Technology Lab

Technology Lab

Posted on Saturday, April 29, 2017
Blog Categories:
Practical Privacy, Sane Security by Stephen Barker, What this session isn't..., What this sessions is..., The Strategy - Harden your profile, Anonymize your network traffic, Obfuscate your DNS requests, Encrypt your network traffic wherever possible, Privatize your interactions, Harden Your Profile (laptop/desktop), Harden Your Profile (mobile), Anonymize Your Network Traffic (laptop/desktop) - VPN, TOR, Sidestep, Anonymize Your Network Traffic (mobile) - Opera VPN app, TOR-based browser, Obfuscate Your DNS Requests (laptop/desktop) - DNSCrypt, Obfuscate Your DNS Requests (mobile), Encrypt Your Traffic Wherever Possible (laptop/desktop) - HTTPS Everywhere, KB SSL Enforcer, Encrypt Your Traffic Wherever Possible (mobile) - Endless Browser, Privatize Your Interactions (laptop/desktop/mobile) - Use StartPage, Disable Third-Party Cookies, Use Incognito or 'Private Browsing' mode, Privatize Your Interactions (mobile) - Use DuckDuckGo as default search engine, Use Signal IM, Use Mr. Number, Privatize Your Interactions (social) - You're worth $54.16 per year to Facebook, Facebook Security Settings, Facebook Privacy Settings, Facebook Ad Settings, The Strategy - Harden your profile, Anonymize your network traffic, Obfuscate your DNS requests, Encrypt your network traffic wherever possible, Privatize your interactions, Additional Resources, Practical Privacy, Sane Security by Stephen Barker

A friend once told me that if everyone is sending envelopes, then sending a package looks suspicious.  Earlier today, I spoke at the 2017 DaVinci’s Faire & BarCamp with the goal of getting more people sending metaphorical packages since if everyone sent packages, packages would no longer garner suspicion.  Today, it is not completely unheard of for an ISP to send cease and desist notifications to people using TOR--a system that provides privacy and anonymity for online interactions.  And many systems out there, including CloudFlare and Atomic Secured Linux, are now purposefully blocking access to people using it.  While TOR is often used to mask malicious activities online, TOR is also used by universities and laboratories...simply being a private person and wanting to keep one's online activities private SHOULD NOT BE CONSIDERED A SUSPICIOUS ACTIVITY!

If web and internet services have a problem with malicious activities, then they need to improve those systems that...

Posted on Saturday, February 25, 2017
Blog Categories:
CloudBleed logo
Bloody Friday

Most of those in the development community learned yesterday that their attempts to secure their websites actually left them vulnerable to attack.  Beloved CloudFlare typically heralded as a method to shield websites from attack revealed it had a serious bug that leaked memory from "protected" sites that could reveal client IP addresses (one of the big security selling points of CloudFlare), private information, authentication tokens, cookies, passwords, private keys...basically everything that would keep a web developer up at night.  CloudFlare stated in a blog post yesterday:

The greatest period of impact was from February 13 and February 18 with around 1 in every 3,300,000 HTTP requests through Cloudflare potentially resulting in memory leakage (that’s about 0.00003% of requests).

However, it could have been leaking information as long ago as September 22, 2016.

What should I do?

The general recommendation has been to change your passwords,...

Posted on Friday, February 20, 2015
Blog Categories:
Content Management System

As a digital agency, our team members have been privy to the “back end" of dozens of other developers' websites. Content management systems (CMS)’s such as Drupal, Wordpress, and Joomla can be built in thousands of ways. One thing we get to see from behind these curtains is the huge difference between a good, architected, user-friendly administrative end, and a back end that ends up creating more work for busy marketing teams. It is very easy for developers to offer a budget-build "content management system" that doesn’t actually manage content at all. It's an important distinction; a site that lets users update their own website without code is not necessarily a "content management system."

An example of such a site is one that we manage for a client. After paying another agency for a content management system, our clients were still having a hard time updating their website and turned to boostDFM for help with their website and the digital side of marketing. After checking...

Posted on Tuesday, August 12, 2014
Blog Categories:
Digital Presence Management | boostDFM

BoostDFM now offers expertise in digital presence management and online public relations services. Even if you carefully monitor and maintain your website and business social media pages, your online presence is constantly being updated by other people - thanks to services such as listings sites, reviews apps and more. Fortunately, there are measures you can take to maintain these outlets, and BoostDFM is excited to offer a variety of management services.

Every business is different and has unique needs. We tailor each presence management package to fit our clients, but a sample of services may include:

Management of your listings on search engines and other business listings sites Regular audits of search engine results and mentions of your business on social media Online advertising campaign strategy, creation and management Digital crisis plans for unforeseen circumstances Management of negative reviews of your business on third-party sites SEO services

Contact us...

Posted on Friday, February 15, 2013
Blog Categories:
Search SEO search.png | boostDFM

Page Ranking is one of the most popular discussions when considering a new website. In fact, if I hear another CEO try to explain the importance of SEO to me one more time, I may shoot myself in the arm because it would be less painful. (Insert political joke here). Most companies look to the developers for making their website “#1 on Google” through the use of meta-tags, unique URLs, and other old development tactics that helped before CMS’s did it all for you. Successful SEO isn’t from your development.

Although it’s still important, it’s all about your social media and how it’s intertwined through your website. Here’s some important information in regards to social media and its affects on search. There are roughly 1.5 Billion social accounts by Facebook, Twitter, LinkedIN and Google+ users. 3.3 billion pieces of content are shared on Facebook each month and there are over 5 billion Google +1’s a day. A majority of content created on the Internet each day is from social...

Subscribe to Technology Lab