Internet Explore Security Vulnerability!

 

Security warning advisory was issued by Microsoft on Saturday about Internet Explorer web browser vulnerability. This bug allows malicious “remote hacker code execution”. It is currently susceptible to all versions of IE and there is no patch available at this point. If you are using windows XP you will not be able to apply the new patch since Microsoft no longer support windows XP.

We recommend if you are running windows as your operating system, use one of the following browser until issues has been resolved.

You can read more on this issue on:

Subscribe to our mailing list


Read More

Heartbleed SSL Encryption Vuluerability

We recommend changing your online accounts password to protect yourself from the most recently publicized SSL encryption vulnerability known as Heartbleed, this is not a matter to take lightly. Update All your online accounts (Social Media, Emails, Online Bank Account)
For more resource on how to update your password read our blog post –My Password is 123

Resource

Mashable gives more insight on major online website that are affected and you need to update your password immediately.

What is Heartbleed?

 

Read More

Authentic Imaging Launches Wyo-Ben’s Website

Wyo-Ben is one of the world’s largest manufacturers of high quality Bentonite Clay based products.
Wyo-Ben’s products are used globally in applications such as:

  • Oil
  • Gas
  • Water Well Drilling
  • Metal Casting
  • Environmental Construction and Remediation
  • Hazardous Waste Treatment
  • Cat Litter
  • Cosmetics and Pharmaceuticals

As well as many other industrial and consumer related products, Wyoming Bentonite is regarded as the highest quality Bentonite in the world.

Location

Corporate Office Billings, Montana

Industry
Global Manufacture – Bentonite Clay

Website Solution

  • Vendors Location
  • Drilling Fluid Calculations
  • Product Information

Visit Website: wyoben.com

Read More

My Password is 1234

I use my password for Facebook, Email, and my Bank account. One thing you should know about me is that, I have an online syndrome called “I care less about myself”. PASSWORD, PASSWORD how I love thee… you’re my online protector, but you are so hard to remember when I need you the most, so I created you to be simple, but you betray me to online hackers.

So enough with the Romeo and Juliet, on a more serious note, your password just like keys to your house should not be left in the door or handed to a stranger.

Online communication requires access walls, these access walls called password are keys to your personal private data. We make online purchases, access sensitive data and share information with friends online every day, it is our moral responsibility to protect not only ourselves but all other’s associated with our online accounts. I put together a basic guide to help you stay protected without all the frustration that comes with hackers.

What not to do

  • Do not use your name, child name, pets as your password
  • Do not use less than 8 characters for your password
  • Avoid using words that can be spelled out (eg. wife, school, love and password)
  • Avoid words that describe the website you are using (eg. Don’t use Amazon in your password when create an account on amazon.com)

What to do

  • A password must contain a Capitalize letter, number, keyboard symbol and must be 8 characters long
  • Get into the habit of changing your password frequently
  • Do not use the exact some password for every account you sign up
Read More

Feeling violated by a site hacker!

There is no worse feeling finding out your site has been hacked and feeling hopeless. If you have not fallen prey to a site hacker I edge you to read on.

Gone are the days when only large companies website was the target for hackers. In the past years search engines and web hosting companies have heightened their restriction on users that sends spam and build suspicious website that infest peoples computers with viruses. Hackers are resulting to more advance ways by targeting smaller companies website.

The most frequent method of attack these days is script injection.  Script injection allows anonymous hackers to take over your site and server without you knowing.  By the time you get flagged they have already done what they need to do with your site and server and on the move to the next victim.

How can I prevent my site from being hacked?

  1. The most commonly use are web forms. Any web forms that allow any type of script to be submitted to a server (database) can easily fall prey to a hacker.  To prevent this from happening ensure all your forms on your site have form validation that rejects script injections.
  2. Out dated software and plugin for both open and close platforms such Linux and Microsoft are what hackers first look at when they find your site. Make it a priority to keep up with updates to your software.
  3. A week password with less than six characters and predictable words is a recipe for hackers. Do not use your pet, personal names as your password. A strong password should have a minimum of 8 characters and contain a number, a key board symbol such as a ($%#~) and a capitalized letter. It will take a hacker a life time to hack a password if you put these steps in place.
  4. Secure your site pages with Secure Sockets Layer (SSL) a commonly-used protocol for managing the security of a message transmission on the Internet. Any page on your website that collects personal information should be secured. Understand hacking can occur wireless when you using your computer. Simply do not fill out any form that collects your personal information without an SSL encryption.
  5. Do not ignore server security updates and open source application upgrade release. Example are WordPress and Joomla platform require frequent updates.

