being safe or out of the affected area and can also see this on that same “dashboard” page.

As for the privacy issue, these updates are only visible to those people who are currently your Facebook Friends when it comes to “coarse” coverage and to those of us who have reciprocally enabled the “Nearby Friends” functionality on Facebook for each other.

Although Facebook is the dominant consumer-facing social network and is able to achieve this goal, various other messaging and social-network services could learn form this setup to allow “at-a-glance” notification of our loved ones’ welfare during natural disasters and other crises.

Send to Kindle

The XBox One to be the first console to support home-developed games

Article Project Spark Editor screenshot press image courtesy of Microsoft

Microsoft’s Project Spark Finally Out Of Beta | Tom’s Hardware

From the horse’s mouth

Microsoft (XBox)

Press Release

Product Page

My Comments

Project Spark screenshot press image courtesy of MicrosoftOne item that Microsoft has had as its foundation stone was to allow people to develop their own computer software through the provision of the necessary tools to do this.

This started from Bill Gates writing a BASIC interpreter for the Altair microcomputer and effectively writing the BASIC interpreters for a few subsequent personal computers of the era like the Radio Shack TRS-80 and the IBM PC. In the 1990s, Microsoft had developed the Visual BASIC software to allow one cost-effectively develop software for the Windows platform that took off through that era.

Now Microsoft have fully released Project Spark which is a software-development kit to allow one to develop games for the XBox One games console along with regular computers running Windows 8.1 . People who have tinkered with the earlier beta versions of this software have used it to create extra game levels for their favourite games.

It may appear that you would have to work within boundaries when building a game or level but I would see this as a way for Microsoft to work on a games-development platform for both regular computers and the XBox One games consoles. This may also lead to a marketplace for “lean-back” console games which are developed by individuals and independent studios and, hopefully open up the console-gaming world.

Send to Kindle

Web-page advertising needs to adopt a secure-ads strategy

Article

Beware of Risky Ads on Tumblr | MalwareBytes Unpacked

My Comments

Online ad - to be respected like advertising in printed media

Ads on sites like here need to be secure to obtain the same respect as magazine ads

Most of us who use the Web are making increased use of ad-sponsored Web sites for news, blogs, social media and the like.

In most cases, the banner advertising that appears on these Websites or on advertising-funded mobile-platform apps and is delivered in a tasteful manner provide a similar experience to the display advertising we see, accept and take for granted in newspapers, magazines and other printed media. That is where pop-up or pop-under advertising isn’t used or you don’t hear noisy video commercials playing through. It could be enough to see an animated or slide-show ad appear within the confines of the banner. Here, the advertising doesn’t interrupt the reading experience unlike with TV advertising or online-video advertising where it interrupts the viewing experience.

Such advertising, like the Google AdSense ads you see on this site, is sold on a contract that is based on cost-per-click which the advertiser pays when you click on the ad to follow through with it, or cost-per-impression which is based on simply on the ad being loaded and appearing on the site.

The malvertisement threat

But there is a security problem cropping up here in the form of “malvertisements”. These are online advertisements that are delivered to lead users to Websites that host malware. Typically they use enticing copy and graphics in the advertisements to attract users to view content on these sites and download software of questionable provenance.

Security vendors run a rhetoric that encourages us Web users to use ad-blocking software to keep our computer secure by masking all online advertising. But this can get in the way of honest advertisers and the publications that depend on them for revenue because the software works on an “all or nothing” approach.

But what can the online advertising industry do about this?

If a Website author has control over all of the advertising they admit, they can easily “fence out” malvertisements and distasteful advertising by examining what their potential advertiser is tendering at the start of and through the life of their advertising contract.

But this is not the case for most Websites where they will rely on one or more ad networks like Google AdSense to supply all or the remainder of their ad inventory. These ad networks typically source the advertising themselves and pay publishers a cut for each advertisement that appears or when someone clicks on an advertisement.

