Social media Taking over hosting!

Related eBooks

Social media controlling web hosting content!

Facebook’s Instant Articles and Google AMP are making it harder, not easier, to publish on the web. I see this everyday as a webmaster. My position is I ignore the 900 rules google put forth and I consider Facebook a gossip column with no monetary reason for businesses. Over the years I had to rebuild many facebook pages and dump many others.

These companies cried keep internet open and free. Two things happened. American Lost much of its value to the world. And these social giants control the internet and as we see today they control USA elections by filtering.

If Trump doesn’t win, a free internet is gone and there will be no first amendment- Freedom of speech

Tech.pinions, appears to have blinders on based one what I read below. Its far worse than he paints below.

“One of the wonderful things about the rise of the web, twentysomething years ago, was the way in which it democratized publishing — suddenly, anyone with an idea could set up a website and make it available to anyone. Early on, publishing online required at least a rudimentary understanding of code. To be an online writer meant you also had to be a coder. But, services quickly emerged that created WYSIWYG editors for online publications, so literally anyone who had used a word processor could create online content.

Recently, however, we’ve seen the rise of proprietary formats like Google’s AMP, Facebook’s Instant Articles and the Apple News Format, which threaten to de-democratize publishing on the web. To be clear, I’m not making a philosophical argument about the closed nature of these platforms but something much more practical: Creating content for these formats reintroduces a coding requirement, and online code is vastly more complicated today than it was in the mid-1990s.

I first encountered the web when I entered university in 1994. It was a pretty primitive thing back then, with very limited ways to access it, and it was almost entirely text-based. But over the next four years, things moved forward rapidly, with additional web browsers improving the process of browsing the web ,and hosting and other online services making it easier for ordinary people like me to set up an online presence. By the time I graduated in 1997, not only was browsing the web a big part of my life but I had a website of my own. In order to build that website, I had to learn HTML, which, at the time, was a very simple thing to grasp, at least at a basic level. But that coding requirement still prevented many people from creating an online presence.

As these platforms — especially AMP and Instant Articles — suck up an ever greater proportion of online content, that’s going to leave smaller publishers out in the cold.

Interestingly, I basically took a two-year break from the web between early 1998 and early 2000 while I was serving as a missionary in Asia. When I returned, the web had again moved on significantly. Blogger had launched in 1999 and was one of the first sites that enabled people to create their own websites without knowing anything about coding, web hosting or any of the other more technical aspects that had previously characterized online publishing. Almost all of my online publishing since has been based on various blogging platforms and, for the last 10 years, almost exclusively on self-hosted WordPress sites.

Along the way, because I’ve always had something of an interest in coding, I’ve beefed up my understanding of HTML, grappled with CSS style sheets, and even done some messing around with PHP. But I’m always enormously grateful I don’t have to try to build sites that would perform well from the ground up — I’ve long since given up on that idea.

Enter AMP, Instant Articles and Apple News

So much for my personal history. Since last summer, we’ve seen what I’d argue is the latest phase in this online publishing evolution. It involves the creation of a variety of proprietary formats for online publishing. Google has been spearheading the Accelerated Mobile Pages project (AMP), which launched officially almost a year ago. Facebook introduced its Instant Articles format last summer, with a similar objective of accelerating the delivery of articles on mobile devices. And Apple introduced News as part of iOS 9, opening it up to publishers over the summer and to most users in the Fall, albeit with different intentions.

Here’s what’s these platforms have in common, however: Each uses proprietary formats to deliver articles to readers. Technically, these formats use standards-based elements — for example, AMP is a combination of custom HTML, custom JavaScript and caching. But the point here is the outputs from traditional online publishing platforms aren’t compatible with any of these three formats. And in order to publish to these formats directly, you need to know a lot more code than I ever did back in the mid-1990s before the first round of WYSIWYG tools for the web emerged.

