Skip to main content

Posts

Showing posts from 2021

Share: SSL

SSL stands for Secure Sockets Layer. It is the standard technology to keep an internet connection secure, safeguarding any sensitive data that is being sent between two systems, can be server to server or a server and a client, preventing criminals from reading and modifying any information transferred. SSL uses encryption algorithms to scramble data in transit, makes sure that any data transferred between users and sites, or between two systems remain impossible to read, preventing hackers from reading it as it is sent over the connection. TLS (Transport Layer Security) is an updated, more secure, version of SSL. Not only is TLS more secure and performant, most modern web browsers no longer support SSL 2.0 and SSL 3.0. While SSL is still the dominant term on the Internet, most people really mean TLS when they say SSL. HTTPS (Hyper Text Transfer Protocol Secure) appears in the URL when a website is secured by an SSL certificate. The details of the certificate, including the issuing aut

Share: Hosting

Hosting is where your website content such as images, videos etc are stored. Most of the websites share a server with others, some require an entire server. cPanel is a web hosting control panel software developed by cPanel, LLC. It provides a graphical interface (GUI) and automation tools designed to simplify the administration processes of hosting a website. cPanel also has command line and API-based access that allows third-party software vendors, web hosting organisations, and developers to automate standard system administration processes. Plesk is a web hosting control panel and data center software developed for Linux and Windows-based hosting services. It is developed by Plesk International GmbH. Plesk's user management model is suitable for dedicated and shared hosting, allowing server administrators to set up new websites, reseller accounts, email accounts, as well as edit and create DNS entries through a web-based interface. A dedicated hosting service, dedicated server,

Share: Domain Name

A domain name is a website URL, is the address, is your website name where Internet users can find and visit your website. Computers use IP addresses, which are a series of number. However, it is difficult for people to remember. Because of this, domain names were developed and used to identify entities on the Internet rather than using IP addresses.   A domain name can be any combination of letters and numbers, and it can be used in combination of the various extensions, such as .com, .net and more.   The domain name must be registered before you can use it. Every domain name is unique. If someone types in www.yourdomain.com, it will and only go to your website.   Domain names are formed by the rules and procedures of the Domain Name System (DNS). Any name registered in the DNS is a domain name.   "Domain names are organized in subordinate levels (subdomains) of the DNS root domain, which is nameless. The first-level set of domain names are the top-level domains (TL

How-To: 4 Things You Need To Start A Website

These are the main things you need to start a website: 1. Domain Name - A name or domain name is your website url (address). This is how people can easily find and even remember you. For example, aesyonline.site is a domain name. A good domain name is normally short and easy to remember. For example google.com .   Do you need a domain name? Find your domain name here! 2. Hosting - Hosting or storage is where your materials for example images, creatives, videos, text, and more are stored on the net. This makes your website and materials are accessible 24/7. There are a few types of hosting as well as software to manage hosting services, for example the cPanel. 3. Design - Every website has a design. You can use a website builder to do it using templates, or you can write your own codes. For example THIS is built using Website Builder. WordPress (CMS) is another powerful website builder that gives you flexibility to custom and manage you website. 4. Content - Or pages on yo

Share: Two-Factor Authentication (2FA)

2FA works by adding an extra layer of security to your account. It requires an extra login credential to gain account access, and getting that second credential requires access to something you own, something you are or something you know. For example fingerprint. Common 2FA methods: 1. Text Message - Receive a login code (SMS). 2. 2FA Application - Mobile application that generates an authentication code. 3. Bio-metric - This method requires you to physically present something to gain access to your account. Common methods of bio-metric verification include retina scans and fingerprint. An account that uses 2FA is much more secure than a mere username and password login, but that doesn’t mean it is 100% safe.You may lose access if you lose your phone or unable to receive the login code if your phone number is inactive. Mobile number portability is an opening for hackers to impersonate you and switch your number. Others may be able to use or access to your device (apps) when

Share: About Pyramid Scheme

Pyramid scheme is illegal. Here are some signs if a business is running a pyramid scheme: * Your income is based on the number of people you recruit;not on the sales of products. They might tell you to forget about products, but to keep focusing on recruiting new people, the more you recruit the more you gonna make. * You have to buy and keep inventory. * You have to buy things that you don't need or want. * Invited and took photos with celebrities, photos of luxury cars, etc. For promotional and attention purposes. And the most ridiculous thing is, when they share their so-called business with you, they will always tell you how rich they are, or their bosses are, or how much they have earned, or what cars they use, where they just had vacations, etc from doing this so-called business. But nothing they share is related to the business, its products or services, etc. Whenever you are not sure if it is a pyramid scheme, always ask: * How do you make income from it? Do you have to rec

