About Us

Latest tech world updates and news form all around the world at Mexicom.org


Computer Dialogue: Laugh Lines and Other Wrinkles I Have Known


Support nearby journalism by upgrading to NewsOK Pro. I attempt to stay on top of factors in the computer global. However, I’m just now not slicing it. Even so, I’m not as clueless as a female who made a medical doctor’s appointment because she changed into afraid she turned into coming down along with her laptop’s virus. To his credit, the physician didn’t miss a beat. He prescribed masses of liquids, hand washing, and a face mask.

Hackers seem to be filtering into home computers on each degree, which honestly scares me because I’m now not positive how to shield myself or my pc. I envision little cutback marks in my pc display or its cords being spliced. However, I never point out this worry around my printer because she’s compassionate. Some days she’s so weak I can slightly read her print. It’s so small. She has to shut down regularly for a day or two to meditate, bond with the printer ink, or anything. I’ve threatened to unplug her, but I don’t recognize what the laptop would do without her.

It took me months to discern the word for the little round smiley-faced moons I stored seeing on my email messages. I concept emojis had been both an endangered species or some incurable fungus. I’ve never virtually gotten into the Facebook scene both. For one element, I don’t have any concept of why Facebook continues suggesting I make buddies with these kinds of people I’ve by no means visible before. If you ever ‘’confirm’’ certainly one of them, they’re relentless, for all time putting photographs up in their circle of relatives gatherings, meals recipes, and sunset photos over their patio wall.

Even my buddies wear a touch skinny when they update their pix twice every week and assume rave feedback at the comment line. Granted, it’s a laugh to see a kitten driving on the return of a turtle, eight puppies leaping rope collectively, or a Doberman juggling a Dachshund. Still, it’s a bit depressing when my dog’s only trick is to butt her harness, striking on the door whilst she desires to go out. I’ve never understood the laugh in Tweeting both. It could be because my friends have so little to mention. They use it to communicate each time they change toothpaste manufacturers, retake an overdue ebook, exchange the water in the dog’s dish, forget about to shave their leg or pass the sprinkler to the lower backyard.


As most are likely aware, company and home networks are usually linked to the Internet 24 x 7, exposing them to the great array of malevolent software programs circulating on the Internet. Because of this, businesses layout and continuously enhance community/IT Security architectures that use a layered technique to offer security for their networks and computing environments. To paraphrase (OK… Plagiarize) the immortal communication among Shrek and Donkey:

Shrek: For your records, there may be plenty extra to IT SECURITY than people suppose.

Donkey: Example?

Shrek: Example? Okay, er… IT SECURITY… Is… Like an onion.

Donkey: It stinks?

Shrek: Yes… NO!

Donkey: Or it makes you cry.

Shrek: NO! LAYERS! Onions have layers. IT Security has layers. Onions have layers… Do you get it? Both have layers!

Donkey: Oh, both have layers… You recognize, now not all and sundry likes onions… CAKES!

Everybody loves cakes! Cakes have layers!

So, take your pick out. Whether you pick out the onion or cake analogy, a nicely designed IT Security structure consists of a couple of layers to frustrate and save you, might-be hackers, from stepping into the community to wreak havoc and compromise confidential information. To mitigate potential dangers to the fitness of company networks and IT environments, maximum agencies use several protection layers to assist guard towards regarded and unknown viruses and denial of provider attacks.

Some of those layers encompass:

• Firewalls to restrict get admission to/from the Internet

• Intrusion Detection/Prevention device to shield towards and distribute indicators of ability assaults against the network

• Vulnerability scanning of critical servers for known vulnerabilities

• File attachment blockading – specific attachment sorts are blocked from being added to give up customers – primarily based on quality practices determined by anti-virus companies.

• Bi-directional scanning of Email for known viruses

• Scanning of workstations and document servers for known viruses – each real-time as files are being opened or saved, and periodically with the aid of doing a complete disk test

• Scanning of internet sites for potential malware and, if detected, denied getting entry to

• Periodic penetration testing to ensure perimeter measures are powerful

• Blackhole DNS – recognized “terrible” websites cannot be accessed

There is constantly a window of possibility that exists between the time an inaccurate techie releases their introduction into the wild and the time it takes for the Anti-virus carriers to become aware of it and release new pattern files to their subscribers. That is why a majority of agencies block precise varieties of documents from being robotically introduced to recipients.

Contrary to what a few folks trust, maximum IT departments do not prevent customers from getting their jobs carried out! They try to take appropriate steps to reduce the threat to their whole community and, consequently, all the users via utilizing the distinct layers of the safety onion.

Each user is the “heart of the onion.” Regardless of the stairs taken to defend the corporate IT infrastructure, IT departments, in the end, depend upon a knowledgeable and educated user population to be privy to the risks presented using unsolicited Emails, record attachments, embedded links, and web websites they access. Without a knowledgeable/educated end-person population, agencies’ and individual users’ private/private records are at hazard. Does your agency have a protection cognizance marketing campaign to inform and educate the heart of your safety onion? It should! After all, is stated and performed, stop users provide the very last layer of safety.

Geneva A. Crawford
Twitter nerd. Coffee junkie. Prone to fits of apathy. Professional beer geek. Spent several years buying and selling magma in Miami, FL. Spent a year lecturing about psoriasis in Las Vegas, NV. Managed a small team writing about circus clowns in Las Vegas, NV. Garnered an industry award while writing about lint in the financial sector. Spoke at an international conference about getting my feet wet with dust in Libya. Spoke at an international conference about researching rocking horses in Bethesda, MD.