Skip to main content

Posts

Showing posts from 2015

Top 5 Safe Online Shopping Tips for the Holidays

Stay safe while shopping online this holiday season by following Symantec’s top 5 safe online shopping tips. Watch this short video to know what to look out for and do for safe online shopping. Don’t make the holidays the most wonderful time of year for the cyber criminals. Follow these simple safe online shopping tips and you’ll be a happy shopper, keep your information safe and keep the bad guys out in the cold. Learn more at https://www.staysecureonline.com.

Update to the latest version of your Internet Browser e.g. Microsoft IE or Edge, Chrome, Firefox, etc.Shop with SSL (HTTPS) to protect your session while online.Strong password, maybe it's time to update your password. It is recommended to change your password once every 90 days with a combination of alpha-numeric and special characters. For example, 2wsx)P:?1qaz%TGB. And don't share your password.Watch your credit card transaction, set an SMS or Email alert.If available, use Two-Factor Authentication using your smart p…

Older Internet Explorer will end support by January 12, 2016

Author: EM @ KING.NET
It's official. Microsoft older version of Internet Explorer will end of support by January 12, 2016. The last Internet Explorer (IE) version is 11 that runs on Windows 7 and Windows 8.1.
"Beginning January 12, 2016, only the most current version of Internet Explorer available for a supported operating system will receive technical supports and security updates. Internet Explorer 11 is the last version of Internet Explorer, and will continue to receive security updates, compatibility fixes, and technical support on Windows 7, Windows 8.1, and Windows 10.
What does this mean? It means you should take action. After January 12, 2016, Microsoft will no longer provide security updates or technical support for older versions of Internet Explorer. Security updates patch vulnerabilities that may be exploited by malware, helping to keep users and their data safer. Regular security updates help protect computers from malicious attacks, so upgrading and staying curren…

Savoury USA - Cooking Thermometer

Sponsored by: Savoury.com

Savoury USA - Cooking Thermometer our very own product please support us.

Add to purchase through Amazon here's the link: http://www.amazon.com/dp/B017SDXUSA

Before you serve that delicious food, check it with our Cooking Thermometer just to make sure.

Savoury USA Cooking thermometer with instant read for accurate temperature in seconds. BBQ Digital cooking thermometer automatically shuts off feature to conserve your battery power.

The best cooking thermometer making it perfect for indoor or outdoor use. Simply press ON, stick it and start checking the temperature.

Easy to handle all of your cooking needs.

Digital temperature range with both Fahrenheit and Celsius reading options for your convenience. Range: -58°F to 572ºF (-50ºC to 300°C)

Digital Meat thermometer comes with a protective storage case for easy travel and storage.

Don't forget our product is a 100% Amazon Money Back Guarantee so you can order with confidence. A simple way to say thank you f…

Enable BitLocker Encryption to your Workstation running Windows 10 Operating System

How to encrypt your entire workstation hard drive using Windows 10 Professional? This will save you sometime searching the internet for answers. Here's the step by step procedures on how you can encrypt your computer. Disclaimer: Always backup your important data before you proceed.

Related: How to setup BitLocker in Windows 10 Professional for Laptop.

I've tested it using Windows 10 computer, it should work for Windows 8.x version too.

How to Configure Computer to Enable BitLocker without Compatible TPM:  (Source: Microsoft Community)

Administrators must follow the steps below to configure their Windows 8 computers to allow enabling Bit Locker Drive Encryption without compatible TPM:
Log on to Windows 8 computer with the account that has administrative privileges.Assuming that the computer has been configured to display classic start menu, click Start and at the bottom of the menu in search box type GPEDIT.MSC command and press enter key.On the opened Local Group Policy Editor

Spear Phishing Email Attack

Author: EM @ KING.NET
I received four spear phishing emails attack this month addressed to some of our domain properties. Just like other spear phishing emails, they are look normal email message targeting specific organization (or individual) seeking unauthorized access to your computer.
Here's an example. The email address came from abuse@enom.com.org . First sign of this email is a spam because Enom don't use this email and domain name.
Domain ?????.COM Suspension Notice.
Dear Sir/Madam, The following domain names have been suspended for violation of the ENOM, INC. Abuse Policy:
Domain Name: ?????.COM (I removed the domain name)
Registrar: ENOM, INC.
Registrant Name: DOMAIN MANAGER
Multiple warnings were sent by ENOM, INC. Spam and Abuse Department to give you an opportunity to address the complaints we have received.
We did not receive a reply from you to these email warnings so we then attempted to contact you via telephone.
We had no choice but to suspend your domain name w…

How to setup BitLocker in Windows 10 Professional

This is a straight forward setup on how to activate BitLocker in Windows 10 Profession to encrypt the entire drive of your laptop.
In "Search the web and Windows" type BitLocker then hit the [Enter] key.It will ask you to save your BitLocker Recovery Key. I suggest that you save it to your USB drive or cloud storage like OneDrive, DropBox, Box, etc. Choose how much of your drive to encrypt.

