Q & A: Expectations of Privacy, Security and Etiquette in Cyberspace

  1. What are “online communications”?

The term “online communication” refers to reading, writing and communication via networked devices.

  1. What level of privacy can I expect in my online activity?

I like to say, “none.” The exceptions are data you send using standard internet security such as “https” or SSL (secure socket layer) technology. Programs that encrypt your data are also available. Outside industry accepted security features, assume someone can see anything you place online even if you later remove it.

  1. Can online services track and record my activity?

Yes they can. Internet service providers associate your account with a specific IP address. They can see all the IP addresses and site names you visited. Their servers can track any web page you request. Internet Cafes can track all web pages requested also but do not have the name of the specific user because they permit guest or anonymous logins.

  1. What are Cookies?

Cookies are small programs, usually text files sent to you from a website you visited. They usually contain some user information about what pages or items on their site were of interest to you. Credit/debit card information should  never be stored in cookies. They usually have an expiration date where the cookie becomes invalid after a set amount of time.

  1. What are Web Bugs?

Web bugs or tracking bugs are embedded objects usually invisible to the user that allows the sender to check if the reader viewed a web page or email.  What usually happens is that the reader/user will open a page or email and the web bug will request an image of some type to be downloaded from a server. The server will then track/record this activity.

  1. What is workplace monitoring?

Workplace monitoring is a practice where an employer uses cameras, audio monitors, phone and computer monitors to watch over employees and presumably protect the company’s interests.  Many of these practices are legal, and some are not. There are ongoing lawsuits by employees who feel the company has infringed on their reasonable expectation of privacy.

  1. Can an online service access information stored in my computer without my knowledge?

The short answer is “yes they can.” When you request a page or file from the internet, it is possible that you will be sent some computer code or file that you did not expect or want.  Most often this practice is illegal and not done by legitimate companies. However, as mentioned before, the use of “cookies” is a generally accepted way of companies being able to better serve a customer and their use often goes unnoticed unless you block them.

  1. Can hackers get into my computer?

Again, the answer is yes. Quite often you fill see news stories about high security government computers being compromised by hackers. Stay current with all operating system updates and use of strong passwords and virus protection programs can minimize this risk.

  1. What is spyware and how can I know if it’s on my computer?

Spyware is a type of malicious software (malware) installed on your computer without your knowledge or consent. It will attempt to collect data from you such as account information, passwords and even keystrokes. Good anti-malware programs run frequently on your computer should help you detect their presence. One free program that can be downloaded for free is called Malwarebytes.

  1. What can I do to protect my privacy in cyberspace?

There are several things you can do. Have all anti-virus and anti-malware programs current and run frequently. Use strong passwords and change them regularly.  Avoid websites that are known for sending undesirable files to you such as porn and gambling sites. Sites that originate from outside the U.S. are more susceptible to misuse.  Make sure any financial information is only used with a secure website.

  1. What is Encryption?

Encryption is a way to scramble text, audio or video so that it becomes useless without knowing the key to restore the file to it’s original state.

  1. How programs such as PGP can protect your privacy?

PGP stands for “Pretty Good Privacy”. It is a program that can encrypt and decrypt emails and other files so that only you and those whom you designate can read/use them. PGP provides the user with a private and public key. Together they will be used to scramble and descramble emails or files so that they cannot be used or read by anyone else but you and those you wish to read/use them.

  1. What is Netiquette?

Netiquette is a term used to describe generally acceptable ways to communicate to others using the internet. It covers how you should act and treat others in online communications to be considered socially decent. An example is to never type in all capital letters or the reader will assume you are shouting at them. Another example would be refraining from using fowl language on a bulletin board service or chat room unless doing so is a well established norm.

Posted in Uncategorized | Leave a comment

File Compression for Web Design

On the World Wide Web, download speed and file size are everything. Being able to use file compression when developing a website can give your projects an edge. Web Designers are mainly concerned with the size of image files used in their projects. Since a Web Designer’s audience must download web pages, having a huge hard drive available will offer no advantage but file compression will.

There are 3 file types a web designer will most likely be working with. They are the JPG or JPEG, the GIF and the PNG files. We want to make our files smaller so that they load faster in a browser. At the same time we want minimum image degradation. There are generally 2 different types of file compression, lossy and lossless. With lossy, some image data from the original image is lost during compression while lossless does not lose any data.

Instead of getting into the details of compression here, it’s important to know what sort of images are best for each file format so you can balance minimum size and best image quality. GIF must be used with animation. This is also well suited to images that contain line drawings and simple graphics. JPG is good for photographs with limited contrast and screenshots of movies and games. PNG which usually is a relatively larger file size is best suited for photos with high contrasts, transparency or detailed diagrams.

For more detailed information, here is the site I visited for an image compression review: http://www.noupe.com/design/everything-you-need-to-know-about-image-compression.html

Posted in Uncategorized | Leave a comment

Ethics & Copyright

So, just what is copyright and what is that little © symbol we see so often? The symbol © actually represents “copyright”; that a work has been copyrighted. Copyright is the author of a work stating that this work belongs to him/her and do not use it without their permission.

Copyright applies to many things on the web. Software you create, links, images, articles, videos, emails and even html language sequences are protected by copyright. This means that other folks cannot copy or reproduce your work without your permission. Technically, you cannot forward someone’s email to you without permission!

The term, “Fair Use” is used to describe the conditions that you may use an original work without the author’s permission. Generally, when referencing a work such as an article, if you post a short amount of it and give credit to the author, you have not violated copyright. This falls under fair use. To parody a copyrighted character is considered fair use also. Fair use is difficult to fully define. It must ensure that you do not derive or diminish from the original work of the author or degrade the value of the original work.

The use of works clearly marked as for public domain will not constitute copyright infringement. If a copyright term has expired, the author has passed away or has lost copyright protection, it is considered public domain also.  Certain Federal Government documents that adhere to 17USC105 are also in the public domain and may be freely used.

Be careful when using anything you did not create yourself when designing pages for use on the web. Always assume a work is copyrighted if you are unsure. It’s good ethics to give credit to where credit is due and not representing other peoples’ ideas as your own.

~Vaxman2 ©2013

Posted in Uncategorized | Leave a comment

Letterhead and Envelope

Ltrhd-Final Envelope-Final

Posted in Uncategorized | Leave a comment

Corporate ID – Business Card


Image | Posted on by | Leave a comment

Web Dev Big Priority for B2B Spending in 2013

Less than half of US business-to-business marketers will be expanding their marketing budgets in 2013. However, over 70% of marketers surveyed have said they will increase their spending on Web Development this year.

Most B2B web marketing (87%) consists of content marketing to potential customers. B2B content marketing is a way of a corporation providing information to a potential customer that makes that makes them more intelligent. The theory is that an informed customer will build trust and confidence in your product and in turn patronize your business.

Full Article: http://finchannel.com/Main_News/Tech/122793_Web_Development_Top_B2B_Priority_in_2013/

Posted in Business | Tagged | Leave a comment

Logo B&W and Logo Color


Posted in Uncategorized | Leave a comment