We’re effectively turning back the clock to a pre-web world in which the only publishers that mattered were large publishers, and it was all but impossible to be read if you didn’t work for one of them.

As a solution, each of these platforms has provided tools intended to bridge the gap — all three, for example, have WordPress plugins to convert content to the appropriate formats. But a quick read of the reviews for the Facebook and AMP plugins tells you they don’t seem to be doing the job for many users. The Apple News plugin has a higher rating, but I know from my own experience that it’s problematic. Both Facebook and Apple also offer RSS tools to import existing content, but there are limitations around both (Apple News doesn’t allow advertising in RSS-driven publications, while Facebook IA requires a custom RSS feed with IA-specific markup, which is again going to be beyond the ken of most non-coding publishers). Apple news offers a WYSIWYG tool, but it’s extremely basic (it doesn’t support embeds, block quotes, or even bullet points).

Why does all this matter? After all, no one is forcing anyone to use any of these formats — publishing to the open web is still possible. While that’s technically true, at least two of these formats — AMP and Instant Articles — are being favored by the two largest gatekeepers to online content: Google and Facebook. Google now favors AMP results in search, while Facebook does the same within its News Feed, though less explicitly (by favoring faster-loading pages, it gives IA content a leg up). Apple News is different — it’s a self-contained app, and it’s basically irrelevant to you as a publisher unless your readers are using it. But if you do decide to use it, unless you publish in Apple News Format, you can’t monetize your content there, and Apple is pushing the News app heavily to its users.

Turning back the clock

The upshot of all of this is, unless you’ve comfortable with fairly advanced web coding, or can pay someone who is, your online publication is likely to become a second-class citizen on each of these new platforms, if it has a presence there at all. And, as these platforms — especially AMP and Instant Articles — suck up an ever greater proportion of online content, that’s going to leave smaller publishers out in the cold.

That in turn means we’re effectively turning back the clock to a pre-web world in which the only publishers that mattered were large publishers, and it was all but impossible to be read if you didn’t work for one of them. That seems like an enormous shame, and from a practical standpoint, matters a lot more to me as an online writer than more philosophical debates about open versus closed platforms.

Jan Dawson is founder and chief analyst at Jackdaw, a technology research and consulting firm focused on the confluence of consumer devices, software, services and connectivity. During his 13 years as a technology analyst, Dawson has covered everything from DSL to LTE, and from policy and regulation to smartphones and tablets. Prior to founding Jackdaw, Dawson worked at Ovum for a number of years, most recently as chief telecoms analyst, responsible for Ovum’s telecoms research agenda globally. Reach him @jandawson.”

Ted Cruz fighting Obama on Internet Hand off

Ted Cruz fighting Obama on Internet Hand off

Sen. Ted Cruz, R-Texas, would block the plan to transfer control of a key component of the Internet before President Obama leaves office.

Cruz’s “Protecting Internet Freedom Act” would direct the Department of Commerce to retain ownership of the Internet Assigned Numbers Authority.

“The U.S. government has long protected the core of the Internet from authoritarian regimes who view the Internet as a way to increase their influence and suppress our online freedom of speech,” Cruz said.

read more at Washington Examiner

America losing control of the Internet

Alert- America losing control of the Internet in 2 months.

This is the very thing I have railed against in this website. In two months America will no longer control it’s own internet. Obama administration is turning it over to a world body. We must stop this! This is an American asset that the American people should have a say in.

The Department of Commerce is set to hand off the final vestiges of American control over the Internet to international authorities in less than two months, officials have confirmed.

The department will finalize the transition effective October 1.

The only person speaking 0ut is Texas Republican Sen. Ted Cruz.

This is happening against Congress prohibition for this action.

Obama is forcing this to happen before he leaves office.

Once again Obama is ignoring the law and going ahead.

