To Output An “X” Pattern On Screen Window

Hi dear forum members,

I am brand new in C programming and have to program an "X" as homework (see attached picture).
The edge length of the "X's" should be entered by the user, ie the "X" should be arbitrarily large or small.

Can someone help me with the task?

So far I have the following code:

Threat Modelling Tools Analysis 101 – OWASP THREAT DRAGON

Abstract 

An interconnected world with an increasing number of systems, products, and services relying on the availability, confidentiality, and integrity of sensitive information is vulnerable to attacks and incidents. Unfortunately, the threat landscape expands and new threats, threat agents, and attack vectors emerge at all times. Defending against these threats requires that organizations are aware of such threats and threat agents. Threat modeling can be used as part of security risk analysis to systematically iterate over possible threat scenarios.

The motivation for this research came from the constantly growing need to acquire better tools to tackle the broad and expanding threat landscape present. One such tool to help to categorize and systematically evaluate the security of a system, product, or service, is threat modeling.

Protect Active Directory Logins to Secure Remote Working

In the past few weeks, the majority of businesses were forced to shift to remote working. This situation is seen as a great opportunity for hackers to find new vulnerabilities to exploit. When a remote employee logins to the corporate network, it actually creates an access point that can be exploited.

Active Directory (AD) is the core identity and access platform for organizations all around the world. The best way to secure your network is to protect the remote use of these AD credentials.

4IR Data privacy

Hi DW.

Well I'm very much interested in the data protection and also giving the best privacy to the public where we protect your passwords. I've seen something that Firefox had introduced to their browsers with also their Apps. This is called LockWise which is a tool to sync your passwords with your other devices.

Now as we are in the 4IR I personally think that such information shouldn't be shared purely with other devices because what will happen when you are not in front of those devices?

Worst of them all we all know that browsers don't encrypts the passwords so this to me opens a very huge security loophole because a person with access to let say your computer can see and copy your passwords as the browsers saves the actual passwords.

With that in mind check BRIWPED on YouTube see the demonstration on this live. I think as we are in the 4IR the only person should know the actual password is the owner only. I don't see a reason why would we still submit the actual password over the internet whereas we can only use the encryption systems like BRIWPED to ensure that only the salts is sent and on the server the encryption MD5 or encrypted RSA1 or any encryption is used so that even on the server there will be no actual user password is received but rather the MD5, RSA1 or any other.

This will make it more harder to hack provided that the user also have AV installed to his computer.

Tools like BRIWPED makes it easy to share like LockWise but not the actual password is shared but the salts which there can be verification to ensure that if the login is to be granted to a site or App but it from the actual user.

What also nice with BRIWPED is that they also have an App that gives you instant notification when there is a login activity and with the App you can instant stop that login.

It can also be used on any website. As we are in the 4IR sensitive information like your passwords should be kept secure and private at all times so only you yourself knows it and not even your browsers or server because what if your browsers or your server gets hacked?

What do you think of this, do you agree that such services and tools like LockWise and I also saw a video on YouTube with the smart key which also carries your passwords and you don't have to type the passwords on the browsers because these keys automatically submit or type it to the browser for you.

We've also seen what had happened to the contactless on the smart cards where hackers now target it and hack it without even touching you. So such things with also happen with the passwords if they are not encrypted at all times.

What is your view on these security issues that are within the 4IR?

How AR Will Change Digital Marketing

Businesses all over the world are trying to figure out how to make the most of their digital marketing campaigns. The rise of influencer marketing is quite significant, and many celebrities that charge hundreds of thousands of dollars per Instagram post. However, many companies are already interested in figuring out how to use augmented reality (AR) for their future marketing and advertising campaigns. While augmented reality might not be as prevalent as some have predicted, there are still powerful corporations interested in utilizing it to their advantage.

Of course, this doesnt mean that consumers will start purchasing products and/or services simply because they enjoyed an augmented reality commercial or advertisement of some kind. Augmented reality offers some incredible use cases in the digital marketing space, regardless of whether its trendy or not. Here are some ways that augmented reality will revolutionize the digital marketing space shortly.

