Web Directories

Carol R. Venuti

Carol R. Venuti

Over the past few years, there have been a lot of changes affecting the key technologies that power the internet.

HTML is the dominant web language and its new version, HTML5 provides impressive web enhancements for new web applications.

However, when this fifth version of HTML was released way back 2014, it became really popular to web and app developers, the issues surrounding its internet security risks also take hold.

Just like every new technology, HTML5 is bound to have defects and pitfalls. Internet security experts and commenters had also predicted this, long before its release.


HTML5 is the 5th revision of the HTML standard developed by W3C. While it was approved as a standard in October 2014, its adoption began several years earlier.

This language mainly describes the contents and appearance of web pages. Due to its many new features, it makes web pages more interactive and dynamic.

Among these features include messaging enhancements, new parsing rules to enhance flexibility, elimination of redundant attributes and native multimedia support.

W3C developed HTML5 mainly to address the compatibility issues with the previous HTML version.

The main reasons why this version has become so popular is the essential elimination of browser plugins, reduction of web development time and mobile friendliness.

HTML5 is also supported by all the authority browser vendors including Google, Apple, Opera, Microsoft, and Firefox.



As HTML5 approved as a standard in 2014 becomes more popular among developers, it introduces new internet security threat due to the new features and attribute.

As HTML5 becomes adopted on a very large scale with a large percentage of browsers. Mobile applications are now based on this language.

It is also important for developers and users to know about the internet security risks involved in order to be able to tackle them.

The security problems that affected the older version are still present.

More importantly, the new features in HTML5 present further internet security issues.

Below are some of the attacks made possible by HTML5.


Cross-Origin Resource Sharing (CORS) is a feature that allows a resource to gain access to data from domains outside itself.

Using this feature, web pages can load resources including scripts, CSS style sheets, and images from different domains.

As such, a remote cyber attacker can inject codes on the web pages.

An API called XMLHttpRequest makes this possible. Basically, this is an API that facilitates the transfer of data between a server and a client.

Before the introduction of HTML5, a site could not make direct requests to another site using this API.

Now, HTTP requests can be made, provided the requested sites grants permission.

This is the point where vulnerability that can be exploited. Access can be granted through the following header in the responses; Access-Control-Allow-Origin.

If a website has wrongly defined this header or based on a wrong assumption, access control can easily be bypassed.

A similar threat called Cross-Site-Request-Forgery (CSRF) was present in HTML4. However, with HTML5 this is possible without user interaction.



The new attributes and tags introduced by HTML5 present in an internet security threats to cross-site scripting attacks. XSS attacks where attackers run malicious scripts through unencoded or unvalidated user inputs have been around for a while.

Developers often avoid them by filtering user inputs. This is basically not allowing users to input certain character sequences.

Some of the new attributes and tags in HTML5 can be employed to run scripts by bypassing input filters. With HTML5, any object can associate itself with any form regardless of its position on the web page.

This can be exploited for malicious purposes. Attackers can also modify web page forms using attributes in HTML5 such as formaction, fromenctype, formmetod, form target and formnonvalidate.


Prior to HTML5, browser data was stored through web cookies. The local storage feature in HTML5 was developed to improve internet security and enable storage of more web data.

It allows browsers to store and delete data based on name-value pairs. The good news is that the origin-specific, meaning sites from different origins cannot access applications on local databases.


Unfortunately, it is vulnerable to the aforementioned XSS attacks.

XSS flaws resulting from developer errors, this can allow the execution of JavaScript codes leading them to the access of local variables.

Attackers can also redirect target site requests to different sites using DNS cache poisoning.

There are other internet security issues with HTML5 including Cross Document Messaging, Offline Web Applications, and the middleware framework.

Most of these internet security problems fall into the hands of the web developers.

As such, they can be mitigated by safe coding practices, regular code testing, education on the possible internet security threats, data sanitization and access restriction for untrusted code.

Source:  darkwebnews.com

Can you feel the tension among your family and friends and the country at large? With the touchline in sight and fingernails chewed raw, there could be more twists and turns before the end of polling day. So if you want to keep up to date with the very latest US election news, here’s how Google, Twitter, Facebook can help you do that.

