The Introduction of the Vpn



Hallo friends we met again in this simple blog post. This time we'll have a little share information about VPN.

A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer to send and receive data across shared or public networks as if it is directly connected to the private network, while benefiting from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryptions.
https://en.wikipedia.org/wiki/Virtual_private_network

VPNs allow employees to securely access their company's intranet while traveling outside the office. Similarly, VPNs securely connect geographically disparate offices of an organization, creating one cohesive network. VPN technology is also used by Internet users to connect to proxy servers for the purpose of protecting personal identity and location.

Choosing a VPN

A VPN service’s main selling points are security and privacy, but privacy is interpreted differently among VPN providers. Just ask former lulzsec member Cody Kretsinger (a.k.a. recursion), how private his VPN service was.

Kretsinger used a popular VPN called HideMyAss and engaged in activity that linked him, and his online persona “recursion,” to several high profile hacks, including unauthorized access to servers controlled by Sony Pictures. As it turns out HMA keeps logs of users’ IP addresses and logon/off times. A UK court order was issued to HMA to turn over the logs related to the offending account, which were then used to identify and arrest Kretsinger.

VPN providers can log web activity over their network, but it is more common to see VPN providers log users’ IP addresses, logon/off times and bandwidth usage. This logging activity allows providers to identify individuals abusing the service for fraud and spam, but in doing so they acquire information that can be used to identify individual users.

You can be absolutely sure if a VPN provider is pressured to cooperate with authorities and they have any information to identify you as the suspect you will be up shit creek and you will be there without a paddle. No one is going to go to jail for you.

This is why some VPN services go out of their way NOT to log any information that could possibly identify their customers. They cannot be forced to hand over incriminating information that they do not have.

Why Trust In Your VPN Provider Is Important

Not all VPN service providers are worth your trust. Some diligently log your connection times, dates, IP addresses, keep track of how long you're connected, and some even keep an eye on the types of traffic that you send through their networks while you're logged in. They'll tell you it's in order to make sure you're not doing anything illegal, or anything that would damage their network, but that level of snooping does kind of go against the whole purpose of a VPN, doesn't it?

The best ones keep as few logs as possible, and aren't interested in what you do while you're connected at all. Some don't even track when you're logged in or out, and even if they do have to keep some logs, they purge them periodically in order to protect your privacy. After all, the reason you pay for a VPN is for privacy and security, and if they keep their own data, they're the weak link in that chain. Here's are some tips on how to research a VPN and decide whether they're a good match for you.

Read their Privacy Policy

It is mundane but it is so incredibly important when considering a VPN to read the company’s Terms of Service and the Privacy Policy, and these documents need to be in plain English not lawyer-eese. A VPN provider who legitimately cares about customers’ privacy will lay it out in black in white what information, if any, is recorded and for how long.

Good VPN providers state that they store “personal information” necessary to create an account and process a payment (for example: name, e-mail address, payment data, billing address), but state that they do NOT log users’ IP addresses, logon/off times, or bandwidth usage.

Great VPN providers go a step further to minimize the amount of “personal information” required by accepting bitcoin or other cryptocurrencies, eliminating the requirement for billing information. This further insulates the user’s true identity by requiring an as little information as an e-mail address to create an account.

An honorable mention must go out to VPN provider MULLVAD who do not even require an email address. Visitors to the website click “create account” and they are given an account number without entering any information at all.
Google their name and "logging" in the same query

It may sound simple, but it's actually really effective. You'll usually turn up the provider's own privacy policy (which, in the worst cases can be so buried it's difficult to find), which can answer the question right away. Some VPN providers are proud to say they don't keep logs, or that they only keep access logs in order to bill you for usage, or that they do log, but they purge daily or weekly. Some will try to dance around the issue by saying they keep "whatever logs are required by law," which really means whatever law enforcement has asked them for—which could be anything. Others won't address the issue at all—that's where the rest of the results come in. You'll probably find other sites and articles discussing the company's logging policies, which can help you figure out if they care about your privacy as much as they care about your security.

