Life Without The Internet

Have you ever thought about life without internet connection?
If until now you can already feel the benefits of the internet, and all our life also hung with the internet. From the start for the purposes of work, get useful information, obtain the latest news to just to say hello to your friends through social applications and more.
life without internet
So what if one day just suddenly die internet. How would todays society fare without the Internet, if it suddenly collapsed or 'went off-line'?. 
Could you survive?
The tendency of humans to it difficult letting go of what he already owned. Because it seems it will be immortal forever until it seems can not be separated.
Until then we'll explore life without the Internet a little further, thinking about the impact on society, our daily lives and the places we work, whether employed or our own business.
How exactly the Internet Plug could ever get pulled is a complicated question, due to the expansive infrastructure that makes up the Internet. It would probably require the shutting down of every server and local DNS around the world.
Some people have spoken about a major virus infection spreading through all servers and computers, rendering them / the Internet in a paralyzed state.
There is also another wild theory where by the wind generated by huge solar flares will disrupt anything that carries current, from telegraph wires, anything metal, computers, servers etc.
You can read about this theory if you Google “Carrington Event of 1959” This theory is said to be predicted by Nasa

solar system
Solar storm will produce high levels of radiation and influence is huge for the magnetic field of the Earth. The radiation then undermine the whole electromagnetic waves on Earth and make a major disaster.
The explosion of the Sun cause electromagnetic radiation followed by radiation in the form of protons. The explosion also spur mass pebbles while letting the Corona, which is the plasma from the Sun that was blasted out into space.

High-energy particle radiation and pebbles while letting the masses storm related to the Corona of the Sun. High-energy particles will reach Earth within 1-2 days, while the electromagnetic radiation will reach Earth within 8 minutes.
Space Weather revealed that pebbles while letting the masses of Corona happens moves with a rate of 2,200 km/s towards the Earth. The amount of material that is released in the process can reach billions of pounds.
Diverse consequences due to high energy particles and pebbles while letting the masses of Corona that cause solar storm is need to look out for. Solar storm could lead to malfunctioning satellite, communications, and navigation.
The impact of the worst Solar storms have occurred in the 19th century, which at that time resulted in the disruption of Telegraph Network. Disturbances also occurred in 1989 when the Quebec area power outage of up to 9 hours.

Could you imagine Earth without telecommunications? Almost the entire mass transportation will be paralyzed, from train, subway, MRT, and of course aircraft. All forms of GPS-based navigation and related satellite will be hit by the outbreak. Mobile and radio networks will cease to exist.
How would having no Internet affect the general personal user? Well apart from every teenager screaming because they can’t log on to Facebook, it all comes down to how much we personally use the Internet and what for.
Some of us hardly use the Internet, where others pretty much live their life around it! Equally some actually live a completely New Life within the Internet like those who use Second Life.
Many of us use the Internet to communicate, especially those in the lower age brackets above 10 years. From email to chat forums, social networks, dating sites and even virtual worlds our demands on the Internet for social communication and networking are huge. So it’s easy to anticipate that a life without the internet would force people to turn back to grass roots and socialise and communicate on a very basic level.
My worry with this though, specifically within the lower age brackets is will the people who’ve grown up with the Internet around them be able to embrace social engagement on a grass roots level and know how to socialise?
Would this better enhance communication skills and language in relation to studies on how ‘Internet slang’ has merged into our language skills?
Would our ability to meet new people outside our immediate area be severed and thus affecting who we meet, socialise and interact with and above all whom we spend our lives with? How did you meet your partner? Was the Internet involved in the process?
We use the Internet to communicate more than ever and it’s become an integral part of any standard means of communication. So with no Internet our means of communication would have to adapt. I very much doubt we’ll be sending smoke signals, but letters would fulfil the hole e-mails left and phones would fulfil the gaps that instant messaging, chat and social media created.