US Election News

How to track US election news

Whoever wins, whether that be Donald Trump or Hillary Clinton, modern technology will make sure you never miss a word. So if you’re an avid social media user and have an iPhone or another kind of smartphone, you can keep updated. Here’s what each information provider is doing to keep you with them.

facebook us election news

Facebook being patriotic

According to Facebook during this divisive campaign, it has encouraged more than 2 million people to vote. This was accomplished via the social network’s Get Ready for Election Day page, which Mark Zuckerberg is apparently very proud of. In fact, not only does the page help people register to vote and keep them updated with US election news, it also provides a vote planner made specifically for each user, meaning that person can print it off and take it to the polling station when they vote.

twitter us election news

Twitter #Election2016

Twitter’s open nature allows you to see tweets from all over the USA, which is great, and the same goes for keeping up to date with US election news. If you don’t already know, the official #hashtags are #Ele4ctionDay and #Election2016; both have their own polling emoji.

However, Twitter has done its own thing this time around and encouraged people to vote. A lot of the work done by Twitter can be seen at the account @gov. While this on its own does not keep you directly updated with what’s going on in the US elections, you can send a tweet to the account asking about US election news.

google us election news

Google results

Google has taken the unprecedented step of embedding US election news into its search results. This means that whether you want the information or not, it will be there, in more than 30 languages. According to Google, it has seen a rise of more than 233% in use of the phrase “how to vote” typed into the search engine. This is what prompted it to take a more direct informative approach. The numbers seen for the 2016 election have been far higher than it recorded in the 2012 victory by Barack Obama.

Additional help given for those looking for US election news can be found at Google’s voter registration page and the Google Trends Election Hub.

And there you have three ways you can keep up with US election news now and on the day of. We advise you to go and take a look at each service and decide which one best suits your needs. As with everything in life, each has their pros and cons, but ultimately they are there to be helpful and non-partisan.

Source: valuewalk.com

Tuesday, 25 October 2016 14:56

7 Top Tools For Content Creators

Content creation is one of the most vital aspects of digital marketing – posting content that will inform, interest and amuse your online audience so that you’re one of the first places they turn to when they go online. This means creating content of a consistently good quality on a continual basis. That's a pretty tall order, even for the most imaginative of digital marketers. The biggest challenge faced by B2B content marketers is producing enough content, closely followed by producing the type of content that engages the target audience.

I listed 25 content creation ideas that business bloggers can use when they run out of ideas for attention-grabbing new content. But besides ideas you need more to create content better.

Most professionals use a toolkit of some type or another and that’s just as true for content creators. Today we’re looking at some of the most useful content creation tools that you could add to your content creation toolkit, including some tools that will help you to post some great visual content – we all know that images, GIFs and videos pack a powerful punch when it comes to getting the marketing message across.

The Content Tools

1. ContentIdeator


Great content begins with a great headline and if you head over to ContentIdeator they have a nifty little tool you can use which not only generates great headlines, but these headlines actually provide you with ideas on what to actually write the content about. It couldn’t be simpler – you just type in a keyword, hit the Enter button and you’re immediately presented with a varied list of titles, some of which may cover aspects of the subject that you wouldn’t have dreamed of writing about!

Freemium: free titles, $29/month if you want to see the stats.

2. Evernote


Has a free version that will sync across your devices (2 max, in the free plan), mobile and desktop, to help you organise yourself when writing. Whether you’re using it for to-do lists, to keep your research notes or even to write whole chunks of articles, Evernote keep all your data constantly up to date and available to you.

Freemium: upgrade plans give larger uploads, larger note attachments.

3. Grammarly and Correctica


are both free tools that you can used to check for grammatical errors in your content. There is so much badly written content online nowadays and many customers are reluctant to buy from an online retailer whose content and descriptions are poorly written – after all, if they can’t be bothered to check their content for errors, how reliable are their products or services going to be?


4. Copyscape


A plagiarism checker web app that’s surprisingly cheap to use – each search costs just $0.05 and credits can be purchased by credit card of PayPal. Not only does Copyscape check that your content is original, you can also use it to see if your content is being ‘lifted’ and used elsewhere.

You can use the Copyscape comparison tool to check what percentage of your content appears elsewhere online and use it to make an informed decision on whether or not to publish. This is a particularly handy feature for those who write content with plenty of jargon or technical terms or content featuring quotes and interviews.

Copyscape is essential if you outsource your content creation activities or feature guest blog posts.

5. Hemingway App


An editing tool that can be used to assess your writing and find ways of making it simpler and more succinct. Just paste your content into this free to use web app and it will let you know how readable it is and deliver suggestions that can be used to improve the content.

Freemium: web app is free, desktop app is paid.

6. Giphy Chrome


A Chrome extension that will help you find the perfect animated GIFs for social media posts. Once you’ve added it to your Chrome browser, you just open it, choose a GIF and then drag and drop it. The tool works in Gmail, Twitter, Facebook and other social media platforms and it’s a great way to quickly add some visuals that will pep up your posts.