Share: About Scam

Scammers often pretend to be contacting you from or on behalf of the government e.g. Police Department, Anti-Corruption Agency, etc as well as a business you know e.g. a bank, or even a charity. They might use technology to change the phone number that appears. They might say: * you have committed crimes, you owe money or your family member has an emergency * there is a problem with your account and you need to verify some information * you won a prize or money but have to pay a fee to get it * your computer is infected Scammers want you to act fast before you have time to think. They might ask for your personal or financial information, threaten to arrest you, depot you, or sue you, your computer is about to die, or your account is hacked by someone, etc. DON'T GIVE YOUR PERSONAL OR FINANCIAL INFORMATION TO ANYONE. LEGITIMATE ORGANISATIONS WON'T CALL, EMAIL, OR SMS TO ASK FOR YOUR PERSONAL OR FINANCIAL INFORMATION LIKE YOUR PASSWORD OR CARD NUMBERS. If you need to contact a bu

How-To: Shop With Confidence

Online shopping is very common nowadays. Here are some tips you may find useful: 1. Shop on trusted sites / apps - e.g. shop on Shopee, eBay, Amazon, etc which are established. Both buyers and sellers are protected and it is easy for you to make a report in case of being scammed. Avoid buying from forum, Facebook, etc. An authentic online store or seller will have information such as who is the owner, who manage the online store, who is the service provider, contact information, retail store physical location, etc. Evaluate sellers. As long as you don't feel confident, don't buy. Too good to be true? Don't buy. 2. Buy from trusted sellers - Always visit seller's page / profile, browse thru the store, read the terms & conditions, policies e.g. return policy, etc. The most important thing is to check feedback from buyers. You wouldn't buy anything from a seller who looks new and unknown, no review, no selling record, etc, would you? 3. Shop on websites that have S

How-To: Make Certificates Using Microsoft PowerPoint

It is actually very easy to make certificates using Microsoft PowerPoint. There are plenty of templates you can choose and modify. 1. Choose Design and Orientation, either you want it to be Portrait or Landscape. 2. Choose Font/s and Size/s, you can BOLD to highlight name, certificate name, etc. Design the certificate, e.g. text alignment, you may as well insert your logo, etc. * Save a master copy, so you can re-use it for other names and certificates. Save as PDF if it is an e-certificate. Avoid full-color background so certificates can be easily printed out by holders.   Samples:  

How-To: Be More Secure Online

1. Use unique passwords for your accounts - e.g. emails, Facebook, etc. Lets say your Facebook account has been hacked, at least your email account is still safe because you are using different passwords for your email and Facebook accounts, and you are able to try to recover your Facebook account. Unique password also means difficult for people to guess, e.g. G89?klz01?8955hjk instead of password123, qwerty, etc. 2. Turn on Two-Factor Authentication (2FA) - this adds another layer of security to access to your  accounts. 2FA verifies your identity by another factor: something you own, something you are or something you know, e.g. using your mobile phone number - get a SMS with a special code to enter. By enabling 2FA, you will get a text message every time you or someones try to log into your account. 3. Enable passcodes - this adds another step when you are about to perform something, e.g. you will need to unlock your banking app by keying in your passcode before you can do or view t

Share: Morse Code

Morse code is a method used in telecommunication to encode text characters as standardized sequences of two different signal durations, called dots and dashes or dits and dahs. Morse code is named after Samuel Morse, an inventor of the telegraph. International Morse Code, also known as Continental Morse Code, encodes the 26 English letters A to Z, some non-English letters, the Arabic numerals and a small set of punctuation and procedural signals (prosigns). There is no distinction between upper and lower case letters. Morse code can be transmitted in a number of ways: as electrical pulses along a telegraph wire, as an audio tone, a radio signal with short and long tones, or as a mechanical, audible, or visual signal e.g. a flashing light  or even a car horn. Some mine rescues have used pulling on a rope, a short pull for a dot and a long pull for a dash. Morse code is transmitted using just two states - on and off. Historians have called it the first digital code. Morse code may be rep

Share: Phonetic Alphabet

The phonetic alphabet is a list of 26 words, for each letter of the alphabet. Each word represents the letter that it begins with. The phonetic alphabet is often used to clear up any misunderstanding over the pronunciation of letters, e.g. a “M” for a “N” or a “B” for a “P”. In certain countries, there is no standard phonetic alphabet. Instead, contact centres often use names and cities to identify letters, e.g. A - Adam, B - Boy, C - China, etc. Notes: * First introduced by NATO in 1955. * The NATO (North Atlantic Treaty Organization) Phonetic Alphabet is currently officially denoted as the International Radiotelephony Spelling Alphabet (IRSA) or the ICAO (International Civil Aviation Organization) phonetic alphabet or ITU (International Telecommunication Union) phonetic alphabet. * The NATO Phonetic Alphabet is also known as telephone alphabet, radio alphabet, word-spelling alphabet, or voice procedure alphabet.