If you're setting up BitLocker on a new drive or new PC, you only need to encrypt the part of the
drive that's currently being used. BitLocker encrypts new data automatically as you add it.

If you're enabling BitLocker on a PC or drive that's already in use, consider encrypting the entire drive. Encrypting the entire drive ensures that all data is protected-even data that you deleted but that might still contain retrievable info.
Encrypt entire drive (slower but best for PCs and drives already in use.Are you ready to encrypt this drive?
Encryption may take a while dependi…

What is a Premium Domain Name?

If you’re old like me and in the domain name business for quite sometime, you will see PREMIUM” domain names listed for sale in their website/blog, forums like DNForum.com or NamePros.com, and Facebook Domain Name Forsale group (https://www.facebook.com/groups/domainnetwork/). And you check the domain it doesn’t make any sense to you. Why they called it “PREMIUM” domain name? investors posting their “
What is a Premium Domain Names in your opinion? Here’s what I thought about premium domain names. LL.com LLL.com NN.com NNN.com are premium names in my book because they are in-demand. You can easily sell it. Even the .net and .org extension will sell in this category. Maybe in the future, other gTLDs extension will be consider premium domains. At this time, Registries have a pool of domains selling at “premium” price and at premium renewal rate. For example, using sex.any_extensions is considered registry “premium” with a renewal rate of $20K to $65K depending where you buy your domain.K…

Managed WordPress Hosting

You create your own dynamic site. We manage your setup, backups and security. Managed means easy. We do all this:  Automatic account setupAutomatic WordPress core updatesNightly backups w/ 1-click restoreDDoS protection & site monitoringOptimized WordPress serversSo you can simply do this: Build your awe-inspiring websiteSSL Certificates - Let customers know their private details are safe. Optional but highly recommended.Built for performance
Host your website on the platform built expressly to optimize WordPress, with high-performance coolness like load-balanced servers and SSD drives. Award-winning support
We have award-winning, 24/7 support ready to solve your toughest hosting issues, plus hundreds of WordPress videos and interactive walkthroughs. Keep hackers away
Your site gets the personal bodyguard treatment, 24/7. Our security team monitors, thwarts, and deflects so you can rest easy. Get your Managed and Secured WordPress Hosting today, visit Moscom.com Built-in Performance. We …

WordPress sites hacked due to Netrino Exploit Kit

If you are using WordPress for your personal blog or business website, you need to upgrade your current version to WordPress 4.3 immediately to secure your website against it's latest vulnerability.
"Neutrino Exploit Kit (EK) appeared on the scene around March of 2013 and continues to remain active and incorporate new exploits. In the beginning of July, Neutrino reportedly incorporated the HackingTeam 0day (CVE-2015-5119), and in the past few days we've seen a massive uptick in the use of the kit. The cause for this uptick appears due to widespread WordPress site compromises.
ThreatLabZ started seeing a new campaign where WordPress sites running version 4.2 and lower were compromised, and the image below illustrates the components involved in this campaign." (2015 Aug 24, Zscaler.com)
I love graphic presentation, it is easier to understand the security issue. Here's the complete Neutrino WordPress campaign provided by Zscaler ThreatLabz.

Our WordPress is fully m…

Web.com hit by credit card breach

Another Internet company Web.com credit card security breach. When you're online, you will never be secure no matter what their public relation tells you. Keep in mind "Security is a process, not a product", continuous security awareness and training will help you minimize risks.
Though I commend their security monitoring team to find out about the breach on it's early stage.
"On August 13, 2015, Web.com discovered an unauthorized breach of one of our computer 93,000 customers (of the company's over 3.3 million customers) may have been compromised. The company quickly uncovered the unauthorized activity as part of its ongoing security monitoring, shut down the access, and immediately began working with a leading IT security firm to conduct a thorough investigation. We have reported the attack to credit card processors and the proper federal and state authorities. Affected customers have received an email from the company notifying them that their credit car…