7. BuzzSumo Extension


All the power of BuzzSumo but portable; browse the web, hit the button, and you get to see that page's stats right away. Excellent way to research content opportunities.

...and more

The tools I’ve listed are just some of the many resources available to content creators. There are many others!

Hubspot provides a library of free and royalty-free stock photos. PlaceIt can be used to create images or your product in a real world environment. You can use Infogram to create infographics, charts and data visualisation or you can use Canva to create fabulous visual content quickly and easily with pre-made templates to which you add your own images.

The main thing to remember is that these are all tools that you can use to create high quality, readable and informative content that’s relevant to your target audience – however, it’s still up to you to find a way of combining and using these tools to make your job simpler and more enjoyable.

Source : searchenginepeople.com

Internet marketing can make or break your business.

From email campaigns to social media content, online marketing is both competitive and technical. While the Internet increases the possibility of reaching a global audience, it can be a difficult path to navigate.

"Online marketing is crucial to success," according to Jared Hecht of the Huffington Post. "Social media marketing and a strong, user-friendly web presence help your company reach a wide audience for your products. But many small business owners lack the experience or time to run effective marketing campaigns online."

So, how can your business get ahead of the curve and capture your online audience's attention?

Optimize your website

Internet search giant, Google, continually changes its algorithm for search engine optimization, meaning the traffic to your site might be reduced if your business doesn't keep up with the changes. One way to make Google's SEO algorithm work for your business is to invest in a mobile-friendly web site with responsive design. Doing so will bump your site to the top of the search results for all users, according to Entrepreneur.

GoDaddy and Alignable recently surveyed more than 100,000 small business owners to learn about barriers that separate businesses from growth. The survey revealed 51 percent of small business owners hire a web designer to build their website. You don't have to spend a lot of money to get a great website, however. If you want to get a mobile-friendly site up and running without much investment, join the additional 25 percent of survey respondents who use a website builder, such as Wordpress or Wix.com, and do it yourself.

Become a social media master

It's no secret having a strong social media presence is essential for your business.

In fact, according to AdWeek, 74 percent of consumers rely on social media to influence their purchasing decisions, and 81 percent of consumers are influenced by their friends' posts when making purchasing decisions. Additionally, 78 percent of consumers who receive a quick brand response on social media are likely to recommend that brand.

Websites such as HubSpot and Lynda.com offer courses and training opportunities aimed at helping business owners learn the ins and outs of social media in order to create effective online marketing campaigns. Additionally, Facebook offers Facebook Business, an online training program designed to help you make the most of the platform's tools. Once you've learned the basics, try a site such as HootSuite, which allows you to manage multiple social networks simultaneously.

Embrace email and blogging

Consumers prefer to communicate with businesses through email, according to GoDaddy. And, they want trust in that communication. If your business email address doesn't reflect your company's name, consider upgrading to a business-level account.

In an article for Entrepreneur, Firas Kittaneh found that email marketing drives 20 times more return on investment than banner ads, and has a higher conversation rate than Facebook and Twitter. Luckily, email marketing doesn't have to be difficult. With services such as List Builder and MailChimp, you easily can take your email efforts to the next level.

Blogging is another popular way to reach potential customers or clients. Hubspot reports B2B marketers who use blogs receive 67 percent more leads, and marketers who prioritize blogging are 13 times more likely to see positive return on investment. The good news is creating and maintaining a blog is easier than ever before. Websites such as Wordpress and BlogSpot make it simple to create and schedule blog posts that will draw traffic to your website.

As technology continues to adapt and grow, it's essential to engage your online audience before they move on to your competitors. From learning more about popular social media platforms to creating a website with responsive design, there are several steps your business can take to overcome online obstacles that might be holding you back.

Source: postbulletin.com

There is an inverse relationship between public access to the Internet and the inability of governments and institutions to control information flow and hence state allegiance, ideology, public opinion, and policy formulation.

Increase in public access to the Internet results in an equivalent decrease in government and institutional power. Indeed, after September 11, 2001, Internet traffic statistics show that many millions of Americans have connected to alternative news sources outside the continental United States. The information they consume can be and often is contrary to US government statements and US mainstream media reporting. 