Ad networks

Malware sites advertise through these networks on a “pay-per-click-only” contract because it is a “low-risk high-return” option. But the networks could make life harder for them by, for example, vetting the creatives (advertising text, graphics, scripts and links) offered for an ad campaign before accepting them for display and through the life of the campaign. Similarly, they could make it harder to establish or sustain advertising contracts for “fly-by-night” operations like distributing malware such as implementing the ability to break-off ad contracts if the advertiser engages in deceptive conduct or not offering “very-low-risk” advertising options such as “pay-per-click-only” text ads. One way would be to require all ad contracts to be based on the requirement to pay for a particular time length or minimum number of impressions.

Ad networks can also exchange details about advertisers that engage in deceptive business practices so that the advertisers don’t go “shopping around” different ad networks to hawk their wares at the lowest risk. This is similar to a lot of proper business practices where companies are able to exchange details about known credit risks for example.

This could be part of an online advertising code of conduct to protect the validity and legitimacy of the online display advertisement as part of an advertiser’s campaign mix and as a way for Web publishers to raise some income.

Webmasters

Webmasters can work with the ad network’s control panel to reduce the kind of advertising that gets through to their ad spaces. For example, they could opt to keep the advertising that appears to tightly reflect the content and tone of their Website. The Webmaster can also exercise a tight level of control over any advertising they directly sell for their Website such as offering contracts with a minimum level of risk to the advertiser or vetting the creative material tendered by the advertisers.

As well, they can take out security measures over the Website to stop undesireable activity from occurring with their Website. This could include implementing hardened login procedures such as brute-force lockout or two-factor authentication on the critical admin and editor accounts.

Conclusion

Like most online-security issues like Wi-Fi security, it isn’t just up to end-users to do the “heavy-lifting” to keep their Web experience secure. Other stakeholders like advertising networks need to join in the game to keep a secure Web with respected online advertising and avoid exposure to liability.

Send to Kindle

Lightweight and gaming agree for a new Alienware gaming laptop

Article

The New Alienware 13-inch Laptop Promises Pro Gaming Without Backache | Gizmodo

My Comments

Quite a few examples of laptops with enough “grunt” to satisfy tasks intended for desktop computers are appearing. These are typically showing up either as “mobile workstations” for serious activity like CAD work or as “gaming laptops” for core game-playing activity. This is also happening in a similar vein with “all-in-one” desktops like the HP Z1 Workstation.

The integrated screens that these computers have appeal to users who want to quickly set up a multi-display arrangement using an external monitor, flat-screen TV or a projector. This plays well with those of us who may want to move between different setups like a desktop setup with an external desktop monitor, a presentation setup with the projector or a quick-to-setup gaming environment in a common lounge area using the flat-screen TV located there.

Some of us may think of a games-focused high-performance computer as being fit for a “starter” workstation for tasks like multimedia creation or may consider a low-tier workstation as being fit for core-level game-play because both these activities demand the use of high-performance computers. The main issue there may be factors like the way the system is physically designed or the choice of graphics chipset which may be optimised to either professional graphics or fast-paced games.

In the gaming sphere, Dell’s Alienware brand is having to face Razer when courting mobile gamers and they have fielded a 13” gaming laptop which is considered lightweight as far as the product class is concerned. Most gamers may consider this a waste because of the small screen but I would see this work well for gamers who would use it for, for example, a dual-screen “regular-computer” gaming scenario in a lounge area like the living room at home or a common room in the college dorm using its screen and the ordinary flat-screen TV in the lounge area.

Like most computers under the Dell umbrella, this will be offered in a highly-customisable form that allows one to effectively tailor it to their needs. It is another example where Dell is attempting to push the boundaries of normal product-class-specific computer design to effectively “fill the holes” left in the marketplace by other computer manufacturers.

Send to Kindle

Mashable shares an ultra-smooth jazz playlist for Louis Armstrong’s birthday

Article

45 Jazz Numbers for Smooth Listening | Mashable

My Comments

Can you play Spotify on that good hi-fi? Check! Any gaping holes in your jazz music collection? Check!