An Interactive Customer Experience

One of the most incredible aspects of augmented reality is that it lets customers try out the product without actually purchasing it. One of the most well-known examples of using AR as a marketing tool is the fact that Ikea allows customers to actually see what products would look like in their home. Ikea - for those who dont know - is a European multinational group that sells billions of dollars worth of furniture annually.

In fact, Ikea rolled out an app in 2017 that allows users to see what different furniture would look like in their home, thanks to augmented reality. The app was built thanks to Apples ARKit, a toolkit designed specifically to help develop apps with AR technology in mind. Its easy to see how this was incredible for potential customers - as they could find out whether certain products matched the aesthetic of their home, or fit in a specific space or corner. In fact, the company claims that the app is 98% accurate, with respect to scale, lighting, texture, fabric, and many other metrics.

Fashion companies have been interested in AR technology for some time now. After all, if customers could actually try on clothes without trying them on; it could save larger fashion companies a significant amount of time and money. It shouldnt come as much of a surprise that two of the most well-respected fashion brands in the world, Dior and Gucci, are looking to AR to increase the consumers sense of connection and ownership with respect to clothes. Gucci also utilized AR extensively in their 2018 Hallucinations campaign, as well.

Improving Sales Material/Presentations

Augmented reality has a tremendous amount of potential, but the truth is that it isnt as well-known as other emerging technological trends. Specifically, 70-75% of individuals aged 16-44 are actually aware of AR as a concept. There is still work to do when it comes to awareness, but this also means that there are some concrete growth opportunities when it comes to impressing consumers and creating a buzz around brands, companies, and organizations. Regardless of who is aware or not - there is a good chance that youve already seen an AR ad before. There are already billions being spent on AR ads for two of the most popular social media companies in the world, Facebook and Snapchat.

We are all aware of how many pitches start with a Powerpoint presentation, and this has been the case for some time now. While there is nothing wrong with a Powerpoint presentation - what if you could actually see the product in front of you, in 360 degrees, thanks to AR technology? Its easy to see how this might be a more effective way to sell to businesses, and could potentially revamp the way that B2B marketers operate and engage with their prospective clients.

Offering More Information To The Consumer

Technology has allowed more information to be available around the world, and more information is demanded by the consumer in modern times. There are customers that want to know what exactly is in the products that they purchase, whether we are talking about a cardigan at a retail store or a salad in the local supermarket. Augmented reality can offer an information overlay that can allow consumers to learn more information about what they are purchasing, and in a more innovative manner.

In fact, AR is already being implemented in a space that you might not expect - museums. In fact, the Museum of Modern Art in New York already utilized the technology in 2018 for a Jackson Pollock gallery exhibit. In fact, AR technology was used to remix some of Pollocks most famous works, for a completely new experience for the museum-goer that would not have previously been possible. This was all accomplished through an app called MomAR Gallery, and museums around the world have reportedly been interested in the technology since.

Conclusion

Ultimately, technology is not just about a new experience that makes a consumer feel better, even if that might be part of its intention. Technological trends often serve to offer the consumer more personalization than ever, which makes a lot of sense in an age where we filter our own pictures before we post them on Instagram, and customize our smartphones to look and sound a way that brings a bit more pleasure to our lives.

Augmented reality will be a huge force in digital marketing, even if it might not have the kind of buzzword recognition of IoT or blockchain. While there are some that might be drawn to AR because it feels as though its futuristic; the truth is that AR can be used for training and educational purposes, as well. An AR startup by the name of Red 6 is already figuring out ways that AR can be used to make the military more effective, for example. Augmented reality might not be limited to the world of digital marketing - but it certainly feels like it will revolutionize it. It will be interesting to see how corporations and small businesses utilize it from there.

Bughunting and earning on this

I have a question for those who are looking for bugs and vulnerabilities for money. How are you looking for customers? Is it freelance or a permanent job or a hobby? I found one blockchain project that offers to find vulnerabilities for money. I will post the text of their proposal, if the administration does not mind:

In order to improve the security of the program code, we announce the beginning of bug-hunting.
Anyone who finds a new critical bug (vulnerability) will get 100 000
TERA.
Bug should be reported confidentially to progr76@gmail.com or telegram @progr76
TERA Foundation: https://terafoundation.org

What do you think of this?