It’s a simple observation that the Internet sped up the world and lives we live. We communicated quicker, we could buy and sell quicker and we could find information quicker. So with the dilemma of having no Internet we’d surely expect the world to slow down, in business, society and communication. Coping with this huge decrease in processing speed would have extended impact throughout the business and society worlds to a point we’d wonder how we ever coped without it.
Almost all businesses nowadays have some relationship with the Internet whether it’s a simple business listing or an online store. What implications would be put upon businesses across the world with the loss of the Internet?
Perhaps world wide recession, stock markets would collapse, millions of businesses go bust and millions of people loose their jobs?
The impact on businesses that utilise the Internet would be massive and the make or break factor would be if they could survive without it?
But there may be some advantages amongst this devastation; as consumers we’d probably start buying locally, enriching our local towns and shops. We’d look for local services and sustain local economies by trading within our immediate areas.
The loss of jobs that relate to Internet Business would be hard to digest. Jobs at our local super market working the tills would suddenly be in high demand as well as many other jobs that don’t directly relate to the Internet.
Above all we have to remember we got to where we are today without the Internet. The Internet was a technological advancement that excelled us into the 21st century and changed the way we socialised, did business and purchased goods.
It paved the way to the future and still has many exciting advancements ahead of it’s self. Witnessing the loss of the Internet is probably very unlikely, but either way I’m quite sure as a human race we’d adapt and persevere as we have done for thousands of years. 
Those who grew up with the Internet well established around them simply can’t comprehend life without it. There are however many of us who practiced life before it’s time and have experienced a life without the Internet.

Have reflected by you, there are our brothers who can life without electricity?
Then they too can live without the internet. And they are both fine, happy with his life.
The conclusion that a simple, happy life and how large the benefits of the internet for you.
Only you can answer it. How have the internet makes you happy?




Samsung Galaxy phones exposed to hackers

samsung galaxy is vulnerable
Every Samsung Galaxy device from the S3 to the latest S6 up to 600 million Samsung Galaxy phones has a significant flaw that lets in hackers. Researchers at NowSecure, a cybersecurity firm, say they told Samsung (SSNLF) about the vulnerability . Seven months later, nothing has been fixed. NowSecure CEO Andrew Hoog said that, on a well-established system that ranks cybersecurity problems from 1 to 10, this vulnerability stood at 8.3. NowSecure said it tested several Galaxy models on many different cell phone carriers. All were vulnerable. Assuming every Galaxy out there is the same, every Samsung Galaxy phone is vulnerable to hackers.

The vulnerability lives in the phones' keyboard software, which can't be deleted. The flaw potentially allows hackers to spy on anyone using a Samsung Galaxy phone. The problem involves the word prediction software used by Samsung devices. It's made by British tech firm SwiftKey, which Samsung installs in devices at the factory. NowSecure researchers discovered that the SwiftKey keyboard can be tricked to accept a malicious file when the software updates. Because of the way the keyboard is installed, that virus can access some of the deepest, core parts of the phone's computer system. With that level of access, a hacker can then do pretty much anything to your phone.

Neither Samsung nor SwiftKey have claimed responsibility for inserting the flawed computer code. In a public statement, SwiftKey said it only found out about the flaw. SwiftKey said "the way this technology was integrated on Samsung devices introduced the security vulnerability."
This fractured system causes frequent complaints from users, who must patiently wait for all new software: everything from new features to patches for dangerous computer bugs.

To calm down worried users, the British firm argued that this hack isn't easy to pull off. It involves particular timing. A hacker can only sneak into a device when the keyboard software is applying a software update. The company also said it's about to patch the issue through its Samsung KNOX service. "Updates will begin rolling out in a few days," the company said, although it's unclear whether all devices will receive the fix.

NowSecure advised Samsung Galaxy users to avoid insecure Wi-Fi, ditch their phones, and call their cell phone carriers to pressure them into a quick fix.
You can be exposed by using public or insecure Wi-Fi. But some researchers think users are exposed even on cell phone networks. This hack isn't easy. But it's a tactic for cyberattackers on a mission with lots of money and access WiFi or cell networks.
It also exposes high-level U.S. government officials. Samsung just earned the NSA's blessing for its Galaxy devices, which were approved for use by government employees. And the latest hack of federal employees shows they are valuable targets.








Security samsung knox

Samsung Electronics' Galaxy devices have been approved by the U.S. National Security Agency under a program for quickly deploying commercially available technologies.
The Commercial Solutions for Classified (CSfC) program only lists devices that have met the agency's security standards and may not necessarily translate into large government orders for the South Korean company.
The products selected under the program of the NSA and Central Security Service include the Galaxy S4 and S5, Galaxy Note 3 and Galaxy Note 10.1 2014 Edition under the classification of mobile platforms. Also included under the mobile platforms classification is Boeing Black, a smartphone designed for defense and security applications by the aircraft maker.