Information is a strategic resource vital to national security. US Government efforts to understand and engage key audiences to create, strengthen, or preserve conditions favorable for the advancement of USG interests, policies, and objectives through coordinated programs, plans, themes, messages, and products synchronized with the actions of all elements of national power: Diplomacy, Intelligence, Military, Economic, Finance, Law Enforcement, Information… The DOD must also support and participate in USG Strategic C communications activities to understand, inform, and influence relevant foreign audiences, including the DOD’s transition to and from hostilities, security, military forward presence, and stability operations. US Army Unconventional Warfare Manual, 2008

In the early 1990s scores of studies were conducted by the US government, think tanks, consulting firms, defense contractors, futurists and military thinkers on the likely threats to the US military’s electronic communications systems. Those analyses often encompassed commercial networked systems.

For example, in May 1993 Security Measures for Wireless Communications was released under the auspices of the US National Communications System. Not long after, the same office published The Electronic Intrusion Threat to National Security and Emergency Preparedness in December 1994. During June 1995 a conference, co-sponsored by the Technical Marketing Society of America, was held. That event was titled Information Warfare: Addressing the Revolutionary New Paradigm for Modern Warfare.

Then as now the most pernicious and non-life threatening cyber-attacks normally resulted in the theft of identities and, perhaps, intellectual property to which ‘experts’ would assign dollar values. Other network, computer assaults were visited upon databases containing personal information producing headaches for the individuals who had to get new credit cards or revise identities. Embarrassment was the penalty for commercial organizations too cheap to invest in robust electronic security systems.

I Love New York

Information Operations have not taken place (yet) resulting in large scale, life-threatening fallout, but the 1977 New York City blackout provides some clues as to what might result from a successful cyber assault on a power grid. Those initially responsible for the Black Out were bolts of lightning from a thunderstorm that repeatedly struck a Consolidated Edison facility. Redundancies built into the grid that did not function and aging equipment and operator error led to the loss of power.  Observers were already thinking about rudimentary network centric themes even then as The Trigger Effect from the 1978 series Connections by James Burke demonstrates.

It is difficult to say with any certainty if, over the last 23 years, competently secured US military networks have been successfully compromised by electronic intrusions by noted Information Warfare nations Russia, China and Israel seeking to steal classified, compartmented data or Intelligence, Surveillance and Reconnaissance technologies. That information is not likely to ever see the light of day, classified as it should be.

Certainly, US military websites and other government organizations have been hacked successfully over the years resulting in detrimental data spills and website defacement. But these do not rise to the level of national security threat; instead, they are clear cut cases of robbery and vandalism and should be viewed from a civilian law enforcement perspective.

Insiders Have Done More Damage to US National Security

It is worth noting that, to date, the most serious breaches of US national and military security have come at the hands of disillusioned US citizens like Jonathan Pollard (US Navy) and Richard Hansen (FBI) who lifted paper documents from secure facilities, and Edward Snowden (NSA & Booz Allen) who downloaded electronic files to his storage devices.

As far as anyone knows, the electromagnetic waves emanating from a computer display have not been remotely manipulated by a state or non-state actor to kill or maim a person looking at the display. But transmitting retroviral software at some distance, or using an intelligence operative to insert destructive code via a flash drive, is known to have been successful in the US-led operation against Iran as theStuxent case demonstrated.

Recent electronic intrusions and theft of data/images from the non-secured private accounts of former NATO commander General Phillip Breedlove, USAF (Ret.); Andrew Weiner (sexting former politician from New York) or General Colin Powell, USA (Ret.) are generally served up by hackers and then picked up as news by US Big Media and Social Media. Humiliating as it is for the individuals involved, this nefarious CYBER-vandalism is not a national security matter, but it is used, gleefully, by any number of political interest groups and businesses for their own ends.

In like manner, the Sony, Democratic National Committee and Yahoo electronic break-ins, for example, are not national security incidents by any stretch of the imagination. Were they criminal actions and embarrassing for the victims? Yes. Did the information peddled by the hackers influence the public in some fashion? Sure. If sponsors of the hackers are from Russia, China, Iran, DPRK, Daesh, Israel or any other cyber-suspect, should they be exposed and brought to justice? Yes.

Should we nuke them or carpet bomb them? No.

It is problematic that politico-military strategists and tacticians, spurred on by any number of think tanks and CYBER hustlers in Washington, DC and New York (Atlantic CouncilNew York Times), have pushed the robbery of data/information and vandalism, or defacement of main-page websites into a crisis that threatens the nation’s stability. More’s the pity,  they have pasted CYBER over Information Warfare and have meshed it with Asymmetric Warfare and Unconventional Warfare not recognizing the differences and nuances.