Hackers disclosed Ashley Madison user data

If you use Ashley Madison service in the past you need to put an alert to your credit card right away. And make sure your wife will not find out. Their slogan "Life is short. Have an Affair" really speaks for their service, too bad many of these female accounts are faked anyway. Yeah you been scammed and added insult to injury, you're information is out for sale to the highest bidder.
"The attackers, calling themselves “Impact Team,” threatened to leak registered users’ details unless Ashley Madison and its sister website Established Men were shut down permanently. Avid Life Media Inc., the owner of Ashley Madison, announced after the hackers leaked some sample data that investigations had been launched both by the company and law enforcement agencies." “Avid Life Media has failed to take down Ashley Madison and Established Men. We have explained the fraud, deceit, and stupidity of ALM and their members. Now everyone gets to see their data,” the hackers wrote …

Google new company name Alphabet using abc.xyz for their website.

Here's the announce from Google new company name Alphabet using abc.xyz for their website.

As Sergey and I wrote in the original founders letter 11 years ago, “Google is not a conventional company. We do not intend to become one.” As part of that, we also said that you could expect us to make “smaller bets in areas that might seem very speculative or even strange when compared to our current businesses.” From the start, we’ve always strived to do more, and to do important and meaningful things with the resources we have.


We did a lot of things that seemed crazy at the time. Many of those crazy things now have over a billion users, like Google Maps, YouTube, Chrome, and Android. And we haven’t stopped there. We are still trying to do things other people think are crazy but we are super excited about.

We’ve long believed that over time companies tend to get comfortable doing the same thing, just making incremental changes. But in the technology industry, where revolutionary ideas dr…

ROBOTIS MINI is a DIY robot kit

The ROBOTIS MINI is a DIY robot kit with an open-source embedded board, rechargeable li-ion battery, smart servos, and customizable 3D printable frames.


Product DetailsAmazon Sales Rank: #128153 in Toys & GamesColor: whiteBrand: Robotis Co.Model: 901-0046-200Number of items: 1Dimensions: 5.00" h x 7.50" w x 11.00" l, 6.00 pounds FeaturesIncludes 16 Dynamixel XL-320 servosCustomizable 3D printable framesControllable with an Android deviceCompatible with ROBOTIS DREAM framesAwarded the "Good Design" mark by Korea Institute of Design PromotionBUY NOW

How to play catch up with your retirement savings

I’m 46 years old, earn $115,000 and have only $3,000 in savings. 

What must I do to be able to retire at 65? — Shawn, Georgia

There’s no way to sugarcoat this. You are way behind where you ought to be in building a nest egg. Given your age, you should ideally have a bit more than three-and-a-half times salary, or roughly $400,000, socked away in retirement savings in order to be able to retire at 65 on 80% of your pre-retirement salary, according to the benchmarks in financial planner Charles Farrell’s book, Your Money Ratios.

So your chances of being able to retire at 65 appear to be iffy to say the least, especially if you want to maintain your current standard of living.

Where should you start? It would be great if there were a “Make Up For 20 Years of Not Saving” mutual fund you could buy that would churn out annual gains in the high double-digits and quickly build an impressive nest egg with minimal savings effort on your part. But we both know that’s not realistic. The fact is t…

Make Money Now. Resell Domains, Hosting, and other online services.

Make Money Now with the hottest Reseller Plan on going. Let Moscom.com put you in the red-hot domain name registration and Internet business. We've done the heavy lifting -- product development, 24x7 customer support, infrastructure -- we've even built your Web site. Choose the plan that's right for YOU! Here are just some of the FREE extras (up to a $505* value) you get when you sign up to become a Moscom.com Reseller!

FREE Reseller Web site Build your site in minutes using our exclusive Design Wizard. Customize text, graphics and links. Cart and payment processing built in! See sample siteFree Hosting with Website Builder In addition to your own reseller website, you also get our InstantPage website builder - the fast and easy way to create an eye-catching one-page website. Just personalize one of our stunning themes with your text, background and more and you're ready to go live on the Web in minutes!FREE Search Engine Visibility Easily prepare, analyze, optimize a…

Insect Invasion 3D Game

Insect Invasion 3D is a First Person Shooter (FPS) game wherein the player fights against Insect Invasion using his .50 Machine Gun to stay alive.

Official Website: InsectInvasion.com

For iPhone/iPad. Download it here: https://itunes.apple.com/en/app/id903685587
For Android. Download it here: https://play.google.com/store/apps/details?id=com.que.insectinvasion3d
Amazon App Store Download for FREE, please leave us positive feedback: http://www.amazon.com/KING-NET-Insect-Invasion-3D-Game/dp/B00M3QBQNY/

50 Content Management System

If you are not happy with your current content management system (CMS) you are not alone. Spending in this area is growing, with TechNavio’s analysts forecasting that the global Web Content Management Systems market to grow at a compound annual growth rate (CAGR) of 12.87 percent during 2012-2106. The increasing demand from small and medium-sized enterprises is said to be one of the key factors contributing to this growth.

