fbpx

Web Directories

Jason bourne

Jason bourne

Gmail Supports a plethora of search operators to help you instantly find that elusive email message buried in your mailbox. You have size search – like larger_than:5mb – to find the big messages in your account. File search – like has:attachment filename:doc – will locate email messages that contain file attachments of specific types. This graphic illustrates all the known search operators that work both on Gmail and Google Inbox.

Date Search in Gmail

Date search in Gmail helps you locate emails sent or received in a specific period. Here are some examples:

  • newer_than:7d from:me – Emails sent in the last 7 days
  • after:2016/12/01 to:me – Emails received in the month of December 2016

Specify Time Modifiers in Gmail Search

Gmail also supports time-based searches allowing you to find emails in the specific hour, minute or second. For instance, you can limit your Gmail search to emails that were received between Dec 10 8:15 PM and Dec 10, 2016 8:45 PM.

To get started, convert the date and time to Epoch time and then use the timestamp with the standard after or before search operator of Gmail.

For instance, the Epoch time for Dec 10, 2016 8:15 PM is 1481381100 and the Epoch time for Dec 10, 2016 8:45 PM is 1481382900. Use the search query after:1481381100 before:1481382900 and you’ll get a list of all emails received during that 30-minute period.

Epoch time is the number of seconds that have elapsed since January 1, 1970 (UTC). Use the Epoch converter to represent a human readable date and time in Epoch and use that timestamp with the before or after search operator of Gmail to find that elusive email.

Author:  Amit Agarwal

Source:  http://www.labnol.org/internet/gmail-search-tips/29206/

Crime is transitioning into a more digital setting these days. Traditional criminal operations become harder to execute and require a lot of logistical preparation. Online crime, on the other hand, is much more approachable. Over in Croatia, the shift to online crime is very noticeable, and most of the activity is taking place on deep web marketplaces.

Croatia Is A Darknet Crime Hub To Reckon With

The increase in online crime in Croatia was first noted by news outlet Novilist. Thanks to the anonymity aspect provided by the Tor Network, and the sheer popularity of darknet marketplaces, it makes sense for criminals to shift their activities to the Internet. As a result, it becomes much more difficult for law enforcement agents to crack down on crime in the country.

So far, law enforcement agencies have completed their investigation of several deep web cases. The vast majority of online crime related to buying and selling drugs, as well as dealing in stolen financial information such as credit card dumps and bank accounts. Considering how the deep web gives anyone access to all kinds of products and services, the global appeal continues to increase every quarter.

Croatian High-tech Crime Department’s Kristina Posavec stated:

“There are plenty of these dark net markets that offer absolutely everything – from drugs, weapons and stolen personal information to child pornography, credit card information and illicit drugs. Absolutely everything, whatever you wish, you can find there. If someone wants to get drugs he no longer needs to look for dealers in dark alleys when you can order drugs that will arrive at your home address, packed in a box of CDs or a box of chocolates. This is one of the most popular methods because it is more convenient and easier. A 14-15-year-old child can easily order drugs from the living room, without the knowledge of his parents.”

Despite the increase in online crime, the Tor Network is not only used for criminal activity. Plenty of people use the technology to remain anonymous on the Internet or hide their real IP location for legitimate purposes. People access Facebook through Tor, and journalists rely on the network to work in anonymity.

That being said, the rise in darknet crimes has Croatian officials concerned. Revealing user identities is far more challenging than before, as tracing the digital breadcrumbs can be a challenge. Additionally, there are roughly 1,200 deep web crime cases reported every year, indicating this new form of crime needs to be taken seriously.

Author:  JP Buntinx

Source:  http://www.livebitcoinnews.com/deep-web-crime-croatia-exploded-recent-years

Wednesday, 07 December 2016 12:09

What Are 'Black Hat' and 'White Hat' Hackers?

A hacker is a tech-savvy user who manipulates and bypasses computer systems to make them do the unintended. Sometimes this manipulation is noble, with the goal to create something beneficial. Other times, hacking is harsh, and done with the wicked goal to hurt people through identity theft or other harm.

You are likely familiar with the stereotypical 1980's hacker: the evil criminal who is socially isolated. While this stereotype does indeed describe some modern 'black hat' hackers, there exists a subset of hackers who are not criminals. In fact, there are many hackers who use their knowledge for good

Today, 'hacker' is a descriptor that subdivides into 3 categories:

  1. 'Black Hat' Hackers: criminals and wrongdoers.
  2. 'White Hat' Hackers: ethical hackers who work to protect systems and people.
  3. 'Grey Hat' Hackers: dabble in both black hat and white hat tinkering.