Samsung said it has been seeking security certifications from relevant government bodies across the world for devices using the Samsung Knox platform.
Knox is an Android-based platform that aims to enhance security of the open-source Android. Devices using the platform allow users to switch between a personal space where personal data can be stored and the protected Knox Workspace container.
Five Samsung mobile devices were included on the list of products approved for sensitive but unclassified use by the Defense Information Systems Agency (DISA) of the U.S. Department of Defense. DISA certifies commercial technology for defense use.




Sex, Lies and debt White House employees potentially exposed to Hack

White House potentially exposed hacking
White House employee hacked? As I have a post on the post yesterday. That the White House revealed that hackers had broken a second computer system in the office of personnel management.
The disclosure that hackers had penetrated a database containing such intimate and possibly damaging facts about millions of government and private employees has shaken Washington. Officials said they believed that a separate computer system at the agency was breached by the same hackers, putting at risk not only data about the federal employees, but also information about friends, family members and associates that could number millions more. Officials said that the second system contained files related to intelligence officials working for the F.B.I., defense contractors and other government agencies.
The hackers appeared to have obtained personal data from more than four million current and former federal employees in one of the boldest invasions into a government network. 

The data breach is the third major foreign intrusion into an important federal computer system in the past year. In an earlier attack,   some of the president's unclassified emails were apparently obtained by intruders. 
Sam Schumach, a spokesman for the personnel office, said that the F.B.I.’s incident response team had concluded “with a high degree of confidence” that systems containing information related to background investigations of current, former and prospective federal employees were compromise. 
A senior government official, speaking on the condition of anonymity, said that investigators became aware of the second intrusion while assessing the damage from the first breach. 
The official said the information apparently taken in the second breach appeared not to be limited to federal employees. The database contains copies of what is known as Standard Form 86, a questionnaire filled out by applicants for national security positions. The 127-page form can include medical data, including information on treatment or hospitalization for “an emotional or mental health condition.”

White House Office of Personal Management
The hacking of the White House Office of Personnel Management (OPM) could provide a treasure trove for foreign spies. The disclosure that OPM's data had been hacked sent shivers down the spines of current and former U.S. government officials as they realized their secrets about sex, drugs and money could be in the hands of a foreign government.
"The potential loss here is truly staggering and, by the way, these records are a legitimate foreign intelligence target," said retired Gen. Michael Hayden, a former CIA and NSA director.

A review of appeals of security denials published on the web shows the variety of information now in possession of the hackers, including financial troubles, infidelities, psychiatric diagnoses, substance abuse, health issues and arrests.
"It's kind of scary that somebody could know that much about us," said a former senior U.S. diplomat, pointing out the ability to use such data to impersonate an American official online, obtain passwords and plunder bank accounts.


President Obama was considering financial sanctions against the attackers who gained access to the files of millions of federal workers. Mr. Obama was weighing the use of an executive order he signed in April that allows the Treasury secretary to impose sanctions on individuals or groups that engage in malicious cyberattacks, or people who benefit from them. The personnel office has said that the number of federal employees and applicants affected could rise beyond the four million already reported. If the relatives and close contacts are included, the total number of people affected could be several times as high.
The order gives the administration the ability to freeze assets in the United States, bar Americans from doing business with groups that sponsor cyberattacks, and cut the groups off from American goods and technology.
Those steps include continuous, real-time monitoring of computer networks and the use of multifactor authentication, in which users are required to go beyond user names and passwords to verify their identity when logging on. Neither of those security features was in place at the personnel office before the attack last month.



Facebook Tracking Your Internet Activity

Facebook really is watching your every move online.
https://www.facebook.com/
If you use Facebook Messenger on an Android phone you might want to check your settings. The app tracks and sends your location to everyone you chat with -- by default. You can turn off location tracking and sharing by clicking the compass icon above the Like button in your chat threads. If the icon is blue, the feature is on. If you want to be safe, open the Settings tab within the Android app and disable location completely. Though the default is "off" on an iPhone, you can also disable location tracking in iOS by going into Settings>Privacy>Location>Services, and set the option to "Never."