The reasons for shopping for a new CMS are plenty. For starters, many organizations have simply evolved past their current CMSs, in terms of their expectations of what it can do for publishing content, personalizing end-user experiences, and analyzing and optimizing all the content they create and distribute. What’s more, businesses paying attention to this developments in this space want to not only keep up with the digital Joneses, but they also know the rapid pace at which innovation is happening to make content management systems a portal for their entire digita…

Hacked - Data breach of 4 Million current and former federal employees.

Hackers working for the Chinese state breached the computer system of the Office of Personnel Management in December, U.S. officials said Thursday, and the agency will notify about 4 million current and former federal employees that their personal data may have been compromised.

Source: http://www.king.net/chinese-breach-data-of-4-million-federal-workers/

Register your domain name before someone else does

An interesting blog from GoDaddy (Moscom.com Partner). This article applies to everyone who conduct their business online and even for your personal website e.g. blog or photos. Politicians and celebrities are making headlines for domain names they DIDN’T register — opening the door for others to launch websites attached to domains with their famous names. How can you avoid making the same mistake with your online presence?
You don’t have to register every domain name, but target the right names to reduce risk and increase visibility.Buy the 10 most obvious domains.Register names well ahead of a big announcement.Forward domains to relevant website and social media pages.Register domain names with a variety of relevant domain extensions (like .republican or .democrat).Check out the infographic below to learn more about how you can protect your brand online.

Source: KING.NET


Security Bug in ICANN Portals Exploited to Access User Data

The Internet Corporation for Assigned Names and Numbers (ICANN) announced on Thursday the completion of the first phase of its investigation into the impact of a vulnerability affecting two of the organization’s generic top-level domain (gTLD) portals. On February 27, ICANN shut down the New gTLD Applicant and GDD (Global Domains Division) portals after learning of a security flaw that exposed user records. The affected websites are only accessible to applicants and registry operators, and they are used in the evaluation and contracting processes. In early March, shortly after restoring access to the affected portals, ICANN noted that it hadn’t found any evidence of unauthorized access. However, after reviewing logs dating back to April 2013, when the New gTLD Applicant portal was activated, and March 2014, when the GDD portal was activated, the two consulting firms called in by ICANN to investigate the incident determined that some users had in fact accessed records that didn’t belon…

WordPress version 4.2 still vulnerable.

Most popular WordPress versions are currently affected.

A stored cross-site scripting (XSS) vulnerability available in the recently released WordPress 4.2 and earlier versions can be exploited by an unauthenticated party to run arbitrary code on the server; the security glitch is currently unpatched and proof-of-concept code is publicly available.

An attacker taking advantage of the flaw could take control of the targeted website by creating new admin accounts. Aside from the current WordPress versions, build 4.1.2, 4.1.1 and 3.9.3 are also affected. Comment text truncation issue still not fully fixed.

Discovered by Jouko Pynnönen, from vulnerability research firm Klikki Oy in Finland, the flaw is similar to the one patched in WordPress 4.1.2, after having been disclosed to the developer by researcher Cedric Van Bockhaven about 14 months ago, on February 23, 2014.

Bockhaven’s approach consisted in introducing a character in the message that truncates the text at a specific point, turni…

Google Search: Is your site mobile-friendly?

Starting April 21, Google Search will be expanding its use of mobile-friendliness as a ranking signal. Double-check your website are ready for this change by testing pages of your site with the Mobile-Friendly Test tool
 After you analyze your website you will see a similar result as show here.

GoDaddy Outage

Our company KING.NETand other million websitesgoes down for one hour today around 3pm EST because the hosting provider ... drumming ... GoDaddy is completely shut-down. This is not the first time GoDaddy had experienced an outages, read it at Mashable GoDaddy Gonefor details. 

It's unfortunate that some companies used GoDaddy for web hosting and email services too. In that case, their customers can't communicate with them using email, that's where Twitter really help out. They able to tweet the outage and inform their clients.

KING.NET is using Google Apps for email, so our outage is for our network of web properties e.g. Retune.com Domain Aftermarket, Moscom.com Managed Online Services, DCweb.com, ManassasPark.com, and other hundreds of sites. We moved to GoDaddy managed wordpress service last week for cost, speed and security. We got it all plus an outage. :)

If you're one of the GoDaddy customers, will you consider moving out of their hosting service? It is worth yo…

Alternative Domain Name Extension.