Read more Washington Examiner



Cyber Threat Source Descriptions

Cyber Threat Source Descriptions from ICS-CERT

Cyber threats to a control system refer to persons who attempt unauthorized access to a control system device and/or network using a data communications pathway. This access can be directed from within an organization by trusted users or from remote locations by unknown persons using the Internet. Threats to control systems can come from numerous sources, including hostile governments, terrorist groups, disgruntled employees, and malicious intruders. To protect against these threats, it is necessary to create a secure cyber-barrier around the Industrial Control System (ICS). Though other threats exist, including natural disasters, environmental, mechanical failure, and inadvertent actions of an authorized user, this discussion will focus on the deliberate threats mentioned above.

  • National Governments
  • Terrorists
  • Industrial Spies and Organized Crime Groups
  • Hacktivists
  • Hackers
  • GAO Threat Table

For the purpose of this discussion, deliberate threats will be categorized consistent with the remarks in the Statement for the Record to the Joint Economic Committee by Lawrence K. Gershwin, the Central Intelligence Agency’s National Intelligence Officer for Science and Technology, 21 June 2001. These include: national governments, terrorists, industrial spies, organized crime groups, hacktivists, and hackers. Activities could include espionage, hacking, identity theft, crime, and terrorism.

National Governments

National cyber warfare programs are unique in posing a threat along the entire spectrum of objectives that might harm US interests. These threats range from propaganda and low-level nuisance web page defacements to espionage and serious disruption with loss of life and extensive infrastructure disruption. Among the array of cyber threats, as seen today, only government-sponsored programs are developing capabilities with the future prospect of causing widespread, long-duration damage to U.S. critical infrastructures.

The tradecraft needed to effectively employ technology and tools remains an important limiting factor, particularly against more difficult targets such as classified networks or critical infrastructures. For the next 5 to 10 years, only nation states appear to have the discipline, commitment, and resources to fully develop capabilities to attack critical infrastructures.

Their goal is to weaken, disrupt or destroy the U.S. Their sub-goals include espionage for attack purposes, espionage for technology advancement, disruption of infrastructure to attack the US economy, full scale attack of the infrastructure when attacked by the U.S. to damage the ability of the US to continue its attacks.



Traditional terrorist adversaries of the U.S., despite their intentions to damage U.S. interests, are less developed in their computer network capabilities and propensity to pursue cyber means than are other types of adversaries. They are likely, therefore, to pose only a limited cyber threat. Since bombs still work better than bytes, terrorists are likely to stay focused on traditional attack methods in the near term. We anticipate more substantial cyber threats are possible in the future as a more technically competent generation enters the ranks.

Their goal is to spread terror throughout the U.S. civilian population. Their sub-goals include: attacks to cause 50,000 or more casualties within the U.S. and attacks to weaken the U.S. economy to detract from the Global War on Terror.

Industrial Spies and Organized Crime Groups

International corporate spies and organized crime organizations pose a medium-level threat to the US through their ability to conduct industrial espionage and large-scale monetary theft as well as their ability to hire or develop hacker talent.

Their goals are profit based. Their sub-goals include attacks on infrastructure for profit to competitors or other groups listed above, theft of trade secrets, and gain access and blackmail affected industry using potential public exposure as a threat.


Hacktivists form a small, foreign population of politically active hackers that includes individuals and groups with anti-U.S. motives. They pose a medium-level threat of carrying out an isolated but damaging attack. Most international hacktivist groups appear bent on propaganda rather than damage to critical infrastructures. Their goal is to support their political agenda. Their sub-goals are propaganda and causing damage to achieve notoriety for their cause.



Although the most numerous and publicized cyber intrusions and other incidents are ascribed to lone computer-hacking hobbyists, such hackers pose a negligible threat of widespread, long-duration damage to national-level infrastructures. The large majority of hackers do not have the requisite tradecraft to threaten difficult targets such as critical U.S. networks and even fewer would have a motive to do so. Nevertheless, the large worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage, including extensive property damage or loss of life. As the hacker population grows, so does the likelihood of an exceptionally skilled and malicious hacker attempting and succeeding in such an attack.