Bitcoin

With VPNs, the acceptance of bitcoins is also a critical factor. This gives you an indication of how seriously a VPN takes your privacy.
Don't be afraid to ask outright

If you don't get the answer you want from simple searches, contact them and ask what their logging and data retention policies are. Again, this is something you'd want to do with premium providers more than free ones—you don't want to spend your money unless you're sure what you're getting.

Beware US Based Providers

Faced with the sweeping powers afforded to government agencies (such as the NSA) by the post 9/11 Patriot Act, and to copyright enforcement bodies by legislation such as the Digital Millennium Copyright Act 1998 (DMCA), most US based VPN providers do not make any real pretence at protecting their customers privacy or identity.

A few, most prominently Private Internet Access, do claim to provide high levels of security by keeping no logs ‘whatsoever’, and by using shared IP addresses, which in theory makes identifying an individual user with any internet behaviour impossible. However, the following points should be considered:

    All US VPN companies are subject to the Patriot Act, and if the NSA is able to monitor all data collected by the likes of Google, Microsoft and Facebook, then it would be foolish to assume they cannot, or do not, monitor the servers of VPN companies such as PIA (who as we noted have a high profile).
    All VPN companies are subject to the Stored Communications Act (SCA) which can force a provider to keep logs on the activities named individuals without alerting them to the fact
    All VPN companies are subject to CALEA search warrants, which gives the FBI broad powers to conduct electronic surveillance by requiring that telecommunications carriers and manufacturers of telecommunications equipment modify and design their equipment, facilities, and services to ensure that they have built-in surveillance capabilities, allowing federal agencies to monitor all telephone, broadband internet, and VoIP traffic in real-time.
    All traffic that passes through the US communications backbone can be monitored, so any traffic that passes through a US server can, at least in theory, be monitored by the likes of the NSA. Although the contents of encrypted traffic will remain hidden, the NSA can collect metadata of a similar nature to that obtainable by ISPs.

The paranoid should therefore avoid any company even remotely related to the United States. However, we think that companies such as Private Internet Access are genuinely committed their customers’ privacy and anonymity, but have little faith in their ability to guarantee this on US soil. Using their overseas servers should be ok though, as US laws and organisations have neither the means nor jurisdiction to prevent logs from being discarded form servers outside the United States.

Cloud Computing Data Security



Cloud computing refers to the practice of transitioning computer services such as computation or data storage to multiple redundant offsite locations available on the Internet, which allows application software to be operated using internet-enabled devices.
Cloud Storage utilization impact resulting from the development of cloud computing is increasingly being utilized in the world. All States also have started to utilize cloud computing technology. This is supported by a growing network of internet the pervasive and increasingly cheap, as the community can enjoy this facility.

https://en.wikipedia.org/wiki/Cloud_computing_security

Cloud computing poses privacy concerns because the service provider can access the data that is on the cloud at any time. It could accidentally or deliberately alter or even delete information. Many cloud providers can share information with third parties if necessary for purposes of law and order even without a warrant. That is permitted in their privacy policies which users have to agree to before they start using cloud services. Solutions to privacy include policy and legislation as well as end users' choices for how data is stored. Users can encrypt data that is processed or stored within the cloud to prevent unauthorized access.


According to the Cloud Security Alliance, the top three threats in the cloud are "Insecure Interfaces and API's", "Data Loss & Leakage", and "Hardware Failure" which accounted for 29%, 25% and 10% of all cloud security outages respectively — together these form shared technology vulnerabilities. In a cloud provider platform being shared by different users there may be a possibility that information belonging to different customers resides on same data server. Therefore, Information leakage may arise by mistake when information for one customer is given to other. Additionally, Eugene Schultz, chief technology officer at Emagined Security, said that hackers are spending substantial time and effort looking for ways to penetrate the cloud. "There are some real Achilles' heels in the cloud infrastructure that are making big holes for the bad guys to get into". Because data from hundreds or thousands of companies can be stored on large cloud servers, hackers can theoretically gain control of huge stores of information through a single attack — a process he called "hyperjacking".
 