CYBER Influence Peddlers: Pest Control Needed

CYBER enthusiasts at the Atlantic Council and the New York Times see foreign news agencies like Xinhua/People’s Daily, Press TV, RT, Sputnik News and Hezbollah, which all broadcast news and information with their brand of spin, as demonic CYBER influence peddlers who are corrupting the American national consciousness by engaging in perception management techniques in an attempt to electronically captivate American audiences and turn them, well, to the “dark side.”

Iran’s Press TV Internet traffic statistics show it is ranked 26,598 with 28 percent of its visits coming from the United States.  RT is ranked 446 in the world with 18 percent of its visitors from the US. Sputnik News is 1410 with 8 percent of its visitors from the US.  Xinhua is ranked 25,000 with about 3 percent visiting from the US and the People’s Daily does not even rank.

In this dark CYBER world, the unemployed and disaffected youth bulges (but why are they jobless and disenchanted), social miscreants and American citizens will populate evil foreign websites and after viewing assorted marketing/propaganda they will by Pepsi instead of Coke; whoops, I meant to say join the Islamic State or the Chinese Communist Party; move to Russia; or take in the Hezbollah website (no ranking on the Internet).

What this says, in part, is that those pushing CYBER fear have unwittingly indicted the United States and its people of idiocy. They seem to be saying that the American people have been ill served by the Constitution and the Bill of Rights, educational institutions and the government and the citizenry is but a collective of dolts incapable of sorting through information pushed out of non-Western media outlets. In the United States, the First Amendment makes sure that all-points of view can be aired on the premise that the American people have the ability to harvest information and distinguish between info-crap and ‘actionable’ info that can be turned into positive knowledge for civil good.

What is there to fear from comparatively small state backed-foreign news outlets? So they spin news or publish opinions contrary to the US narrative. So what? How is that any different from left and right wing publications in the United States that take down US civilian and military institutions? The American public can handle all of this. The CYBER Fear pushers further display their ignorance by assuming that the US national security machinery has not done enough to protect the enfeebled American public from opinions emanating from non-Western sources. The CYBER chicken-littles believe too, that the US military and those in charge of America’s critical infrastructure sets do not understand the gravity of the CYBER Danger.


Sleep Well

As the US Army’s Unconventional Warfare Manual and scores of US military CYBER commands,  and doctrinal publications make clear, the US national security community has been pushing the CYBER matter hard. It has engaged in the less public relations friendly issues like mathematics and encryption, physically securing communications nodes and networks, creating honeypots to attract hackers, digital forensics (breaking into secure hard drives, software) and working with civilian counterparts, sometimes controversially, to secure communications networks.

For those worried about the US government’s ability to listen to adversaries, allies, the public, whomever,  the Snowden document dumps show just how deep the National Security Agency’s wormhole goes. Either you’re of the mind that this grossly oversteps the US government’s authority, or maybe the nation is better off with the NSA playing God, or, like most, you just don’t care.

The US capabilities to tap transoceanic communications cables or satellite communications are well known.

The seriousness with which the US national security community views CYBER can be noted in this comment from a Defense Science Board study on CYBER Existentialism

While the manifestation of a nuclear and cyber attack are very different, in the end, the existential impact to the United States is the same. Existential Cyber Attack is defined as an attack that is capable of causing sufficient wide scale damage for the government potentially to lose control of the country, including loss or damage to significant portions of military and critical infrastructure: power generation, communications, fuel and transportation, emergency services, financial services, etc.

And just a quasi authoritative US government body claims there is a real danger of an existential CYBER attack, the First Amendment allows a rapier like response from a former government official musing on the fallout from the collapse of electronically connected networks whether by CYBER Attack, lightening bolts or human error.

Cyber Warfare, Cyber Security and massive Cyber Attacks are alarmist and vastly overrated. Look at what went on in Cyprus in 2013. What could trigger a run on the banks in the United States? Something as simple as shutting down all the ATM’s for three days. The resulting panic and long bank lines could irrevocably shake confidence in banks and financial institutions, as Americans find out the significance of all the paperwork they signed when they established their banks accounts, fed by direct deposits. Since many in the country know what the country was like before personal computers and the Internet, they’ll do fine. Those people who have exchanged their hearts and brains for computer chips manufactured in Vietnam, and are tethered to Smart Phones and the Cloud, are due for a very rude awakening. You’ve heard of sleeper agents and moles haven’t you? I wonder how many sleeper programs are in the millions of computer chips that are now in every single facet of our lives.

The original source of this article is Global Research

Metasearch engines have risen up the web through the years and continue to grow in numbers, even in the current Google dominated search world.