In addition, the huge worldwide volume of relatively less skilled hacking activity raises the possibility of inadvertent disruption of a critical infrastructure.

For the purposes of this discussion, hackers are subdivided as follows:

  • Sub-communities of hackers
  • Script kiddies are unskilled attackers who do NOT have the ability to discover new vulnerabilities or write exploit code, and are dependent on the research and tools from others. Their goal is achievement. Their sub-goals are to gain access and deface web pages.
  • Worm and virus writers are attackers who write the propagation code used in the worms and viruses but not typically the exploit code used to penetrate the systems infected. Their goal is notoriety. Their sub-goals are to cause disruption of networks and attached computer systems.
  • Security researcher and white hat have two sub-categories; bug hunters and exploit coders. Their goal is profit. Their sub-goals are to improve security, earn money, and achieve recognition with an exploit.
  • Professional hacker-black hat who gets paid to write exploits or actually penetrate networks; also falls into the two sub-categories-bug hunters and exploit coders. Their goal is profit.

Nature of the Computer Security Community

Hackers and researchers interact with each other to discuss common interests, regardless of color of hat. Hackers and researchers specialize in one or two areas of expertise and depend on the exchange of ideas and tools to boost their capabilities in other areas. Information regarding computer security research flows slowly from the inner circle of the best researchers and hackers to the general IT security world, in a ripple-like pattern.


GAO Threat Table

The following table is an excerpt from NIST 800-82, “Guide to Supervisory Control and Data Acquisition (SCADA) and Industrial Control System Security (SME draft), provides a description of various threats to CS networks:

Threat Description
Bot-network operators Bot-network operators are hackers; however, instead of breaking into systems for the challenge or bragging rights, they take over multiple systems in order to coordinate attacks and to distribute phishing schemes, spam, and malware attacks. The services of these networks are sometimes made available in underground markets (e.g., purchasing a denial-of-service attack, servers to relay spam, or phishing attacks, etc.).
Criminal groups Criminal groups seek to attack systems for monetary gain. Specifically, organized crime groups are using spam, phishing, and spyware/malware to commit identity theft and online fraud. International corporate spies and organized crime organizations also pose a threat to the United States through their ability to conduct industrial espionage and large-scale monetary theft and to hire or develop hacker talent.
Foreign intelligence services Foreign intelligence services use cyber tools as part of their information-gathering and espionage activities. In addition, several nations are aggressively working to develop information warfare doctrine, programs, and capabilities. Such capabilities enable a single entity to have a significant and serious impact by disrupting the supply, communications, and economic infrastructures that support military power – impacts that could affect the daily lives of U.S. citizens across the country.
Hackers Hackers break into networks for the thrill of the challenge or for bragging rights in the hacker community. While remote cracking once required a fair amount of skill or computer knowledge, hackers can now download attack scripts and protocols from the Internet and launch them against victim sites. Thus while attack tools have become more sophisticated, they have also become easier to use. According to the Central Intelligence Agency, the large majority of hackers do not have the requisite expertise to threaten difficult targets such as critical U.S. networks. Nevertheless, the worldwide population of hackers poses a relatively high threat of an isolated or brief disruption causing serious damage.
Insiders The disgruntled organization insider is a principal source of computer crime. Insiders may not need a great deal of knowledge about computer intrusions because their knowledge of a target system often allows them to gain unrestricted access to cause damage to the system or to steal system data. The insider threat also includes outsourcing vendors as well as employees who accidentally introduce malware into systems.
Phishers Individuals, or small groups, who execute phishing schemes in an attempt to steal identities or information for monetary gain. Phishers may also use spam and spyware/malware to accomplish their objectives.
Spammers Individuals or organizations who distribute unsolicited e-mail with hidden or false information in order to sell products, conduct phishing schemes, distribute spyware/malware, or attack organizations (i.e., denial of service).
Spyware/malware authors Individuals or organizations with malicious intent carry out attacks against users by producing and distributing spyware and malware. Several destructive computer viruses and worms have harmed files and hard drives, including the Melissa Macro Virus, the Explore.Zip worm, the CIH (Chernobyl) Virus, Nimda, Code Red, Slammer, and Blaster.
Terrorists Terrorists seek to destroy, incapacitate, or exploit critical infrastructures in order to threaten national security, cause mass casualties, weaken the U.S. economy, and damage public morale and confidence. Terrorists may use phishing schemes or spyware/malware in order to generate funds or gather sensitive information.