Cloud Storage provides ample storage media, here you can use it to store a wide range of purposes such as documents, presentations, photos, or videos. Not only from the hardware used, we can freely access the data in the cloud storage through other devices because applications now cloud has already spread in various operating systems of windows, linux, Cisco ios, and mobile. But do you know about data security in the cloud storage? below are a few key points lest our data that resides in the cloud storage secure & assured.



Data Protection
When we've decided for adoption or migration of data to the Cloud, that the note is how Cloud services providers provide protection against our data. By what method they do protectionism so that we are sure your data is safe, in addition to the data storage location is also an important consideration where this has to do with the Data Center. Certain data center they make certified/teraudit, for example, the location of the earthquake free, standard electrical resources 3 tier etc.
 
Security Control
After our data really protected, next is how the security of access to the data we (role), how the procedure so that only those who are entitled to access our data. Here, including the access of workers/employees at towards our data service providers.

Compliance
Standards that apply to providers of Cloud Computing Services, such as for data security using ISO 27001, for provision of the services wear ITIL, COBIT, Cloud Security Alliance, including international lawyers and Government Regulation. So if there are any violations would be easy in the completion
 
Multi-tenancy
One of the properties of Cloud computing is the resource sharing, well how when there is another tenant there is cheating or leaked, what effects against our data there, it should be considered. Because physically, our data could be there in one of the same physical media.

Security Governance
This is more to policy governance of service providers or us as a user of the services, should be spelled out and his governance paka what must be defined here.
 
The issue again warm is any outside electronic service provider must have data center, this is one government regulation related rules the data center. Same with us when you want to move the data to the Cloud, make sure that the data we have, because every country has its own way of doing and data and its own data center.

Before You Buy Drone



Drones aren't that complicated, but there are a few key features you should consider when you are shopping. There are also some key rules you need to follow when you take to the air.

Legal Requirements

You don't need a license to operate a recreational drone, but the FAA has rules you have to follow. The most important two: Never fly around or above people, and always keep your drone in sight. The FAA has a full list of safety guidelines for model aircraft that you should check before you take off. There are also restrictions on where you can fly: For example, within 5 miles of an airport is off limits. Mapbox provides a great interactive map of no-fly areas, and local RC (Remote Control) aircraft clubs may list fields that they use.

Drone Controls

Most drones use a remote control with two joysticks — a bit like an Xbox or PlayStation controller. One stick controls what's called the attitude of the quadcopter, including roll (tilting left and right) and pitch (tilting up and down). The other stick controls throttle and the rotation of the quadcopter. A good remote control should fit well in the hand, with sticks resting comfortably under your thumbs and providing a smooth, responsive feel that allows you to guide the quadcopter by touch.

Some models skip the remote control, or offer it as an extra-cost feature, and instead use a smartphone connected via Wi-Fi and a flying app. These apps often provide a live video view from the quadcopter camera. However, apps don’t allow the precision of real controllers: It is easier for your thumbs to slip, possibly causing a crash.

Construction and Repair

Despite what the ads tell you, drones crash all the time. A good drone will take an unplanned descent and ground interface (aka: a crash) in stride, without damaging the frame. It will also include shields to protect the rotors and electronics from harm.

Regardless, things still get broken sometimes. A good drone will offer a ready supply of cheap parts like rotors and struts to replace the broken ones, and will make it easy to swap these parts out when required. The same is true of batteries.

Batteries

Very few drones offer more than 10 to 20 minutes of battery life, so an easily swapped battery can give you more flying time without hassle. This tends to be a feature of more expensive models, with a spare battery typically costing more than $100. Cheap drones (under about $400) usually have built-in batteries that can't be swapped out.

Camera

Want to show off your aerial exploits? A camera, either built-in or add-on, can capture those dramatic vistas for posterity. Most budget models use the equivalent of a cheap webcam, capturing low-resolution video (usually 640 x 480-pixel resolution) to an internal memory card for later viewing.