Did you know that 1000+ new domain names extension are now available to register at a very affordable cost? I actually stop calling it as domain name, it is more applicable to call it as domain string because the extension doesn't stop at .com .net or .org. You can register a new domain string like .social .ninja .website .rocks .guru .zone .buzz  .technology .photography and many more. It is a domain name personalized for your business or even for your hobbies. I recently registered Robot.Guru (disclaimer I'm still an amateur in robotics) for my hobby and to change a long domain name URL address for a short and memorable domain name is price less.
Just like the old domain name extension, you can use the new TLDs for your website and Facebook, Instagram, Google+ or Twitter page. You now have your own digital identity. email. You can use it to redirect to your existing website. For marketing, simply redirect it to your company new products and services. For personal, you can u…

GoDaddy accounts vulnerable to social engineering and Photoshop

GoDaddy's layered verification protections defeated by a phone call and four hours in Photoshop. I have some domain names, over hundreds of them in my GoDaddy account. Reading this article from csoonline.com by Steve Ragan is amusing, lack of a better word and not a harmful message.
"On Tuesday, my personal account at GoDaddy was compromised. I knew it was coming, but considering the layered account protections used by the world's largest domain registrar, I didn't think my attacker would be successful.
I was wrong. He was able to gain control over my account within days, and all he needed to do was speak to customer support and submit a Photoshopped ID.
GoDaddy serves more than 13 million customers, who in turn place 59 million domains under the registrar's management. They have thousands of employees working across the globe who help staff the support and operations teams twenty-four hours a day."
I can summarize the article for you but it is really nice r…

Google Leaks Whois Data for Over 282,000 Protected Domains

If you are using Google Apps, registered your domain name through Google and using WHOIS Privacy, continue reading. You're information might be open.

"Private information belonging to 282,867 domains registered through the Google Apps system became publicly available, exposing it to risks ranging from spam to identity theft.

Google Apps offers business organizations the possibility to purchase domain names from one of Google’s partners, benefits consisting in easy setup and management of the associated services.

Only records of renewed domains have been leaked. The domains have been registered through registrar eNom and security researchers said on Thursday that the number of records leaked represented about 94% from a total of 305,925."

Continue reading: http://news.softpedia.com/news/Google-Leaks-Whois-Data-for-Over-282-000-Protected-Domains-475710.shtml

According to NeedName.com, ID Protect is a tool to shield your information against phishing attack, domain identity …

How to choose a killer domain name?

When starting a business you need a matching domain name for your online presence. You want it unique and special, you want it short and memorable. Here a few tips from Entrepreneur website. Choosing a domain name is one of the most important decisions you will make for your business. Your domain name characterizes your business, labels your business, and will stick with your business for a long time. In most cases, you should choose a domain name at the same time you choose your business name. When your domain name matches your business name, you have a far better chance of being remembered while at the same time keeping your branding cohesive and unified.
Make it memorable. The brain has remarkable powers of memory, but the domain you choose should cater to these powers.
Unique. The best domain names are not an ordinary combination of words or phrases. They stand out in the memory because they are unusual.Visual. The more areas of the brain affected, the more memorable something …

Ground Survival 3D Game

The Ground Survival 3D Game is a First Person Shooter 3D Game. Your mission is to eliminate all threats and to stay alive. The soldiers will patrol and wander within the security perimeter. They will engage once they found you. Have fun!

A new update for FPS Ground Survival 3D Game, it is now available in Apple Store.

Here's how to play the game.
Go to http://que.com/survival/ web page, download the plugin to load the game.
Use WASD keys to move and your mouse to aim/shoot your enemy. Enjoy and stay alive.

Official Website:http://que.com/survival/
For iPhone/iPad. Download it here: https://itunes.apple.com/us/app/id963624583
For Android. Download it here: still in development ...

Play Online click here –> Ground Survival 3D Game


Hit the "Pause" Button... Before You Share Online

Very interesting post from USA.Gov. Please read and share this post to your family and friends.
Many of us share information on the Internet almost daily, so it's good to remember to share with care. The next time you are about to share information, photos or videos online, consider the possible consequences, especially if your content includes other people.
Before you click "send" and post online, remember: What you post could have a bigger audience than you think.
Once you post information online, you can't take it back even if you delete it.
Get someone's approval before you share photos or videos they're in.

Source: Hardworking.com