1  Classic 'Black Hat' Hackers = Criminals/Lawbreakers

Classic Black Hat Hackers Criminals-Lawbreakers

This is the classic definition of a hacker: a computer user who willfully vandalizes or commits theft on other people's networks

'Black hat' is a stylish way to describe their malicious motivations. Black hats are gifted but unethical computer users who are motivated by feelings of power and petty revenge. They are electronic thugs in every sense of the word, and they share the same personality traits as emotionally-stunted teens who smash bus stop windows for personal satisfaction.

Black hat hackers are renowned for the following common cybercrimes:

  • DDOS (flood) attacks that impair computer networks.
  • Identity theft
  • Vandalism of systems
  • The creation of destructive programs, like worms

2  'White Hat' Ethical Hackers = Network Security Specialists

White Hat Ethical Hackers Network Security Specialists

Different from the classic black hat hackers, white hat hackers are either driven by honorable motivations, or they are mercenaries working on honorable agendas. Also known as 'ethical hackers', white hats are talented computer security users often employed to help protect computer networks.

Some white hats are reformed black hats, like former convicts who take on work as store security guards. While they themselves may have been unethical in the past, their current vocation is considered white hat.

Ethical hackers are motivated by a steady paycheck. It is not surprising to see ethical hackers spending those paychecks on very expensive personal computers in their personal lives, so they can play online games after work. As long as they have a good-paying job to support their personal habits, an ethical hacker is usually not motivated to destroy nor steal from their employer.

Special note: some white hat hackers are 'academic hackers'. These are computer artisans who are less interested in protecting systems, and more interested in creating clever programs and beautiful interfaces. Their motivation is to improve a system through alterations and additions. Academic hackers can be casual hobbyists, or they can be serious computer engineers working on their graduate-level degrees.

3  'Grey Hat Hackers' = Conflicted, Uncertain Which Side of the Law They Stand

Grey Hat Hackers Conflicted Uncertain Which Side of the Law They Stand

Grey hat hackers are often hobbyists with intermediate technical skills. These hobbyists enjoy disassembling and modifying their own computers for hobby pleasure, and they will sometimes dabble in minor white collar crimes like file sharing and cracking software. Indeed, if you are a P2P downloader, you are a type of grey hat hacker.

Grey hat hackers rarely escalate into becoming serious black hat hackers.

4  Subcategories of Hackers: Script Kiddies and Hacktivists

Subcategories of Hackers Script Kiddies and Hacktivists

  • Script Kiddies: this is a stylish name for novice hackers who are unskilled. Script kiddies can be white hat, black hat, or grey hat.
  • Hacktivists: this is the hacker who is also a social activist fighting for a cause. Some people would argue that famous hackers like Lulzsec and Anonymous are hacktivists fighting government corruption and corporate misdeeds. Hacktivists can be white hat, black hat, or grey hat.

5  More About Computer Hackers

More About Computer Hackers

Computer hacking is exaggerated by the media, and very few public narratives give hackers the fair shake that they deserve. While most movies and TV shows of hackers are absurd, you might consider watching Mr. Robot if you want to see what hacktivists do.

Every savvy web user should know about the unsavory people on the Web. Understanding common hacker attacks and scams will help you navigate online intelligently and confidently.

Author:  Paul Gil

Source:  https://www.lifewire.com

A select number of site owners are currently being invited to test a new feature that allows searchers to message businesses directly from Google search results.

There’s a new Google My Business Help guide dedicated to the messaging feature, but it doesn’t provide much information beyond telling site owners to follow the instructions in the email.

There’s no information about how you can get invited to test the new feature, or what types of businesses are being selected at this time. Although the help guide does provide a screenshot of what the new messaging feature looks like in search results, which you can see below:

U5fvRMnllmKuRqSrhBouaB6mVsOUjKianYYw

When it comes to the actual messaging itself, businesses have two options. They can either use traditional SMS messaging, or as an alternative they can use Google Allo.

Be weary though, if you get an invitation to try this feature it’s not advisable to sign up unless you intend on being fairly prompt with your responses.

When a customer messages a businesses they’ll be provided with the business’s average response time. If the customer perceives the average response time to be too long, it’s possible they will move on to a more responsive business.

Google warns that it will even suspend businesses from the pilot program if their average response time becomes gets to be too long. In other words, don’t accept the invitation unless you intend to actively communicate with customers on a regular basis.

However, if you sign up and then later decide having searchers message you isn’t something you’ll be able to keep up with, you can opt out of the test at any time.

