Passwords and New Jobs…

If you have a Facebook, Twitter, or any other social networking account, can you be asked for you account and its password?  Short answer, YES they can ask but you do not have to give it up…I imagine that depends upon how badly you need the job, also.  This does seem to be the big rave on the news, other than the Obama-Care challenge.

There is software that companies tend to use to sift through the internet to find out if anyone is talking bad about their company AND people have been fired for talking bad about the company that they worked for (note the operative term “worked”).  You have an obligation to not denigrate the company you work for and many of them have policies that reflect such a thing.  If you cross the line you should be held accountable…if only it were a perfect world where everyone was held to the same standard!  But anyway…

You have a right to privacy and there are certain lines that should not be crossed.  While on Facebook, I had posted the article “Should Companies be allowed to ask for your Facebook Password?” by Tuan C. Nguyen.  Someone answered with a comment essentially saying that if a company did ask for my password I could not work for them because they acting unethically (they want their passwords to be secure, but want yours?) and it would be a security violation of password sharing which is frowned upon in the IT community.  And he is definitely right…one of the first things you are taught is security & protection.

Until the next exciting adventure!




RFIDs Part 5

This segment is not actually Radio Frequency ID, but it is a related issue.  People are so hell bent on convenience that they, more often than not, fail to think of the long term and devastating possibilities.

Now you will be able to pay by using the smart technology within your phone.  there are, and will be more, applications granting access to your banking institutions to pay for your purchases.  Many of the loyalty card programs are looking into similar technology for purchase discounts.

What exactly are the ramifications for this in your life?  How secure is your phone and the signal it uses?  Most people do not even pass-code their phones, because it is inconvenient.  How inconvenient will it be when your account is wiped out?  Now your phone will contain access to all your financial data, all of your purchasing data, purchasing habits (i.e., food, clothes, technology, etc.)

By pushing everyone to use credit & debit cards the banking industry is really striving toward a cashless society.  In doing so, they are forcing everyone to make purchases with a flippant and cavalier approach and will cause much more debt spending in your life than if you were using cash.  A study was done (I heard about it on the Katherine Albrect Show in which a study was done when cash money is being used to pay people tend to be more mindful on the expenditures; whereas, with the airline industry they are no longer taking cash on flights and you are forced to use credit card and you are more likely to spend more with its use.  This is because most people do not want to spend such a small amount on a card and will be more flippant with its use.

It is already a well known fact that such technology can be used to monitor your actions, expenditures, and conversations.  With the advent of many District Court decisions which permit police to do so without any warrants.

I am always concerned when privacy is concerned…it is not alright when the tech savvy peeping tom down the street does such things, but it is legal when the government does it????? hmmmmmm!

SEE ALSO:  RFID Part 1, RFID Part 2, RFID Part 3, RFID Part 4

Here are some articles to view:



Internetworking Part 5

In Part 4 we discussed about the top three layers (Application, Presentation, and Session), in this part we will discuss the lower 4 layers of the OSI Model (Transport, Network, Data Link, and the Physical).

The lower layers, or the Transport Set, are for the transportation of the segments, packets, frames, and bits.

Transport Layer (Layer 4) provides for reliable or unreliable delivery and performs error correction before retransmit.  This layer segments and reassembles data into data stream by providing end-to-end  data transport service which creates a logical connection between the sending and destination hosts.

Network Layer (Layer 3) provides for logical addressing, which the routers use for path determination.  This layer manages device addressing, tracks the location of devices on the internetwork, and determines the best path available.

Data Link Layer (Layer 2) combines packets into bytes and bytes into frames, provides access to media using MAC address, performs error detection – not correction.  This layer provides for the transmission of data and handles error notification, topology of the network, and flow control.

Physical Layer (Layer 1) moves the bits between devices, specifies wire speed, voltage, and the pin-out of cable.  Sends and receives bits, some use tones, and others can use variations of voltage or signals

Data integrity is maintained through flow control whose purpose is to govern the amount of data sent by the sender.

Connection-Oriented Communication is where the transmitting device first creates a session with its peer system through a call setup, or three-way handshake.  The three-way handshake is a series of synchronization, negotiation, synchronization, acknowledgement, connection, and finally data transfer.

Part 1, Part 2, Part 3, Part 4

Secure eMail

I recently read a c|net article about an interesting web-site and its service.  The article is “This email will self-destruct…” and mentioned the services at, which permits a person to send a one-time message; after the url is accessed one time the information is destroyed and removed from use.  I was rather curious about it and queried Mr. Cipriani about what happened to the information, of which he verified that the information was removed from the system.

This has spectacular possibilities for secure email or messaging.  There are some applications which you can encrypt the message and then you could send via the password or passphrase.  You could just send out a one time message to a person.  In either case, you can determine how you wish to use it, but it is one of those useful applications that may be handy to you, one day.

Keep it on the back burner for now.–heres-how/