Companies who create their own versions of metasearch engines must have given up on trying to compete with Google and the other top search engines, and instead take advantage of the API’s and technologies available via the big three or four search technologies, integrating that data into one interface with a unique spin on ranking or listings formats.

Here at the Journal, we’ve been featuring some of these metasearch engines; especially the new ones. But we won’t be able to cover them all (although we try).

So the best we could do is come up with a list of these metasearch engines, made up of metasearch startups and others have been around for quite some time now.

It is not however a comprehensive list, as we know that there are still more out there. If you know of other metasearch engines, please feel free to add them in the comment. We will continuously update the list as we receive more comments.


Wikipedia entry defines a meta-search engine as a search engine that sends user requests to several other search engines and/or databases and aggregates the results into a single list or displays them according to their source.

  1. MetaCrawler – Uses innovative metasearch technology to search the Internet’s top search engines, including Google, Yahoo! Search, MSN Search, Ask Jeeves, About, MIVA, LookSmart and more. Search refinement available.
  2. Dogpile -Puts the power [of] all the leading search engines together in one search box to deliver the best combined results. Toolbar download available.
  3. Mamma – “The mother of all search engines”,
  4. IxQuick – “The world’s most powerful metasearch engine”, includes universal power search, global search and search refinement. Toolbar download available.
  5. kartOO – A visual meta search engine that instead of showing up traditional search results pages, displays a graphical map of search results. Honestly, I don’t get the point.
  6. Ithaki – Search various search engines and ranks results based on an internal ranking system.
  7. Seekz – A parallel web search engine that queries many of the Internet’s top search engines and displays results in groups with the most relevant website appearing first. Removes duplicate results as well.
  8. iBoogie – Puts documents with similar content or with related topics into the same group. Each group is assigned a label based on the content of the documents.
  9. Zuula – Provides search unaltered search results from various search engines giving users the chance to check them first before going to results from individual search engines. And it even remembers which search engine you have been to so you can easily switch back and forth. Sponsored links are separated.
  10. inCrawler – A metasearch engine and a web directory in one. Works like your traditional search portal where categories are displayed upfront just below the search toolbox.
  11. WindSeek – Pulls results from many of the major search engines simultaneously with lightning speed and accuracy.
  12. Seek2Day – Gathers results from 17 different major search engines and in a very quick way decides which information is most relevant to the user. The results are then presented in a comprehensive format.
  13. ez2Find – a Global meta search engine that searches AlltheWeb, Teoma, Google, Yahoo!, AltaVista, Wisenut, ODP, and MSN, parse the results, remove the duplicates, include links to relevant directory categories (directory results from the Open Directory) and to clustered results. Calculate result relevance by an algorithm that count the number of time the link was found in the search engines and its position on them.
  14. Vroosh – VROOSH.com is a metasearch engine that also acts as a metacrawler utilizing fast parallel technology for speed and accuracy. Metasearch using Keywords in any language, use Advanced Search to search in a specific Country or metacrawler for MP3,and FTP sites.
  15. qkSearch – calls itself a 3-in-1 meta search engine by providing clustering search, split search and blended search (not functional yet).
  16. TurboScout – search 21 search engines without retyping the search engine name. To limit your search into one search engine, all you have to do is enter your keyword and click on the name of the specific engine.
  17. FinQoo – the next generation meta search engine that lets you search, share and share summarize. It doesn’t have an about page yet though, so I’m wondering whose responsible for it. The Philippine flag right up the search box, probably made by some Filipino tech guys.
  18. Polymeta – an intelligent and advanced meta search and clustering engine that enables organizations and individuals to simultaneously search diverse information resources on the web with a common interface. Search results are merged, ranked and presented in relevance order. Uses a natural language processing and information retrieval algorithms in its query analysis and search result refinement.
  19. Unabot – Unabot is all-in-one meta search site that allows the user to choose from hundreds of different search engines, directories, and indices to query.
  20. vPinPoint – is a parallel search engine that searches Google, Yahoo, MSN and Ask.
  21. Draze – crawls various search engines and let users compare search results.
  22. SearchSalad – Search Salad brings together results from the top search engines and also from the major review sites all in one place giving you the ability to see the top results from the major sites all at once. This combined with Search Salad’s customised search environment means that you see the best of what the web can offer in terms of search.
  23. Clusty – Clusty queries several top search engines, combines the results, and generates an ordered list based on comparative ranking. This “metasearch” approach helps raise the best results to the top and push search engine spam to the bottom.
  24. AllPlus – searches four major search engines namely, Google, Yahoo, Live and Ask.

