Tag: vpn

  • Technology contained

    Technology contained

    Over the past decade container technology has become a popular method for packaging applications in an effective way. Some developers believe is better than that offered by virtual machines and other technologies.

    Container technology has been embraced by the big cloud computing providers including Microsoft Azure, Amazon Web Services, and Google’s Cloud platform.


    Examples of the actual container software include the Apache Mesos, Docker, rkt (pronounced rocket), and Kubernetes.

    But what is container technology?

    Logically, it gets its name from shipping. Shipping containers standardize how goods are moved around. Goods get placed in steel shipping containers which can be picked up by cranes and fit into ships. They tend to have standard sizes.

    By standardizing the process and keeping the items together, your container can be moved as a unit and it costs less to do it this way.


    In computer terms, container technology is referred to as just a container: a method to package your applications so they can be run, with their dependencies, isolated from other processes.

    Container technology decreases the potential for problems when developers move programs from server to server before the program is in a state where it is saleable.

    When you use container technology to create an application, you can code everything using just one operating system and database. This makes the application quite easy to replicate as resources including memory and the central processing unit (CPU) are shared. This also makes your technology great for scaling and for working within the cloud.

    Out with the old…

    If you don’t use container technology, you can have a situation where a program runs well on one machine but has problems on your server. This common problem occurs when you move a program from a data server to a cloud server.

    Many issues can happen because of variations in machine environments. These include differences between your operating system, secure sockets layer libraries, storage, and network topology.

    So, computer container technology picks up all of your software and related parts which include dependencies, being libraries, binaries, and configuration files. They all get migrated as a unit, avoiding the differences between machines including operating system differences. This will also include underlying hardware that leads to incompatibilities and crashes.

    web scanner

    And, importantly, containers also facilitate the deployment of your software to your server. Advocates of using container technology say it is a much better tech to use than that which preceded it – virtual machines.

    In this case, one physical server would be used for multiple applications through visualization technology. Each virtual machine contains the entire operating system, as well as the application to run.

    The physical server then runs several virtual machines, each with its own operating system, with a single hypervisor emulation layer on top. By running several operating systems simultaneously, you incur a lot of overheads on your server as resources get used.

    …and in with the new

    Container technology allows your server to run a single operating system because each container can share that system.

    The parts of your operating system that are shared are read-only to not interfere with the other containers. Therefore, compared with virtual machines, containers require fewer resources of the server, and are much more efficient.

    You can pack many more containers onto a single server. Each virtual machine may require you to have gigabytes of storage. But each container running a similar program may only need megabytes.

    How do the containers operate?

    Containers are set up in an architecture known as a container cluster. Then, in a container cluster, there is a single cluster master, with the other related containers set as nodes, that are your multiple worker machines. The cluster master schedules the workloads for your nodes, and also to manage their lifecycle, and their upgrades.

    Containers allow programs to be broken down into smaller pieces, which are known as microservices.

    A major advantage of having a program as component microservices is that different teams can work on each of the containers separately as long as the interactions between the different containers are maintained. This facilitates faster software development.

    Containers are also flexible and can be orchestrated. Since the operating system would be already running your server, a container can be started and stopped in just a few seconds.

    Some containers within architecture can be turned on during peak demand, and turned down when not needed.
    The software can control this type of orchestration, and distribute the tasks among the container cluster.

    The way forward with the tech

    But is container technology overrated? Some people are concerned about the security around it.

    Because multiple containers share the same operating system, there are growing concerns that container technology is less secure than virtual machines. If there is a security flaw in your host kernel it will affect your multiple containers.

    Other software is being used to have more secure container technology. The use of isolated containers is, therefore, being constantly improved.

  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over billions of dollars.

    No free service can generate that amount of money out of goodwill and thin air. So much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.


    There really is no such thing as a free lunch. If you believe that all these online social platforms would keep it that way, then you are as naive as they are hoping you to be.


    Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally.


    And the simple fact of the matter is that in order for them to pay all their staff of programmers, developers, executives, lawyers, and other stakeholders. They need to be paid!

    What your data means

    Facebook, Google, Twitter, Snapchat, and any social media platform that has over 100 million users sit on a goldmine for advertisers.

    The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter.

    The commodity is simply you, the user. So, your preferences, habits, and views along with their personal data are analyzed via machine-learning systems to study behaviours and habits.


    The data, in turn, is used for constant revenue maximization. In some extreme cases, it is used for political, psychological, and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes. Opting out of marketing would give you true ‘free use’ of the service. But no profiteering company offers you that privilege today. The best you can get is a month’s free trial.”

    Your likes, spending habits, music preferences, political views, location and working habits enables marketers to present their goods and services.


    They can position their offerings (sometimes subliminally) into spaces where you are likely to indulge in them.


    Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Social network sites worldwide as of January 2018, ranked by the number of active users (in millions).
    Most famous social network sites worldwide

    Source: © Statista 2018

    How the mining works

    text-mining-icon-2793702_640


    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service. The terms get longer by the day (small print) that we don’t bother to read them.
    Microsoft envisioned this a decade ago and changed the way its operating systems work (with its Windows 8 series).

    Its operating systems are now more of a social, interactive, and information gathering system. Allegedly designed to “help you” organize things better.
    This is fostered by a voice-activated app called Cortana – all under one Microsoft account.


    Amazon has its own ways of data mining via your shopping habits and Alexa – is its own voice-activated search and information-providing device.
    Google (owned by Alphabet company) has the biggest stranglehold of the lot. They must, therefore, be the most cautious when it comes to data privacy and security.