More sophisticated models offer high-definition video capture or the ability to connect an HD action camera such as a GoPro. Some drones also offer first-person view (FPV), sending a pilot's-eye view from the drone itself to a phone or tablet. Some models offer video goggles for the ultimate pilot-seat flying experience.

Go-JEK startup for ease of transportation



http://www.go-jek.com/
This is one of the Indonesia applications startup quickly. Go-JEK-a social enterprise is leading the industrial revolution transportation-taxi. Go-JEK partnered with the riders experienced motorcycle taxis in Jakarta, Bandung, Surabaya and Bali & became the main solutions in the delivery of the goods, the message between the food, shopping and travel in the middle of a traffic jam.

Four cities that have already accessed Gojek is Jabodetabek, Bali, Bandung, Surabaya. Nadiem still secretive about where else the city expansion and how the target rider who want the induction until the end of the year. According to Nadiem, there are currently 200 carpenters who apply to be driver in Gojek.

"Obviously our target recruiting riders with the appropriate proportion to meet the needs that exist in the market," he explained without naming the exact figures.

Ease Of Application Services

As we know, to all consumers who are very necessary is an appropriate and transparent service. With the ease of booking and the service satisfactory.
In the presence of congestion in big cities such as Jakarta and other major cities, inspiring Nadiem Makarim to make startup applications GO-JEK. The taxi is a two-wheeled motor vehicle is indeed a very effective transport for mobility in the congestion of the city.
Community feel be facilitated by the presence of the service Go-Jek. Passenger transportation that relies on motorcycles that use applications in smartphones to capture customers. Live click, carpenters with green helmets and uniforms will go directly to the customers services between them.

Co-founder at once Indonesia Makarim Nadiem Gojek CEO States, since its launch in January 2015, the number of riders that are in the Gojek always increase. He said, up to now, the number of riders in Gojek has reached 10,000 people.

"We are proud because we become the start-up with the growth rate of Indonesia-made number one in Indonesia. Seen from the number of downloads of 500,000 more. Riders there are 10,000 spread over four cities Indonesia, "said Nadiem in press conference Gojek Street Safety, Friday (30/6/2015).

Ojek stub Nadiem-taxi is known as a modern and professional. This is due to his taxi had been equipped with GPS features. This GPS features with the position of taxi can be directly monitored through a smartphone. The modern concept of Go-Jek is also visible from the way of payment with creditcard (My Wallet).

In addition to the modern side, Go-Jek Indonesia also not forgetting the security factor is his priority. This Go-Jek security can be seen from the driver's ojek experienced and have permission drove. The driver Go-Jek also comes in the form of official uniform jackets and helmets that display corporate identity Go-Jek.

With this you don't have to worry about trapped and deceived, because you yourself can recognize the driver come pick you up previously also disclosed his identity when you order a Go-Jek. With motor and gear that ensures the security of traffic, sure Go-Jek wants the facilities and the services provided can satisfy the consumer.

Types Of Service

https://id-id.facebook.com/gojekindonesia
The main service Go-Jek course is available to take passengers to the destination. However, in addition to dropping off passengers, Go-Jek also serves some of the services, namely freight shuttle service (instant courier) service and food, shopping, booking tickets, etc (shopping service). The question of the tariff, no need to worry. In the application Go-Jek, the customers can find out the rates to be paid shortly before ordering the service between it. With all the practicality of it, Go-Jek instantly got the attention of the community.

Service-specific shopping, Go-Will only serve under spending of Rp 1 million. To find out rates and bases Go-Jek nearest your message, you will be able to find out by accessing the website Go-Jek (www.Go-Jek.com)

To order the G0-Jek, one need only call the hotline Go-Jek. After that you will be notified of the rates to be paid. If you agree, then the taxi will go to your location. However, now the message Go-Jek will be increasingly easy because bookings now already can be done through the application of Google's Go-Jek Play or Play the Store officially launched early January 2015 yesterday.