TeamViewer requires upgrade

Living in California, I periodically need to log into my computer that's back in my home in New York. Not that often, typically just a couple times a year.

But today, when attempting to connect, I got an error message saying, "The remote TeamViewer is running an old version which is out of date. Therefore, you cannot connect ot this Version anymore."

Soooo, firstly, why is TeamViewer not backwards compatible?! Secondly, I haven't updated TeamViewer on my local computer either anytime recently, so both local and remote computers should be running versions of TeamViewer that were released roughly at the same time. Thirdly, why does TeamViewer not provide a way to remotely upgrade?!

#Frustrated.

How to Fix Paper Jam Issue in HP Printer

If someone's has the issues of Paper Jam in Hp printer then for solving it. users can apply this way to completely remove this issue. So now let's start this topic for resolving paper jam issues.
Download the Hp print and scan drive.
Afterwards, run this drive from your computer.
Once the Hp print and scan drive in open then click run and choose.
"If your printer is not listed, turn it on and click"
a screen displays prompting to turn on printer updates, click yes and go.
Further information keep continuing.

A Covert Channel Over the Telegram

We used to think of Telegram as a reliable and secure transmission medium for messages of any sort. But under the hood, it has a rather common combination of a- and symmetric encryptions. Where’s fun in that? And why would anyone trust their messages to the third-party anyway?

Covert Channels

There are many workarounds to transmit data between two users avoiding direct contact. You can use middlemen, crypto-, and steganography methods, broadcasting relay networks, and other extensions of existing protocols. But sometimes, it’s useful being able to establish secure contact using only officially documented features. Or, as one should say, set up a covert channel.

Data Privacy Is Confusing, And It Will Stay That Way For A While

In the modern world, it’s easy to understand that data is absolutely essential to many corporations and organizations. There is an ever-growing need to understand the needs and desires of your customer base, so that you may tailor your products/services/platform as much as possible to meet these particular needs. However, we also are coming to a point where human beings are beginning to realize that the way that their data is being used can be quite harmful. One of the most obvious examples is the Facebook-Cambridge Analytica scandal, in which data from Facebook’s user base was used to influence a United States political election.

It’s easy to understand the idea that “we are the customer†these days. There are literally billions of individuals that are active on social media platforms, whether they are using Facebook, Twitter, or Instagram. We know that we sign up for these services for free, and in return, companies might use or even sell our information to the highest bidder. It’s also understood that there are many different countries that have different laws when it comes to the Internet, and censorship, as well.

This makes for an interesting tug-of-war between tech companies and governments who want access to more information than ever. It isn’t a new problem by any means. India notably banned Blackberry in 2010, only to reach an agreement with the company regarding the interception of messages in 2013. The tech companies might not be excited to give information to these governments, but they also seem to understand that entering new markets has its price. The truth is that sometimes that price is your own internet privacy.

We now have to discuss what exactly is private, and what isn’t. There are all sorts of different reasons for human beings to use social media. We might take to Twitter to voice political opinions that aren’t necessarily popular, and hide our identity in hopes that it doesn’t have any actual personal repercussions. Employers, in some cases, can actually fire employees for what they say on Facebook. After all, companies have their own policies that have to be followed. Many of us understand that we have the right to speak, but that others have the right to challenge or dissect that opinion, as well.

One of the biggest issues regarding data privacy and cybersecurity is the fact that it affects almost everyone. For example, 3 billion Yahoo accounts were reportedly compromised in 2013, and the company was able to suppress just how extensive the hack was. There are other constant examples of data breaches surrounding some of the most powerful and influential corporations in the world. The Equifax hack compromised sensitive information for over 100 million people, and a government report suggests that it was an attack that lasted for over two months. Criminals and corporations are involved in a never-ending race regarding technology, privacy, and what truly is “our dataâ€.

More Implications And Consequences Than Ever

The battle, however, is getting more pronounced than ever. Technology is changing, which allows for information to be stored on the cloud, or blockchain, which might make it more secure, but also has its own drawbacks. One clear situation where human beings are forced to understand the concept of privacy involves smart home devices. We now can speak to devices to access certain information, content, or data, whether it involves asking our Amazon Echo to play a playlist or a Google Home smart device to turn our lights off.