Visit us online or call us today for a free website review on your sites vulnerability to hackers.

Read More

Is Apple losing its touch?

Is apple losing its touch? The new iPhone (iOS 7) 5s and 5c are in! One can’t seem to wonder if apple is being influenced by it’s rivals, Android and windows.  What is happening to the innovators of user experience, do I get the feeling intense competition is getting the best of Apple?

MG SIEGLER points out more insite on techcrunch.com

Read More

Why the new iPhone and iPad matter

Revolutionary?  Evolutionary?  Apple has become a machine at releasing new products within their iOS line ever since the original iPhone was introduced on June 29, 2007.   Producing products on a regular basis with a subset of upgraded features and software tweaks have been disregarded as evolutionary.  The retina screen was one feature I could personally argue had the biggest impact.  With the subsequent new release of the iPhone 5s, iPad Air and iPad mini let’s focus on the one thing that is future proof and makes a difference.   Apple has the first 64 bit processor in a smart phone.

64 bit processing and what it means

Apple’s new A7 chip was lauded as the first phone to have a 64-bit processor.   The redesigned iOS7 has been recoded to have its core suite of apps 64-bit compatible.  So?   You are used to smart phones and computers doubling their speed every 18 months and using terms such as dual-core and quad core in their processing endeavors.

64-bit means two important things

1.  An ability to add more than 4 GB of RAM to a mobile device

2.  An ability to calculate numbers much more efficiently, making tasks like encoding and decoding video, 3-dimensional modeling and switching between applications with ease.

How much of a jump-start did Apple get?

Samsung, Qualcomm, Intel and all of the rest of the big players in the mobile industry have stated that their new architecture will be 64-bit.   Analysts give Apple about 9 to twelve months before Android devices catch up.  Samsung has explicitly stated that their next version of devices will have 64 bit processors.

Read between the lines – Always

Desktop OS’s have been steadily moving toward 64 bit processing.  Even Windows XP, the stalwart component of most business enterprise environments had a 64 bit version.  Released in 2005 (8 years ago), it satiated the need for more RAM and speed.  The computer you are using today that has been produced in the last 5 years probably has a 64 bit OS and processor.  If it has more than 4GB of RAM, I can guarantee that.  As for the Apple faithful, if your OS version is running OS X Snow Leopard (2009) or later you are running on 64 bit architecture.

Apple is staying ahead of the curve to make one thing clear:  iOS devices are going to be competitive as productivity devices, blurring the line between entertainment tablets and business tools.  If there is an app that runs on your desktop, be prepared to have a port that runs on your iPad.    Will they replace high-end desktops used for video / graphic editing, accounting programs, etc.?  No.   Will they be a sufficient replacement for laptops and out of town meetings?  Absolutely.  To see this market strategy already in place look no further than what Microsoft is doing with their Surface Pro product line.

Developers Wanted!

Hi Apple.  We have worked within your iOS ecosystem for years.  Your policies and market structure are far from perfect.  On the other hand your brand and quality in hardware and software is unmatched. Xcode, the development software we use will become 64 bit as the default even though 32 bit will be supported for years to come.  We see your vision and are committed to this opportunity.   Authentic Imaging will begin coding 64 bit applications for iOS devices in the upcoming months.  Stay tuned.

Read More

How Do you keep up with technology?

So you go to buy a new phone, two days later there is a new phone release with additional features that makes the one you just bought outdated. Good luck exchanging it for a new one, it simply won’t happen. Addiction to new technology is the new norm for manufacturers and developers that feed on competition. Every new thing brought to the market has a new feature already in the production line. Consumers are very receptive to change and are always on the lookout for new technology.

What type of consumer are you?