    This applies especially with its partnership with Android, which makes it a requirement for you to use for all their devices to link all your data.


    These include phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies, etc) orders via the Google (Play)Store, and social media (Google+).


    You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.


    You are now having to give up your personal details to unknown affiliated marketers and partners of tech giants. They get first dibs on this data – and paying good money for it.

    Read more about Affiliate Marketing here

    Required by regulation

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers. Such things could be countered with a clause.
    They may have strategically stuck one in while you were busy posting selfies and liking random videos of cats.


    The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purposes. This can be facilitated by the use of artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    250x250

    It is possible for you to have full data privacy and absolute freedom from advertising on social platforms. This, however, comes at a ‘cost’.

    This was reiterated recently by the COO of Facebook who admittedly confirmed that ‘opting out’ would mean you will have to pay to use Facebook in the future.
    They had just not put this in place but will now forcibly have to make it a clearly visible option.

    The fact of the matter is we are in an era of Big Data, the Internet of Things (IoT), and AI. All of these require your data to ‘operate’.

    Data mining is here to stay

    Though many were reluctant at first, pretty much every company now has a Facebook, Twitter, or Instagram page. It serves as a platform to showcase and communicate with thier clients via the newly termed phrase ‘social engagement’.

    This has turned out to become a strong branding and marketing tool for them.


    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn, and so on.


    There is, in fact, nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser: Not many of us actively use ad-blockers: but your browsing data is being scanned and processed by external third-parties companies.


    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it! Along with some good plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.
    It will be interesting to see the outcome and verdict of the probe into the Facebook case.

    Rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers. Especially ones that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in the verification of marketers, data storage and data security laws (such as the new GDPR law) were long overdue. Facebook will now be the scapegoat to enforce data security laws on social media.
  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over millions and even billions of dollars in revenue. No free service can generate that amount money out of goodwill and thin air – so much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.

    There really is no such thing as a free lunch and if you believe that all these online social platforms – who may have started off with sole intentions to provide a free service, would keep it that way, then you are as naive as they are hoping you to be. Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally. And the simple fact of the matter is that in order for them to pay all their (global) staff of programmers, developers, executives, lawyers and other stakeholders – they need revenue.

    Facebook, Google, Twitter, Snapchat and pretty much any social media platform that has over 100 million users, therefore, sit on a goldmine for advertisers. The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter. The commodity is simply you, the user. So, your preferences, habits and views along with their personal data are analysed via machine-learning systems to study behaviours and habits for constant revenue maximization or in some extreme cases: political, psychological and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes – opting out of marketing would give you true free use of the service. But no profiteering company offers that privilege today – the best you can get is a month’s free trial.”

    Knowing your likes, spending habits, music preferences, political views, personal information including location and working habits is enough for any company or institution to cater their goods and services and position them (sometimes subliminally) into spaces where you are likely to indulge in them. Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Most famous social network sites worldwide as of January 2018, ranked by number of active users (in millions).

    Most famous social network sites worldwide

    Source: © Statista 2018

    text-mining-icon-2793702_640

    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service – which are getting longer by the day (and smaller in print) that we don’t bother to read them. In fact, Microsoft envisioned this a decade ago and changed the way its operating systems work (beginning with its Windows 8 series), to more of a social, interactive and information gathering system – designed to “help you” organize things better. This is fostered by a voice-activated app called Cortana – all under one Microsoft account.

    Amazon has its own ways of data mining via your shopping habits and Alexa – is own voice-activated search and information-providing device. Google (owned by a group called the Alphabet company) has the biggest stranglehold of the lot and must, therefore, be the most cautious when it comes to data privacy and security.

    This applies especially with its partnership with Android, which makes it a requirement to use for all their devices (phones and tablets) to link up all your data including phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies and games) orders via the Google (Play)Store and social media via Google+. You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.

    You are now having to (almost mandatorily) give up your telephone number, location, and other preferences indirectly to unknown affiliated marketers and partners of the tech giants who are getting first dibs on this data – and paying good money for it.

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers, because such things could be countered with a clause they may have strategically stuck in while you were busy posting selfies and liking random videos of cats making funny faces. The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purpose with the use of sophisticated and artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    N26_banner-300x250-EN

    Full data privacy, though not conceivable, and absolute freedom from advertising on social platforms is possible – but at a cost. This was reiterated recently by the COO of Facebook who admittedly confirmed that opting out of the terms to have your data sold or used would lead to you having to pay to use Facebook in future. They had just not put this in place but will now forcibly have to make it a clearly visible option.

    250x250The fact of the matter is we are in an era of Big Data, Internet of Things (IoT) and AI – all which require data to analyze. These platforms are thus here to stay and still serve their specific functions well. More importantly, they’re also the livelihood for many small-to-medium-sized businesses. Though many were reluctant at first, pretty much every company now has a Facebook, Twitter or Instagram page to showcase and communicate with their clients via the newly termed phrase ‘social engagement’ – a strong branding and marketing tool.

    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn and so on – there is nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser – not many people actively use ad-blockers unaware that even their browsing data is being scanned and processed always by external third-parties companies.

    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it along with some good (some free) plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.

    It will be interesting to see the outcome and verdict of the probe into the Facebook case and rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in verification of marketers, data storage, management and data security laws (such as the new GDPR law targeting businesses coming in May 2018 to the EU region) were long overdue, and Facebook will now be the scapegoat to enforce data security laws on social media.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.