When we speak to these devices, are our conversations private, and do they fall under that category? After all, we are in our own actual homes (many times) during these conversations. While law enforcement normally requires a warrant to enter a home, what if these smart home devices are recording conversations during a specific crime? Last year, a judge ordered Amazon to turn over recordings regarding a double murder case. This ushers in a new era where we now have to consider whether we have privacy from our own devices, which might be surreptitiously recording our conversations.

Where’s The Line?

It also might be easier to consider privacy in an extreme situation when someone is murdered. How about when the incident is a bit more innocuous? If you consider that an Amazon Alexa recorded a private conversation between a married couple and sent the conversation to an individual on their contact list; it is easy to see how data privacy is clearly in jeopardy in a new and frightening way. What was said during that conversation? If smart devices record conversations between two business partners, and send it to a business associate, is it responsible for whatever the consequences are?

What if recorded conversations lead to divorces, or the termination of business agreements? Amazon might be a powerful and influential corporation, but surely they don’t have the right to interfere with our personal and professional affairs like that. In this case, the individual who overheard the conversation contacted the couple and warned them to unplug their Amazon devices. What about situations where they actually WANT to overhear the conversation? If you consider that 10% of Americans already own a smart home device of some kind; it is easy to see how this is an issue that already affects millions of people.

We seem to understand that there are repercussions for illegal actions. For example, if someone was to post the physical address of another Internet user, this would be called doxxing, which is illegal in the United States. The concept of “doxxing†refers to publishing otherwise private information of an individual. However, there are many different states that are still arguing about whether doxing is truly a crime. For example, Kentucky recently passed a bill declaring that doxing is illegal specifically for minors. The bill was passed after a particular incident regarding a student went viral. Todd McMurtry, an attorney for the student, pointed out how social media platforms often speed towards the exposal of a certain identity without thinking about the consequences. He stated: "There are no brakes on Twitter," said Todd McMurtry, an attorney for 16-year-old Nick Sandmann, whose interaction with Native American protester Nathan Phillips went viral in January. "Twitter itself barely has the capacity to monitor its own activity. To put some weight back on the citizens so that they can help fight back when they are doxed would be great to make up for the fact that Twitter barely does anything."

One of the main issues regarding data privacy is how much tech companies control information versus whether the government should step in to protect the right to privacy. However, it’s hard to deny the influence of Silicon Valley over the United States government. While it is true that Facebook was grilled by Congress over the Cambridge Analytica incident, does that mean that any meaningful action was taken or parameters established? There are many that suggest that the CEOs of these companies don’t actually care much about data privacy, and understand that it is leverage for massive profit.

We might think of doxxing someone as a harmless act, but the truth is that it has very real consequences for many people. There are even situations where gamers “swat†each other, which has led to actual deaths. In one such incident, a California man found out the address of a certain individual thanks to a video game dispute, and made a fake 911 phone call claiming that someone at that address had “hostages and a gunâ€. This resulted in the death of an innocent man, and the California man was sentenced to 20 years in prison. While there are some that might defend prankster behavior, the truth is that a “prank†resulted in an actual murder. As a result, the data privacy must be examined within the context of the fact that an innocent man lost his life because his information was exposed.

There are also others that understand that data privacy often means privacy of our most intimate moments. If an ex-boyfriend or ex-girlfriend threatens to post a sex tape on a social media platform; this is a very real threat that might affect our personal and professional relationships tremendously. How do revenge porn laws fit into our data privacy regulations? The UK might have taken steps to pass data privacy regulations last year, but what about the rest of the world? How do we determine whether it’s time for people to be sent to prison for violating data privacy, while still recognizing that authoritarian governments can use this logic to censor and filter out dissent?

Data privacy will only be discussed more and more as we move towards the future. We now have to worry about deepfake technology, which means that we have to not only worry about our own privacy, but our own image being misrepresented to the point where pornographic videos can be created. San Francisco seems to understand that data privacy includes not allowing the government to recognize our face, but will other cities, states, and countries agree with this kind of logic? It will take a tremendous amount of time and effort to sort through the technological implications of data privacy, and understand what exactly should be in the public sphere and what shouldn’t.