It’s interesting this news about Google’s new messaging feature comes just one day after Bing announced it is rolling out a similar feature. The key differences are Bing’s new messaging option appears to be getting a much wider rollout, and businesses have the option to chose whichever messaging service they want. Whether it’s SMS, WhatsApp, Facebook Messenger, and so on.

Author:  Matt Southern

Source:  https://www.searchenginejournal.com

Google’s Transparency Report shows that the search engine removed 909 million URLs due to copyright infringement during the past year, from November 29, 2015 through November 9, 2016. Some 347,000 Web sites were affected by requests to remove content that infringe on copyrights, according to Google.

The British Recording Music Industry (BPI) LTD made the highest number of requests in the past year. For example, on Tuesday, BPI requested the removal of about 10,000 URLs of which Google removed approximately 99.7%. APDIF of Mexico submitted the second-highest number of requests at 106 million, in which about 68.9% of URLs reported were removed.

The majority of removal requests, at least on the first page, are related to entertainment industry. Others such as Microsoft, Adobe, Business Software and more also have made requests for removals.

Apple Records, Apple Music, and Apple corporate are among a handful of companies with some of the lowest request rates, ranging from 508 to 51 to 15, respectively.

Google states that between March 8, 2011 and today about 946,000 Web sites were affected and 1.97 billion URLs removed -- nearly 1 billion in the past year.

Author:  Laurie Sullivan

Source:  http://www.mediapost.com/

Results of the “Web IQ” Quiz

American internet users’ knowledge of the modern technology landscape varies widely across a range of topics, according to a new knowledge quiz conducted by the Pew Research Center as part of its ongoing series commemorating the 25th anniversary of the World Wide Web. To take the quiz for yourself before reading the full report, click here.

The survey—which was conducted among a nationally representative sample of 1,066 internet users—includes 17 questions on a range of issues related to technology, including: the meaning and usage of common online terms; recognition of famous tech figures; the history of some major technological advances; and the underlying structure of the internet and other technologies.

The “Web IQ” of American Internet Users

Substantial majorities of internet users are able to correctly answer questions about some common technology platforms and everyday internet usage terms. Around three-quarters know that a megabyte is bigger than a kilobyte, roughly seven in ten are able to identify pictures corresponding to terms like “captcha” and “advanced search,” and 66% know that a “wiki” is a tool that allows people to modify online content in collaboration with others. A substantial majority of online adults do not use Twitter, but knowledge of Twitter conventions is fairly widespread nonetheless: 82% of online Americans are aware that hashtags are most commonly used on the social networking platform, and 60% correctly answer that the service limits tweets to 140 characters.

On the other hand, relatively few internet users are familiar with certain concepts that underpin the internet and other modern technological advances. Only one third (34%) know that Moore’s Law relates to how many transistors can be put on a microchip, and just 23% are aware that “the Internet” and “the World Wide Web” do not, in fact, refer to the same thing.

Many online Americans also struggle with key facts relating to early—and in some cases, more recent—technological history. Despite an Oscar-winning movie (The Social Network) about the story of Facebook’s founding, fewer than half of internet users (42%) are able to identify Harvard as the first university to be on the site; and only 36% correctly selected 2007 as the year the first iPhone was released. The Mosaic web browser is an especially poorly-remembered pioneer of the early Web, as just 9% of online Americans are able to correctly identify Mosaic as the first widely popular graphical web browser.

When tested on their recognition of some individual technology leaders, a substantial 83% of online Americans are able to identify a picture of Bill Gates (although 10% incorrectly identified him as his long-time rival, former Apple CEO Steve Jobs). But just 21% are able to identify a picture of Sheryl Sandberg, a Facebook executive and author of the recent best-selling book Lean In.

Americans also have challenges accurately describing certain concepts relating to internet policy. Six in ten internet users (61%) are able to correctly identify the phrase “Net Neutrality” as referring to equal treatment of digital content by internet service providers. On the other hand, fewer than half (44%) are aware that when a company posts a privacy statement, it does not necessarily mean that they are actually keeping the information they collect on users confidential.

Age differences in web knowledge

Younger internet users are more knowledgeable about common usage terms, social media conventions

Younger internet users are more knowledgeable than their elders on some—but by no means all—of the questions on the survey. These differences are most pronounced on the questions dealing with social media, as well as common internet usage conventions. Compared with older Americans, younger internet users are especially likely to know that Facebook originated at Harvard University and that hashtags are commonly used on Twitter, to correctly identify pictures representing phrases like “captcha” and “advanced search,” and to understand the definition of a “wiki.”

