A couple of time already, I had to go through the process of enabling WebDAV on Apache HTTP Server 2.4.x and even though it is a fairly simple thing to do, I always end up Googling around a proper working solution. Here are the steps… [Read more…]
I don’t mind advertising, as long as it remains unobtrusive to the end user. As a matter of fact, I am using ads on this blog. However, just recently Viber implemented the new type of video ads implemented on the Windows and Macintosh desktop Viber platform. These ads aren’t your usual standalone picture ads, these are video ads that tend to auto-play on their own along with the sound, which is especially annoying when one forgets to turn off their PC speakers. Unfortunately, Viber does not provide application settings to disable or control ads. So, here is how you can easily disable these ads on your Windows or Mac machine.
The following short article explains how to use Netsh command line scripting utility to add or delete inbound and outbound Windows firewall rules. [Read more…]
The technology is dramatically amending our workplaces. In this post, I touch on ethical dilemmas associated with electronic surveillance of employees. [Read more…]
In this article, I offer a couple of thoughts on what I believe to be the three most significant aspects of the successful research. I talk briefly about the definition of research first, then concentrate on describing the main characteristics and their importance. [Read more…]
The following article is a short visual on how to move remote desktop on Windows 10 from the default port 3389 to any other available port.
We live in a time when foreign nations no longer achieve supremacy by engaging in a traditional battlefield warfare. Most nations realized that there are considerable disadvantages to fighting the battle in the open by using the old-style weapons and mechanisms, which helped to establish an entirely new kind of combat, the information warfare. Instead of using heavy weaponry, the warfare operations are executed in secrecy primarily by leveraging the information and communication technology. As a result, the modern war has moved from a physical space into a virtual cyberspace.
In the following article, I concentrate on some of the often-asked questions topic connected to ethical hacking, the area of computing concerned with the discovery of security vulnerabilities that can potentially be exploited by real hackers. [Read more…]
The CrowdSourcing model allows the internet masses to partake in any profit or non-profit idea, such as solving problems (crowdsolving), finding lost items (crowdsourcing), or become a source of funds to startup businesses (crowdfunding). The following short ‘work-in-progress’ article looks at the history and growth of crowdsourcing and assesses the value of crowdsourcing in Canada. [Read more…]
The following article examines the influence of open learning podcasts on publishing and online income earning. [Read more…]
In this post, I will try to look at the three of the very common risks associated with the ability of business to manage its project costs. I identify risk, the cause and try to suggest a possible risk mitigation strategy. [Read more…]
The following short post is my perspective on the adequacy of the personal privacy laws and standards in Canada.
The issue of unclear law around the ‘fair use’ is well illustrated by the copyright situation, where Google Inc. introduced two new search products called Google Book Search and Google Image Search. These were the products, through which Google started digitizing the text and images of copyrighted and public domain books and for the first time expanded beyond indexing the online world of websites. It is also one of the most prominent cases where Google Inc. throughout many lawsuits with Authors Guild, always claimed ‘fair use’ as the reason for digitally scanning and storing million of books online. According to Judge Sprizzo (2017) presiding over one of the lawsuits, the Google claimed that they were simply only showing the “snippets” of the books. Do I think Google had a valid claim to fair use in the lawsuit? [Read more…]
Studies such as (Urbaczewski, A., & Jessup, L. M., 2002) suggest that controlling internet access (at least initially) is not beneficial for productivity, stating “evidence exists of a productivity vacuum occurring immediately following the installation of Internet access on worker desktops.”
Following post talks about the results of my SonicWall Phishing IQ Test. I also go over some of the notes I’ve taken during the test. [Read more…]