The other problem, he adds, is the subtle placement of the feature within the app, making it easy for people to forget they're sharing where they are. Facebook already tracks your activity well beyond the confines of the main social network -- a fact that has helped land it in hot water in the European Union.

Whenever you linger on content in your News Feed -- that main section of the social network where you see things that your friends have posted -- Facebook pays attention, even if you're not "liking," commenting on or sharing anything.
In other words, when you spend time with content in your News Feed, Facebook will interpret that as a good thing -- even if you didn't click on anything.
Regardless, it does serves as a reminder: Facebook basically knows everything about everything you do on its platform.

Facebook trackers  "a request that a webpage tries to make your browser perform that will share information intended to record, profile, or share your online activity." The trackers come in the shape of cookies, Javascript, 1-pixel beacons, and Iframes.

For example, cookies are tiny bits of software that web pages drop onto your device that identify you anonymously but nonetheless signal useful behavior about your background interests to advertisers who might want to target you. Facebook uses these types of cookies to activate the "like" buttons on other websites.

In addition to invading your privacy, these tracking requests can consume large amounts of data.  And transferring lots of data takes time. Generally, the more tracking requests on a website, the slower that website loads. That's why DNT+ gets you surfing at 125% of the normal speed and with 90% of the bandwidth, compared to a browser without DNT+ running.

facebook
But it isn't just the website you are visiting that makes requests for information: online trackers from other companies hidden on the site do it, too. They act as third parties on your computer: you can't see them without privacy software, you probably wouldn't expect them to be present, and you probably don't intend to share your information with them.

They request information like your geographic location, which other sites you’ve visited, what you click, and your Facebook username.

In terms of what the "requests" represent, Facebook declined to comment because, in the company's opinion, the requests do not mean much unless you can see exactly what they are and how they are being used. Facebook's entire site is run off of JavaScript and other such tags that have an array of purposes other than tracking.

So, we set out to see just how much Facebook is watching our internet browsing activity. Using the Abine software, we tracked to what extent Facebook trackers increased for each new click. We started by cleaning out the browser cache and search history, and then went about using the browser like it was the start of a typical work day ...
Well, other than Facebook is everywhere, the Facebook trackers have fairly specific interests. According to our experiment, Facebook is most interested in these three things:
1. What you are reading on the web.
2. What you are linking to from social media sites.
3. What you are buying.



Women Startup Pitch Competition

Women Startup Pitch Competition
A startup company or startup is a business in the form of a company, a partnership or temporary organization designed to search for a repeatable and scalable business model. These companies, generally newly created, are in a phase of development and research for markets. The term became popular internationally during the dot-com bubble when a great number of dot-com companies were founded. Due to this background, many consider startups to be only tech companies, but as technology is becoming a normal factor, the essence of startups has more to do with innovativeness, scalability and growth.

Startup Pitch competition will take place again during the Startup Conference on May 14, 2015 in Redwood City. Join Women Who Tech for the first-ever Women Startup Challenge Pitch Competition. The 12 finalists from the Women Startup Challenge crowdfunding campaign will pitch and showcase their innovative and disruptive ventures that are solving problems for people, businesses, and the planet to a panel of investors. One startup will walk away with $50,000 in cash. Other prizes include a one-on-consultation with a partner from 500 Startups, pro bono legal services, and other startup-friendly services.