The SIM SWAP STORY. If you use your phone for email and more please read.

For those very new to this area, please google SIM SWAP and discover a very nasty security issue with all phones we use today. At first glance the new security researcher might think I'm exaggerating. Do your own research and tell me you don't find this to be one of the most foul, nasty exploits I've seen in years.

This exploit was recently used to highjack a writer's phone at https://www.zdnet.com/article/sim-swap-horror-story-ive-lost-decades-of-data-and-google-wont-lift-a-finger/
His case is still developing with loss of accounts, tax returns he stored on the Clouds, and a 25,000USD Bitcoin purchase.

And we're not talking thousands of dollars in losses but millions. Take for instance an over 23 million USD dollar loss at https://www.vice.com/en_us/article/pawwkz/bitcoin-investor-sues-att-23-million-sim-swap-hack

The current state of affairs appears to be DENIAL by the carriers that this is a problem. You can do your research and if you are like most I've talked to about this, it will shake your faith in all things smart phone and cloud based. So many are using their phone as their wallet and for now, until there are lawsuits that cost the makers of this disaster lose a few billion they won't see a reason to fix it.
SIMSWAP.png

Intrusion Protection With Kubernetes

It’s hard to ignore Kubernetes nowadays when discussing container orchestration thanks to its robustness and comprehensive features. It is capable of supporting even the most complex apps and services. Despite the wealth of features built into Kubernetes, the platform only provides a set of built-in authentication and authorization mechanisms which all administrators can configure and use—the thing is, in the information security world, this is not enough. You need to optimize security yourself to take it next level.

With security becoming a primary concern in cloud deployment, knowing how to secure Kubernetes properly is a must. Putting a firewall layer on the host cluster is simply not enough, even though taking care of host security across all servers running Kubernetes containers can help.

Block malicious links via robots.txt

Hello guys,
Recently my site was infected with malware, which caused me a lot of problems. In particular, many spam links have been created and indexed. I managed to get a lot out of them with Google search console, but it still appears in some key searches. Is there any chance of blocking the link prefix in robots.txt to deleting itself from google?

<snip>

I want somehow to block indexing all links

I know i can block like this:
User-agent: *
Disallow: /product/categories

But this one is different, its not like a parent page/category. I would appreciate very much if you can help me, cheers!

Understanding Microsoft. My story.

Let me share how I began to understand Microsoft: A long time back when I went to Microsoft Redmond's campus for a seminar. I had two things I wanted to share since I thought Microsoft would want to look into this.

  1. A CD that when put into the PC would cause the PC to lock up. I didn't know why, I just thought it showed a bug.
  2. A jpeg file that when copied to the desktop would render that user's account dead. Even in safe mode until the file was deleted.

I waited my turn to meet with a couple of Microsoft engineers (lucky me!) and their response told me all I needed to know about Microsoft. maybe you can figure it out too. The engineers answer to these issues was "Don't do that."

Microsoft didn't consider things that we do or see as a bug. It's user error.

“We only lose what we don’t backup” and some folk today.

One of the mantras of computing and just about anything data related is "We only lose what we don't backup" but some are taking offense that this is still the current state of computing today. Recently some owners call this out as "blaming the user", "you're holding it wrong" or snobby. Everyone I know will try their best to help you get your machine back in working order even if people say such things. They've lost it all and upset that they can't get their stuff back.

Last week's example was another smart phone, forgot their password, unlock code and the only way folk told them was to factory reset the phone. No backups, ever. Owner's statement: "I've never backed up, why is that my problem?"

I don't mind all that but it is your data. Keep it safe. No one else will.

Q1. Is such thinking out of date?

Q2. Is the industry really that out of touch?

Why Industry Compliance Is Not Enough

This post was originally published here.

Growing awareness of information security is affecting the entire IT landscape today. By 2020, it’s estimated that the average cost of data breaches will be in excess of $150 million. Due to the increasing attacks targeting businesses, more and more companies are lining up to invest heavily in information security. Much of the drive behind this investment is compliance. Security standards implemented in many industries require businesses in that sector to conform with a specific set of requirements.