At the same time, internet users of all ages are equally likely to believe—incorrectly—that the internet and the World Wide Web are the same thing. There are also no major age differences when it comes to the meaning of phrases like “Net Neutrality” or “privacy policy,” and older and younger internet users correctly identify pictures of Bill Gates and Sheryl Sandberg at comparable rates.

Educational differences in web knowledge

College grads more familiar with common tech terms

College graduates tend to score relatively highly on most Pew Research Center knowledge quizzes, and also tend to have high rates of usage for most consumer technologies. As such, it is perhaps not surprising that this group tends to do relatively well when it comes to knowledge of the internet and technology.

Compared with internet users who have not attended college, college graduates have much greater awareness of facts such as Twitter’s character limit, or the meaning of terms such as “URL” and “Net Neutrality.” Still, there are some elements of the technology world on which even this highly educated group rates poorly. For instance, just one in five correctly answered that the internet and World Wide Web are not the same thing, and only 12% know that Mosaic was the first widely available graphical web browser.

Author:  AARON SMITH

Source:  http://www.pewinternet.org/

A newly-released annual Norton Cyber Security Insights Report has found that global cyber crime cost a massive $126 billion during 2015, and affected 689 million people in 21 different countries.

The findings show a 10-percent increase in cyber crime from the previous year.

“The study found a number of factors responsible for the high numbers of affected people, including users’ habits, lack of awareness and a lackadaisical attitude to their online safety despite being aware of some of the threats, as well as the proliferation of connected devices and increasing instances of connecting to non-secure networks,” the International Business Times reported.

Additionally, the survey found that the United States was the most susceptible developed nation, with 39 percent of Americans falling victim to a cyber crime versus a 31-percent average for the rest of the world. The US was responsible for nearly one sixth of the cost, $20.3 billion, of cyber crime globally.

Parents in the US also believe, more than any other nation, that their children are more likely to be bullied online than in a playground or at school. In the US, 64 percent of parents believe online bullying is the bigger concern, versus 48 percent globally.

The Netherlands had the lowest rate of cyber crime, with 14 percent of their citizens falling victim, according to the study.

When looking at the age of those most affected, millennials displayed the highest vulnerability, with 40 percent of those surveyed having been the victims of cyber crime at least once in 2015.

Of those surveyed, over 40 percent could not tell the difference between a regular email and a phishing email. Out of those who had been targeted in phishing attempts, 13 percent fell for them, clicking on malicious links or sharing personal information. Approximately 80 percent of those who did ended up facing negative consequences, including identity theft, bank fraud, or credit cards being registered in their names.

With the widespread nature of cyber crime, 51 percent of those surveyed stated their belief that it is harder to protect themselves online than it is in the real world.

Author:  Tech

Source:  https://sputniknews.com

Mobile has officially overtaken desktop as the primary means of using the internet.

Questioning this yet? Look no further than Google’s latest change in their algorithm. The internet search giant recently announced that they would release a mobile search index separate from their existing desktop index. This is the way Google scans websites and ultimately determines where sites come up in search rankings. This change alone is already a major change, but the clincher is the fact that this new mobile index will be the primary method of determining search ranking.

Considering how fast people are adopting smartphones and tablets, it’s a wise move that flows with the logical progression of the web. Desktop searches, once Google’s lifeline, have been overtaken and account for less than 45 percent of all searches done on the web for some time now. As it turns out, more often people do use mobile devices to look stuff up.

But now that this decision by Google to index sites via mobile first is here waiting to be rolled out, there are more questions than answers. How exactly is the mobile index going to work? How will this affect websites that put less content on their mobile site than their desktop site? How often will the desktop index be maintained?

The answers to these questions will be much clearer in the coming months, but it’s safe to say that the following insights can help your business plan ahead now:

Make your site mobile-friendly

You’d think most sites already have this, but a surprising number still don’t. If you’re one of those businesses who’ve been putting off a mobile version, you now don’t have much choice left but to adapt. Otherwise, your site will rank poorly on search engine result pages, and that’s something you don’t want to happen. Google takes into account in search rankings whether your site is mobile friendly or not.

Fill your mobile site with relevant content

Due to the compact sizes of handheld devices, a lot of mobile sites carry far less content than their desktop counterparts. This can make it for easier viewing on smaller screens. But with Google’s new algorithm, mobile sites will also have to be optimized, more so than desktop sites, and need to carry the full website content. No longer can there be a simpler mobile version with less content. If this is the case, that site will hurt in searches. The key would be to have a responsive website, one that “responds” to the device (mobile, tablet, desktop) that the user is on, and that at any device size it has the full website content.