To activate the application after downloading, you must do the registration email and phone number. After that you can already start ordering Go-Jek. Applications Go-Jek itself since its launch has now been downloaded 15,000 times


Does not stop with the public serving customers, Go-Jek Indonesia now also enlarge its business network by cooperating with several companies. And to date, there are already around 40 companies which started their collaboration with Go-Jek.

The cooperation with this company is done with a purpose so that financial flows Go-Jek stay awake because with it Go-Jek could earn income from its loyal customers on every day. The current go-Jek indeed each serving the area of Jabodetabek, but going forward, Go-Jek through Nadiem hopes to cater to other major cities in Indonesia.




How to Remain Anonymous

https://www.torproject.org/
Tor is a magical browsing piece of software. However it does have a few limitations and you should keep these in mind. Tor is primarily focused on protection of data being transported. You also should use protocol-specific software (support software) to ensure sites you are visiting do not see your identifying info. You can use Torbutton while browsing to hold certain information about the configuration of your computer.

The Tor Browser Bundle is what you should be using, and the new version of this bundle includes  Firefox latest edition, since the programmers at Torproject.org do not have the time to constantly update the Tor browser to keep up with Firefox accelerated release schedule of updates. Torproject.org at this time does not recommend using the “Toggle” model of torbutton. Users are recommended to use Tor Browser Bundle, they should not install Torbutton separately.

Do not enter personal information

Also keep in mind that there is nothing Tor can do to protect you from a site gathering information from you that you purposely enter. In other words if you voluntarily submit your personal data to a website, there is absolutely nothing Tor can do in that case. You have broken the privacy bond by doing this so please do not give out personal information on sites you surf in the Deep Web. Protect yourself.

Alternative Services or Methods Tor is not the only method available online for browsing security, and we all know that nothing is foolproof. There are also services that will enable you to maintain anonymity, albeit at a slightly less secure level, and let us explore a few of these options.

Proxies: Proxies are basically services where users access different IP addresses to log in under using what are called Proxy IP addresses. When users log in under proxy IP addresses, it appears to others that their location is actually the location where the IP address is being hosted. Many users use these proxy addresses and they do provide some level of anonymous surfing. However, these proxy address lists are passed around and well known to many internet companies and they can easily detect if you are logging on via a proxy address. Also, you have the option of purchasing a separate IP address for yourself, a personal proxy IP, and these are certainly not as well known, but they suffer from some of the same vulnerabilities that other proxy IP addresses suffer from.

Proxies are really not that secure, as they can easily be detected by one eavesdropping on your browsing activities. They are considered amateur and low level by most experienced browsers of the Deep Web and most would not browse using only a proxy IP.

VPN Services. VPN stands for Virtual Private Network. VPNs are private networks that many corporations use to maintain security especially for their financial transactions. They are more difficult to “sniff” (where intruders basically intercept data on the server) and they offer a higher level of security than Proxy IP addresses.

Policy on Privacy? If you want to maintain total anonymity, or certainly a higher level of anonymity, one fear that people have is a subpoena issued to a host, which demands the host to turn over your browsing activity information. Not all companies will do this, and some will flat out refuse to hand over the information. One company such as this is Cryptocloud and another company who refuses to hand over information is iPredator. So be sure and keep this in mind when you are choosing a VPN host, if you should choose to go that route.

Combination is safest. Many surfers on Tor, of course are using Tor, which is a first step in the process of anonymity. But many of them take the extra step and also log into Tor via a VPN network. This adds an additional layer of security and also makes it that much more difficult for any govt agency or any nosy person to spy on your browsing activities online.

Take Care Bateray Smartphone



As advanced as any smartphone you have, certainly will not be useful if the battery problem.

Unfortunately, the problem of battery on a smartphone is very often occurs along with the usage time. The conditions could not have been avoided even though the user has been taking care of the battery well.

Here are some tips to identify the condition of the battery on the smartphone.
https://en.wikipedia.org/?title=Smartphone

1. see the visual appearance of the battery.