Soruce : https://www.searchenginejournal.com

European privacy regulators are investigating messaging service WhatsApp’s plan to share user information including phone numbers with its parent, Facebook Inc., adding to pressure on both sides of the Atlantic over the social media firm’s privacy practices.

A European Union body representing the bloc’s 28 national data-protection authorities said Monday that its members were following “with great vigilance” changes to WhatsApp’s privacy policy last week. The new policy disclosed the plan to share data with Facebook, while giving only existing WhatsApp users the ability to opt out of part of the data-sharing, setting off complaints from privacy activists in the U.S. and Europe.

“What’s at stake is individual control of one’s data when they are combined by internet giants,” the group, called the Article 29 Working Party, said in an emailed statement.

Consumer privacy advocates in the U.S. on Monday filed a complaint with the Federal Trade Commission, alleging that the change represents an about-face on WhatsApp’s previous promise to consumers that “nothing would change” when the social network acquired the messaging startup in 2014.

The Electronic Privacy Information Center and the Center for Digital Democracy complaint filed with the FTC charges that the proposed changes to use WhatsApp user data for “marketing practices” constitutes “unfair and deceptive trade practices.”

WhatsApp said it “complies with applicable laws,” adding that “we look forward to answering any questions regulators or other stakeholders have about this update.”

The pushback from European regulators opens a new front in Facebook’s privacy battles. Germany’s Federal Cartel Office earlier this year said it is investigating whether Facebook Inc. abuses its dominance as a social network to harvest personal information. France’s privacy watchdog has threatened to fine Facebook Inc. if it doesn’t change how it handles data about its users.

Facebook has said it complies with European privacy laws and has won appeals of privacy cases against it in Belgium and Brussels in recent months as well.

Last week’s change in WhatsApp’s privacy policy struck a chord because the service has long touted its privacy credentials.

Under the new WhatsApp privacy policy, existing users have 30 days to agree to the new sharing, but can as part of that process opt out of letting Facebook use the data for marketing purposes. The complaint alleges that that requirement goes against a 2012 FTC consent order that demands the company use an “opt-in” process when changing its privacy policy.

WhatsApp disputed the characterization, saying that it both asks for content from all users, and offers “industry leading choice to existing users over how their data is used.”

Source: http://www.wsj.com/articles/european-regulators-scrutinize-whatsapp-data-sharing-plan-with-facebook-1472506175

Friday, 12 August 2016 03:18

PreviewSeek – New Web Search Engine

PreviewSeek is a new London-based search engine created by Chris Hong that is very quietly impressing people with a number of innovating features.


Basic search results are great but nothing to get overly excited about. The useful features include disambiguation of queries (are you searching for “apple” the fruit, or “apple” the computer”?), preview of search pages (think Browster), and better refining of searches.


Understanding Your Query


PreviewSeek does a good job at attempting to determine meaning from a query. Type in “Java” and you get a result set with a numer of options for the query, including the island, the programming language, and even the coffee.


Preview Results


This is my favorite feature. PreviewSeek allows you to preview search results in much the same way as Browster (our profile), except without the download and the ads. It’s a great way quickly scan results without actually clicking away from previewseek.


Search Refinement


For any given query PreviewSeek will suggest a number of refinement options on the left sidebar, which greatly assist in drilling down on a particular search.




If you are job searching, it is well worth your time to prioritize a thorough sweep of your social media account content to ensure you are comfortable with your online brand. Monitoring your privacy settings on your social media accounts is highly recommended, especially during a job search.

Surveys such as the Jobvite’s Social Recruiting Survey for 2015 and the Annual CareerBuilder Social Media Recruitment Survey report these statistics regarding social media and how recruiters utilize social media for recruitment efforts.

  • 96 percent of recruiters use or plan to use social media in their recruitment efforts.
  • 52 percent of employers now use social networks to screen candidates.
  • 35 percent of employers say they are less likely to interview an applicant they cannot find online.
  • LinkedIn is still the most popular recruiting network and is used by 87 percent of survey respondents.

Only 4 percent of recruiters do not use social media in the recruiting process. The data in these surveys also revealed that the 96 percent are mostly using LinkedIn, Facebook and Twitter, in that order, to research candidates.

I consulted Eric Pierce, Director of Louisville Operations at Brooksource, on this the subject. Brooksource specializes in IT hiring, recruiting and staffing needs. Brooksource is ranked #1 in the medium-sized company category in the 2016 Best Places to Work in Kentucky by the Kentucky Chamber of Commerce and the Kentucky Society for Human Resource Management.