Mashable have worked out a 45-track Spotify playlist that celebrates what would be Louis Armstrong’s birthday, but can be a way to familiarize yourself with the jazz genre and determine how you should build out your jazz music collection. Some of you may find that this may play well for a bit of casual jazz listening like during a dinner party or to get yourselves in the mood before visiting that local “jazz dive”.

This playlist encompasses key jazz performers like Louis Armstrong, Duke Ellington, Fats Walker, Miles Davis and Ella Fitzgerald with recordings made over the years that the genre had evolved. At least it is worth a listen.

Your Technology Serves Your Lifestyle Here!

Send to Kindle

Swatch to bridge the Swiss watchmaking craft to the new connected wearable technology

Articles (German Language / Deutsche Sprache)

Swatch bringt seine eigene Smartwatch | PCTipp.ch

Swatch arbeitet an Fitnessuhr | Netzwoche.ch

My Comments

The Swiss aren’t far behind on the smart-watch bandwagon but are taking it a different path so as to preserve their craft and identity.

Swatch is developing a fitness-focused smartwatch that is totally different from the rest of the crowd. Here, this is more a watch that tells the time but is equipped with fitness sensors to measure how healthy you are. They are drawing on EM Microtechnology who is part of the Swatch Group and this company also have worked on GPS technology for a variety of fitness-driven applications.

But Swatch and Tissot, both part of the Swatch Group, are focusing on simpler fitness-focused smartwatch designs rather than the current equivalent of the 80s-era digital multifunction watch. They are approaching watch design on a “horses for courses” basis where different watches suit different people and different occasions. I see this as being highly important because, for example, a woman may want a watch that looks the part on her slender wrist or a man may want to have a dress watch for going out to impress along with a fitness watch for long walks and a utility smartwatch for day-to-day use.

Apple have been “picking Swatch’s brains” about their watch-construction methods but Swatch deny the idea of forming a partnership with them, especially concerning the iWatch idea that has been floating around. As well Swatch are trying to achieve the “best smartwatch” goal rather than being the first.

What I see of this is that the Swatch group are being the first of the Swiss watch legends to link their special craft with today’s smart-wearable technology development.

Send to Kindle

Be sure about that property sale being conducted over the Internet is kosher

Article

Scammers sell Canberra house without owner’s knowledge | ABC News (Australia)

My Comments

House

Is the sale of the house meant to be?

Recently, a news item was run by the ABC News concerning scams involving the sale of houses and other real-estate property via the Internet without the owner’s knowledge. This was affecting people who own a property in another country such as a “expat” who is maintaining their former home as a rental property. I also reckon that this can also happen with other high-value high-risk transactions such as the sale of financial instruments, vehicles or collectable rarities.

What was highlighted with the scam was there was no face-to-face contact between the parties. Typically the trasaction was based around email messages, instant-messaging posts or other similar technologies, especially where the contact addresses were always changing. This could highlight the use of disposable email accounts to facilitate the transaction and avoid repudiation.

If you can’t meet the other party face-to-face because you and them are separated by distance, it would be a good idea to make voice contact, whether through the classic telephone setup or through Skype or a similar VoIP setup. I would even go as far as conducting a videocall using Skype, Viber Desktop or a similar technology as a way of confirming the identity and veracity of the other party.

As well, it is essential that you have the documents and signatures concerning the transaction verified. For an international transaction, you could engage the services of your country’s diplomatic presence in the remote country. You may also have to engage an official translator if you are dealing with documents written in a foreign language.

One thing to remember is that if there is undue urgency to complete the transaction or you find that the transaction is on terms that is out of place for one of that kind, including prices that are ridiculously high or low for the property or properties of a similar type, location or condition, you could be falling foul of a scam. As well, seek counsel from experts relating to the kind of transaction that is taking place like real-estate agents, valuers or banks.

Send to Kindle