This can only be done on a battery that could be removed from the smartphone. After the battery is disconnected, see if the whole body of the battery swells and corrosion on metal battery.

Corrosion can be seen from the color of the metal being whitish or greeny. If these characteristics are seen, immediately replace the battery. Do not insert the battery back into the body of a smartphone because it can damage other elements on a smartphone.

This tip does not apply to smartphones-smartphone releases that do not allow the battery removable-pairs.

2. Do the rotary motion on the battery.

Lithium battery will experience a decrease in power each time the battery is empty but late refilled. Extreme weather can also accelerate damage to the battery.

To identify the damage, remove the battery and then turn the battery on a flat field. If the battery can spin smoothly, the battery condition can be said to be bad.

Again, this tip does not apply to smartphones-smartphone releases that do not allow the battery removable-pairs.

3. Observe how fast the battery runs out.

At one time, become abnormal if the battery was reduced 1 to 2 percent when not in use. If this occurs, observe the time it takes the battery from empty to full in the susceptible period of time.

If the battery becomes empty in just a few hours, but rarely enabled, users ought to be worried.

4. Using the tools pendiagnosa battery.

For iPhone users, can use application iBackupBot. This application is available for Windows and Mac.

Users only need to connect the iPhone to a computer that has installed iBackupBot. Afterwards, will inform iBackupBot details about the user's device.

Pendiagnosa the battery on the iPhone
To find out the condition of the battery, iPhone users can choose the menu "More Information" on the main view iBackupBot. Please note, the lithium battery is usually lost 20 percent of its capacity after 500 times refilled.

Battery Pendiagnosa on Android
For users of Android, users only need to press the code * # * # 4636 # * # *. Then, users will be able to view detailed information associated battery condition.

The fact that the batteries are the core elements of a smartphone cannot be. Without a strong battery, not smartphones would be working as expected. For that, the user must precisely in caring for the battery to make it more durable.

During this time, some of the tips that are often put forward to give the battery a long life countless difficult. For example, must turn off certain features, do not download certain applications, and other things that can forget the functions of the smartphone.

Well, here there are seven surefire tips and simple for users of smartphones to lengthen the age of the battery.

1. fill power several times in several stages.

As in real life, better run a couple of sessions in a sprint than a marathon run in one session.

To keep the battery cells so that they cannot "fed up" with the filling, we recommend charging is done in several stages. For example, from 30 percent to 60 percent from 45 percent to 79 percent.

2. avoid the battery is completely empty.

Extreme conditions are harmful to the health of the smartphone battery. Charging full for a long time is not good. However, let the battery completely empty more no good anymore. If it is often like this, then the resistance of the battery will slowly decrease.

3. remember! most good battery conditions while 40 percent.

On the percentage of the battery's condition is balanced. Not too full, not too empty. In this situation, do not suppress cell battery with charging. Better smartphones is used up to the percentage of the battery decreases slowly. Afterwards, before heading to empty, then the content of the resource.

4. do not place the battery in a hot place.

The battery would lose 80 percent of their immune if the user put it in temperatures of 60 degrees for a year. At normal temperature (25 degrees), the endurance of batteries each year also would diminish naturally by as much as 20 percent.

5. do not place the battery anyway in a cool place.

If you want to save the battery, make sure it is not in place with cool temperatures, such as a refrigerator. Its negative impact would be the same with the possibility if the battery is embedded in the place to experience the heat.

6. do not leave the battery in a long time.

If the battery is completely empty, in the State of cell battery will "sleep". If not quickly awoke, possibly its worst such cells would lose the ability to absorb power from the appliance charging. Then, when the battery capacity indicates 40 percent, users should already be ready-ready to do the refilling.

7. don't ever wish the battery could live forever.

Humans only live only while the battery, let alone smartphones. In fact, every year the battery endurance would soften. Although the user has to take care of the battery correctly, every battery have aged.

To that end, don't be sad. Willing bought a new battery for the sake of the health of the smartphone. Tips that have been presented are only able to lengthen battery life, not make it timeless.