Pierce does conduct internet research on candidates prior to interviews, he said. Brooksource hires much of their staff directly out of college and internet research can be more helpful in screening candidates than a resume with little experience listed. Like other organizations, cultural fit and ability to work in teams is a critical component of evaluating candidates.

But, according to Pierce, “An individual’s social media footprint is a decent indication of how someone is going to fit in with your company’s mission and goals.”

LinkedIn is Pierce’s primary resource when conducting candidate research. He suggests that having a basic LinkedIn profile set up is very important in the professional world. While LinkedIn profiles have not replaced standard resumes, some companies using the LinkedIn job board allow candidates to apply with their profile, rather than submitting a resume.

Pierce may also skim Facebook or Twitter and perform a Google search to identify any red flags on candidates during the recruitment process. Red flags may include racist or sexist comments, scandalous photos, etc. He also mentioned the importance of teamwork in the Brooksource culture. Candidates with excessive Twitter battles or those with themes of expressing combative language may not be a good fit for his team.

Lack of a LinkedIn profile may also indicate a red flag. Technology and social media play a large role in what Brooksource does, so it seems only fair that Pierce is screening candidates with these tools. Pierce shared that no one is suggesting that candidates should not be genuinely themselves. However, candidates should remember that companies are not required to hire you. If you consider yourself to be opinionated or often share offensive content on social media, consider reviewing your privacy settings.

Candidates can use social media to their advantage by sharing content that is genuine and allows others to get to know you in a positive way. Share about your passions, family and hobbies. Pierce says, “Any well-rounded, hireable person has a personal life and a professional life. On the professional side, you should have a LinkedIn account.”

If you are unsure if something is appropriate for social media during your job search, chances are, it is not worth posting. A great advantage to social media is that it is easily updated. You can rebrand your image and ensure potential employers, family and friends see content that you are comfortable being associated with your name.


Google has appealed to France's highest court after the country's data watchdog ordered it to delete some of its search results globally.

In 2015, the Commission on Informatics and Liberty (CNIL) said Google should respect French "right to be forgotten" rulings worldwide.

But Google said the ruling could lead to abuse by "less open and democratic" countries.
The company is now appealing against a 100,000-euro (£76,000) CNIL fine.

What is the 'right to be forgotten'?

The "right to be forgotten" refers to a landmark ruling passed by the European Union's Court of Justice (ECJ) in May 2014.
It gives people the right to have results linked to their name removed from search websites, if they "appear to be inadequate" or "irrelevant".

Google says results can end up removed "even when those links point to truthful and lawfully published information like newspaper articles or official government websites".
Companies offering services to European citizens must comply with the ruling, even if their websites are not hosted in Europe.

Google said it had reviewed almost 1.5 million requests, of which about 40% resulted in the removal of a search result.

What has Google been ordered to do?

Google has previously said it does remove results when a valid "right to be forgotten" request is made.
However, it currently does not remove the affected search results from all versions of its website worldwide.
People using Google in Europe cannot find the deleted results using any version of the search engine - but people outside Europe can see the affected search results when they use a non-European version of the website such as google.com.
The CNIL wants Google to remove the affected search results globally.
It has pointed out it is relatively simple for Europeans to access international versions of Google and find the deleted results.

Why has Google refused?

Google has argued that a French authority such as the CNIL should not "impose measures outside of the nation's borders".
"For hundreds of years, it has been an accepted rule of law that one country should not have the right to impose its rules on the citizens of other countries," said Kent Walker, the company's general counsel.

In an open letter published in French newspaper Le Monde, Google said it had already received requests from countries to block content worldwide that was illegal locally.
"If French law applies globally, how long will it be until other countries - perhaps less open and democratic - start demanding that their laws regulating information likewise have global reach?" it said.
"This order could lead to a global race to the bottom, harming access to information that is perfectly lawful to view in one's own country.

"This is not just a hypothetical concern. We have received demands from governments to remove content globally on various grounds.
"We have resisted, even if that has sometimes led to the blocking of our services."

According to AFP, Google expects the Council of State, France's highest court, will take at least a year to review its appeal.
"We look forward to the court's review of this case," said Mr Walker.

Source:  http://www.bbc.com/news/technology-36332150

Page 6 of 7


World's leading professional association of Internet Research Specialists - We deliver Knowledge, Education, Training, and Certification in the field of Professional Online Research. The AOFIRS is considered a major contributor in improving Web Search Skills and recognizes Online Research work as a full-time occupation for those that use the Internet as their primary source of information.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.