Design a mobile strategy

Mobile used to be an alternative, an option. But things have changed. It’s now the default, relegating desktop queries to minority status. This means you need a mobile strategy more than ever. If you’re still attached to the desktop, you have to change your mindset and make mobile your primary concern. Font size, page load speed, scroll depth, and responsiveness are just some of the design elements you must consider for your mobile site. As well, lead capture is important to consider. How can you have a great mobile user experience that helps you capture leads? That’s a great strategy piece to have in place!

moduleplant id="583"]

The world is going mobile, and so should your site. Google is already at the helm, so act now if you don’t want to be left behind.

Mike Gingerich is President of Digital Hill Multimedia (www.DigitalHill.com), a Goshen web design and marketing agency. He is also a co-founder of TabSite.com and Waftio.com, leading software tools for contests and lead capture. Listen to his social media and web podcast, Halftime Mike, available on iTunes and at www.MikeGingerich.com.

Author:  Mike Ginerich

Source:  http://www.goshennews.com/

While it would have been nice to tackle this issue before the election, Google and Facebook are finally taking a tiny step in order to fight back against fake news. According to multiple statements, both companies have updated their policies to ban fake news sites from using Facebook’s and Google’s advertising networks.

With the U.S. election, fake news became incredibly popular on social networks, such as Facebook, Twitter and YouTube, as well as news aggregating services, such as Google News and news articles in Google search results. We’re not talking about opinion articles — we’re talking about reports spreading blatantly inaccurate information.

Google first updated its policy saying that the company will try to ban sites that “misrepresent, misstate, or conceal information.” Websites who don’t comply with this rule will get banned from using Google AdSense.

When it comes to Facebook, the company has also updated its policy to rule out fake news sites from using Facebook Audience Network.

Google AdSense and Facebook Audience Network let content publishers display ads on their websites. Google and Facebook manage the ad inventories, content publishers get a cut for clicks or impressions.

Both companies already have strict policies for their ad networks. For instance, you can’t use Google AdSense on a porn website. Google uses a combination of algorithms and human moderation to decide whether a site is eligible to use its advertising service.

By removing a potential revenue stream, it makes the business of fake news a bit less lucrative. For instance, Buzzfeed discovered that more than 100 fake news sites were created in a tiny city in Macedonia. So it’s clear that it’s not just about influencing the election — people are taking advantage of social networks to make money using fake news.

But there will always be alternative revenue streams, so this move is not enough. Reducing the reach of these websites is the best way to prevent fake news sites from popping out. If Facebook, Twitter, Google News and other websites flagged fake news appropriately, then there would be no reason to create fake news sites in the first place.

Source:  techcrunch.com

A responsibility that Facebook has with its users is that it needs to ensure that your account is not easily hackable. This means creating security systems, but there is always a problem: the most vulnerable point of any online system is the user who does not care right to their own information.

This usually comes in the form of insecure and repeated passwords. Then, no matter if the company built the Fort Knox; if someone has your email address and the password is "123456", your only chance of not being hacked is to have two-step authentication enabled. Face it: if your password really is "123456", you probably also have not activated the second verification step.

However, Facebook has taken a very unorthodox place to deal with this problem. Alex Stamos, chief security officer in the company, told CNET today the company negotiates directly with cybercrime in the deep web to buy databases with passwords stolen by hackers.

The fact is that these databases stolen end up revealing enough of human behavior on the Internet. By analyzing a huge amount of passwords, you can see patterns of which are those most recurrent, and therefore more fragile. On a bench 1 million keywords, imagine how many "123456" will not arise. Suddenly, you can see that many people are using the password "kittens", and it became dangerous.

By purchasing these stolen banks, Facebook can do this analysis and compare it with your own database (encrypted, it is true) passwords. Stamos reveals that to make this work, which is quite heavy for company computers, the social network was able to alert tens of millions of users that their passwords were not safe.

The executive explains that Facebook has the tools to offer more security to users, such as the aforementioned two-step authentication. It is the person's prerogative to use these tools or not, but the company says it is his responsibility to take care of those who choose not to activate the features.

Source:  olhardigital.uol.com.br

Page 2 of 6

AOFIRS

World's leading professional association of Internet Research Specialists - We deliver Knowledge, Education, Training, and Certification in the field of Professional Online Research. The AOFIRS is considered a major contributor in improving Web Search Skills and recognizes Online Research work as a full-time occupation for those that use the Internet as their primary source of information.

Get Exclusive Research Tips in Your Inbox

Receive Great tips via email, enter your email to Subscribe.