  1. Amplify Loud: a DIY website and online marketing toolkit for small- and mid-sized businesses on a budget.
  2. Fam-ess (which stands for Family First, Earn Always, Save Often and Spend Wisely): an app that teaches kids ages 3 to 15 the discipline to make spending decisions based on their willingness to earn and save, so that they are better equipped to sidestep debt as they grow. Fam-ess has a mission to teach kids financial discipline long before they go off to college or get their first job. 
  3. GeoHealth.US: has the goal of helping ignite kids with a sense of curiosity and excitement about STEM. They also work to share hyperlocal info with those interested in the impact of their environment on their health.
  4. Kicker: an independent digital news startup. Kicker provides snappy explainers with tweets, pictures, and videos that help you get informed and make a difference. They do relevant stories with substance, not clickbait. They note that they never drone on or screech; they curate and explain news and put it into helpful context.
  5. LGBTQutie: a progressive online dating and social networking platform that allows people to find meaningful connections, romantic relationships, and friendships. They note that they're the only site that exclusively caters to the full spectrum of LGBTQ sexual orientations and gender identities.
  6. MYOLO: Considering that nearly half of all borrowers don't shop around for a mortgage, leaving thousands of dollars on the table, and that women heads of household pay 0.4 percent more on home mortgages on average, Myolo is here to change that. They say, "We make it simple, easy, and dare we say it, fun, for anyone to apply for a mortgage."
  7. On Second Thought: an innovative messaging app that lets you take back text messages you regret before they are received on another person's phone. Whether autocorrect is waging a war on your phone or you've just had a little too much to drink, On Second Thought has your back. Replacing the phone's native messaging app, users can eliminate any awkward or damaging text situations with this app.
  8. PeerSpring: a civic-tech educational platform that helps students understand, apply, and master core skills through the practice of good citizenship and passion-based learning.
  9. Primary Book Club: an e-commerce discovery platform and resource for parents. They currently offer a subscription service for parents of babies, toddlers, and preschoolers. Each month, members receive a set of age-appropriate children's books selected by their team of early-childhood-development experts.
  10. Vijilent: strives to create technology that gives individuals and businesses impartial and informed opinions of peoples' fitness for sharing economy transactions. Unlike other opt-in or subscriber-based trust services, a Vijilent "V-Score" is based on predictive analytics of anonymous peoples' public records and public social media data. It's much like a credit score, only tailored for particular social transactions instead of financial ones.
  11. Virtue.Us: takes your purchasing data (from your email inbox) and maps research done by NGOs and sustainability experts onto it, giving you a distinct sense of how your purchases are impacting the world. You can think of it as "social impact analytics about your purchases, straight to your email inbox."
  12. Zidisha: P2P Microlending Without Borders: an online microlending community to connect lenders and borrowers directly across international borders, overcoming previously insurmountable barriers of geography, wealth and circumstance. Zidisha borrowers pay one lifetime membership fee when they first join, and thereafter only 5 percent for each loan. Lower costs mean that profits from the loan projects go to the borrowers instead of to the banks' administrative expenses.
These startups are the real deal, and it's about time that we fund more women-led startups.
They are the founders of a startup with the quality of the competition.
With the competition indicates that wanta can now compete with the male in the business.
There are still many opportunities for women to develop business capabilities in a startup, because the largest market share is a woman. So start a promising startup businesses for profit in the future

The creative Accelerator program for facebook marketing




Facebook has launched a “Creative Accelerator” programme in a bid to aid brands targeting consumers through their mobile devices.
The Creative Accelerator" is a program allows brands to reach consumers in countries such as India high growth, Indonesia, Turkey, South Africa and Kenya. This allows brands to reach consumers via Facebook on their mobile phone, whether in Smartphones or feature phones, will be in both 2 g or 3 g.

Srivinivasan is one of the people responsible for making sure that Facebook ads work, looks great, and tailored to different audiences around the world, especially in emerging markets such as India, Turkey, and Kenya. Srivinivasan says by visiting various countries, he and his team capture the nuances of how people use Facebook and their cell phones--including what the average bandwidth and connections-and then may alter their insights actionable advice on how advertisers should build their campaigns.
The creative Accelerator helps brands and their agencies make their advertising works on any mobile device and type of connection.

"When we travel to all of the different countries, it was amazing to see how many common patterns emerge and how many shades are doing well," said Srivinivasan. "But regardless of the type of device and the type of connection, the excitement of the people to be able to create and consume rich content-such as video or photo-do not reduce. Just because I'm a user feature phone with a bad connection, it does not mean that I have to see anything less interesting. "

So, build off of that, Facebook has created a product where people can avoid using their data plan by clicking ads on Facebook mobile and then have the advertiser pay for data sent them some kind of content, such as music or celebrities.
The creative Accelerator is the open platform of seven brand partners for more around the world. Official Facebook making more than half of the ad revenue Foreign Affairs, so that the work of the empathy and space Srivinivasan and creative team Accelerator is doing is more important than ever.
Facebook is also working in the countries to learn about differences across language, culture and technology to help build stories and serve seamless creative across devices.

It will also improve program targeting the bandwidth that was launched in August 2014 to allow advertisers to reach the people based on the network connection. The program was launched as people in countries with high growth visible leap of desktop and access the internet the majority of mobile devices. The program allows advertisers to deliver their messages only to those who can receive and allowed advertisers to target appropriate creative to the right people.
And thanks to the rapid adoption of mobile phones in countries with high growth, brand has an unprecedented opportunity to reach people with stories that are personal, relevant and meaningful.