Are you the one that holds off buying the next big thing? Or are you the one that can’t wait to sink your teeth in the next big thing? If you look on what is on the menu, technology only offers you two choices, slower adapters and fast adapters. Which one of them saves more money in the long run? This is out for debate.

When is it the right time to upgrade technology?

If you can prove an upgrade will save you time or money then you are due for an upgrade.

  • Examples of a phone:

i.      Sharing files
ii.      Taking photos
iii.      Navigation
iv.      Battery life
v.      Phone process speed

How to keep up with technology

You stand a better chance of keep up with technology by subscribing to news feeds that allow you to get information that matter to you the most. Use twitter, Google Plus, Linkin and Facebook to follow groups that interest you the most.

Technology website

https://news.cnet.com

https://www.technewsworld.com/

https://www.huffingtonpost.com/tech/

Search engines websites

https://www.searchenginepeople.com

https://searchengineland.com/

Read More

How To Add A Favicon To A Website

Favicon, or Favorite’s Icon are little images that sit to the left of a web page title and allows the user to easily recognize the site in a bookmark list. Adding a favicon to your website may be an easy process depending on the type of website you have.

If your site is running WordPress, then there are plenty of plugins that can easily add a favicon, All In One Favicon is a good plugin for most applications. If your site is not running WordPress, or if you would like to avoid using plugins (usually a good idea), then you can use the code below to add a favicon to your site:

Just make sure to change the link to where the image is hosted, you can use an image hosting site like Photobucket to get the link.

<link rel=”icon

      type="image/jpg" 
      href="link to where the image is located" />
[separator type='transparent' color='' thickness='' up='5' down='5']
Put the code in the top of your header file above the closing </head> tag.

Favicons are especially small images, about 35px X 35px, and you will need to edit the image to this size before trying to upload it. [separator type='transparent' color='' thickness='' up='5' down='5']

If you need help with this process, or any other web development services,
 contact Authentic Imaging, LLC at 406.322.3569
Read More

Pros and Cons of Website Templates

When it comes to web development, there are many ways to “skin a cat.” One of the most popular solutions for web development these days is web templates. Web templates come in many different flavors, but two of the most popular are WordPress and Joomla.

The benefits of WordPress and Joomla are many, including ease of use and powerful free tools. The drawbacks are considerable, however, as security flaws are a major concern for commercial and personal use of these software products. The issue of security is based around the fact that these software solutions are open source code and everyone can know what source code your website is built upon.

This allows people with malicious intentions to “break into” websites and add spam links or cause other problems like stealing data or destroying work. There are ways to secure the site more, one is to build a brand new software version of WordPress or Joomla specifically crafted for your project. This is not a complete solution to the problem, but it does limit security holes compared to a largely distributed free template. Additionally, there are security plugins such as Bullet Proof Security and Limit Login Attempts. These help with buttoning up some of the inherent security holes in WordPress.

Joomla is much more secure than WordPress, but does still have some security flaws. Mainly it involves people’s websites being hacked and taken over, but there are some things that can be done. One option is to install Joomla Security Scanner. Another option is to have a custom Joomla site built for you. When a new custom site is built on the Joomla platform with security in mind, most issues can be avoided.

Web development companies like Authentic Imaging, LLC can build you a custom Joomla or WordPress site that is very secure. Your site will be unique, and also incorporate many security features. The benefit of going this route is that the management of the content on your new website will be very easy and intuitive. These site updates can be made in a program feature called WYSIWYG  pronounced “Wiz-E-Wig,” which stands for “What-You-See-is-What-You-Get.” These editors are very familiar to many people as they are very similar to Microsoft’s word processor Word. This can make your web experience much less frustrating and much more productive.

For people looking for the most professional solution to web development, a custom scripted site is the best solution. Although the cost will be more, the security will be much higher on a custom built site. The ability to update information can be a little bit more of a learning curve, although WYSIWIG editors can also be added to custom coded sites. Custom sites are much more valuable from an enterprise angle as they allow the highest level of Search Engine Optimization (SEO) and Graphical User Interface or GUI. These features become more and more important when building a corporate business. If you would like help with any of these web solutions, please do not hesitate to contact Authentic Imaging, LLC with any questions at 406.322.3569.

 

Read More