It is very important to create campaigns that explain a variety of devices and mobile connection of people in countries with high growth used to access services such as Facebook. If you only build content that looks great on your iPhone or Android device high-end, You did not include the most potential viewers.
Just because you're building for all people does not mean that one size fits all. Facebook looks different on mobile features than it does on a smartphone. Creative specifications for feature phones and Smartphones that are different from the older newer devices. Campaigns that deliver the right creative for the right device will feel more relevant.

If you're building content that should work well on the mobile phone feature with 2 g connection, there is a better way to test the experience rather than using the feature phone with 2 g connection on its own. Empathy and attention to detail can go a long way toward improving the quality of the overall campaign.
Brands are now able to develop and send rich media advertising, such as video, to people in connection faster and more relevant pieces of content, such as still images, for those accessing Facebook on a weak connection.
Facebook is built around people and we want to help businesses create content that is important to people. The creative Accelerator is one part of our efforts in this area, and we look forward to sharing more information about jobs in the months ahead.

It will also improve program targeting the bandwidth that was launched in August 2014 to allow advertisers to reach the people based on the network connection. The program was launched as people in countries with high growth visible leap of desktop and access the internet the majority of mobile devices. The program allows advertisers to deliver their messages only to those who can receive and allowed advertisers to target appropriate creative to the right people.
Facebook partners with brands and agencies to ensure that they are on the low end smartphone able to seamlessly view content on their phones. Eventually campaign generates increased 25 points in ad recall and repair 4 points in purchasing intentions.


Unfriend Alert: Stealing your Facebook Credentials

Steal facebook account?
Wow surprising news. All know what facebook, because 75% of the people in the world use applications of that friendship.
What if you have face account in the steal?
https://www.facebook.com/
We must seek to improve the security of your computer and browse the internet safely.
Because the existing applications in our computer can be the reason of the leakage of personal information is very important.
Examples of application "Unfriend Alert" can steal our facebook login password.
Unfriend Alert is an application to find out anyone who has cut off the relationship of friendship with us? One method Social Engenering the cracker by utilizing the basic human weakness. Weakness in the form of curiosity about our friends on facebook.
Today everybody wants to know — Who visited my Facebook profile?, Who unfriended me from the Facebook Friend list?, Who saw my Facebook posts?, and many other features that isn't provided by Facebook by default.

So most Facebook users try to find out a software and fall victim to one that promises to accomplish their desired task. Hackers make use of this weakness and often design malicious programs in order to victimize broad audience.
Following I am going to disclose the realities behind one such software designed cleverly to trick Facebook users to make them believe it is genuine.
The app promises to send you an alert when someone unfriends you on Facebook. However, instead of sending unfriend notifications, it sends your login information to yougotunfriended.com.
 “But if you provide your login credentials, which seems a bad idea in the first place, the program is able to see whether one of your Facebook friends decided they had enough of you. Also the application does not show up in the list of Apps on your Facebook page, so you might easily forget that something or someone could be monitoring or even be using your Facebook account.”
https://press.malwarebytes.org/2015/06/09/warning-facebook-users-should-avoid-unfriend-alert/

UnfriendAlert, a free application that notifies you whenever someone removes you from the Facebook friend list, has been found collecting its users' Facebook credentials.
Late last month, UnfriendAlert was also classified as potentially unwanted program (PUP) which often displays unwanted advertisements and deceptively installs other malicious software and free apps when visiting some web pages in your Chrome, Firefox, and Internet Explorer, making you fail to block them.
If you have downloaded the app, it’s recommended you change your Facebook password as soon as possible. Here are the steps to successfully remove the software from your computer.
Security researchers at Malwarebytes have warned users of the UnfriendAlert app saying that the notorious app asks users to login with their Facebook credentials to activate unfriends monitoring and alert service for your Facebook profile. So users are recommended to uninstall UnfriendAlert App from your computer, and besides removing this, you are also advised to change your Facebook password as soon as possible. You can do this under "Settings —> Password —> Edit."
Facebook users who downloaded the “Unfriend Alert” application should be on alert because the app could have access to your login and password, according to Pieter Arntz of Malwarebytes Labs.
Always do some research before installing any third party application as your one single mistake could compromise your online security and privacy in various ways.


Computer Security Technology

https://securedb.co/blog/tag/encryption/
Computer security is a very important thing. To determine the required computer security computer security tips. Computer security awareness for everyone who always relate to computers and the internet is very important. Especially for those who use the internet for business and online transactions.
Computer security primarily needed encryption data security in dealing with its partners through the internet. For example, messaging application with chat or by email.
Privacy Security from every person in the surf is a human right. It takes an understanding of the elements of computer network security, including the security of personal computers.
Encryption computer security ever leaked by the NSA makes the public very surprised. Many Americans opposed to leaks of personal information by the NSA through the industrial giants such as Facebook and Google.

Encryption, is the process of changing information in such a way as to make it unreadable by anyone except those possessing special knowledge (usually referred to as a "key") that allows them to change the information back to its original, readable form.
Encryption is important because it allows you to securely protect data that you don't want anyone else to have access to. Businesses use it to protect corporate secrets, governments use it to secure classified information, and many individuals use it to protect personal information to guard against things like identity theft.
Espionage uses encryption to securely protect folder contents, which could contain emails, chat histories, tax information, credit card numbers, or any other sensitive information. This way, even if your comptuer is stolen that data is safe. 

http://www.huffingtonpost.com/2015/06/09/obama-encryption_n_7542070.html
A collection of tech industry giants like Facebook, Google, Apple and Microsoft, as well as civil liberties organizations and Internet security experts, sent a letter to President Obama warning of the unintended consequences of any policy meant to weaken the encryption technologies that protect Internet communications.
Obama administration officials have pushed the companies to find ways to let law enforcement bypass encryption to investigate illegal activities including terrorism threats, but not weaken it in a way that would let criminals and computer hackers penetrate the security wall.
While he recognized tech companies' efforts to protect Americans' civil liberties, Earnest, responding to a reporter's question, added that the companies "would not want to be in a position in which their technology is being deployed to aid and abet somebody who's planning to carry out an act of violence."
 
Critics in the technology industry are concerned that a back door for law enforcement in the United States would be a back door for everyone, including other governments and hackers. One Yahoo executive likened the proposal to “drilling a hole in the windshield.”
Google, Facebook, Apple and other tech companies have been moving to encrypt customers’ communications so that the government cannot monitor them without going directly to the customer. The companies’ efforts have been criticized by some in law enforcement who argue the toughened encryption will stymie their investigations.

The White House is weighing a proposal in which parts of the key to unlock digital encryption would be held by the government, and part would be held by the companies. That system was articulated by Michael S. Rogers, director of the National Security Agency, in a recent speech at Princeton University. He called for a compromise in the form of “key escrow,” where the government would hold onto part of the encryption key and companies would hold onto the other, and it would be secured with “multiple locks — big locks.”
But technologists say such a solution simply does not work. The White House’s own handpicked National Security Agency review group members, several of whom signed the letter on Tuesday, also recommended that the government support efforts to advance strong encryption.

The letter was signed by more than 140 tech companies and dozens of civil liberty, human rights and press freedom groups like the Electronic Frontier Foundation, Human Rights Watch and the Reporters Committee for Freedom of the Press. It was also signed by 60 security and policy experts including Whitfield Diffie, one of the co-inventors of the public key cryptography commonly used on the Internet today, and the former White House counterterrorism czar Richard A. Clarke, who was one of a handful of experts the White House asked to review its security policies after the revelations by Edward J. Snowden.

But security experts have long argued that the nature of encryption is such that there can be no middle ground between encryption which is unbreakable to all, including law enforcement, or encryption which contains some sort of flaw that can be used by anyone who knows of its existence, whether or not they are law enforcement.

An increasing number of communications products have “end-to-end” encryption, meaning even the company that produces the software can’t break the encryption on messages sent between its customers. Apple’s iMessage network and Facebook’s WhatsApp both use end-to-end encryption, for instance, while Google’s competing Hangouts product does not.
The letter argued that “strong encryption is the cornerstone of the modern information economy’s security,” and that the government should “fully support and not undermine efforts to create encryption standards in any way subvert, undermine, weaken or make vulnerable” commercial software.

Tech companies should “prevent encryption above all else”.