To read this and much more click on the link below.

Time for new search engines

Time for new search engines to provide conservative business legitimate advertising!

Google, Facebook, Apple, Instagram and Twitter are colluding against conservatives to control the election. This is not new to me. The rules that Google implemented in the last few years were to discriminate against anyone not using there methods. Clearly this removed the freedom of the internet. Check out the story below from Drudge and the Observer. In this, they are trying to defeat Trump. We need Search companies that are open to a free internet. These are not.

Tech Companies Apple, Twitter, Google, and Instagram Collude to Defeat Trump


Ideas to Secure Internet Borders

  1. Search Engines Control country access. Google is already controlling most of the internet for its own gains. About time they did something to protect America.
  2. In America, all foreign traffic must have a passport. An Electronic Passport that can be blocked for misuse.
  3. Website access controlled common for all.
    Ideas for Internet
    Ideas for Internet

    And .us for USA only access. And so on. A black world away from children with SSL controls. Not a part of .com.

  4. A fixed IP for everyone. Like a social security number or a PKI.
  5. Make ATT, cable companies and other ISP watch dogs technically.They already do this for government after the fact of a crime.
  6. Wrong doers are controlled by the laws of the land or country they are in.
  7. Business communication and private sites on SSL and .biz

These some ideas I am putting together. Some have been looked at in the past. Most have been thrown our by lobbyist not wanting change to protect gain and people promoting a world with not borders. Today, every website in America is swamped by traffic from outside the USA. Search Engine bot from Russia, China, and other unscrupulous countries trying to find holes in a website, so that they can take control of it.

Many sights today are wordpress websites with plugin from everywhere. In most cases security is fairly good. But I have plugins that compromised my websites and had to rebuild them. You don’t know what risk there is until your hacked. We hear of backdoors all the time. Today hosting companies are none cooperative on controlling who accesses your websites. I am hoping clouds like AWS, Microsoft, and Google start controlling who accesses. Its a simple thing to do using todays routers or gateways. This would open bandwidth for legitimate use.

More to come

New Friendly Search Engine

Damn, Al Gore built the WWW and America needs to control our nations part of this access . The others need to get a green card with a traceable ID. The technology has been there for this all to happen for many years.

New Search Engine Friendly to Small Business


Today after 40 years in the high tech industry, I am throwing in my hat. Google with its 900 rules of what a website should be and Facebook after 10 years still doesn’t like integrating business into its gossip platform. A survey in England said 65% of businesses think Facebook is a waste of money. I tend to agree with that.

I hope the future brings us something much better than Google and Facebook that now control much of what happens on the Internet. Google ‘s PPC is very costly for small business and its rules control what websites should look like, is crap.

And the biggest problem is the force behind WWW to keep the internet open to the world. The criminals love this mentality. They are having a field day raping businesses, banks, schools and local governments daily. Our Government needs to take control of our access and protect the American people. Today governments response is to pay the thieves.

Damn, Al Gore built the WWW and America needs to control our nations part of this access . The others need to get a green card with a traceable ID. The technology has been there for this all to happen for many years.

Wake up America! Check out America in 2020 or more.

Gods of Internet Destroys Websites

Gods of Internet Destroys Websites and ruin Freedom of the Internet!

Gods of the Internet
Gods of the Internet

In 2015, the arrogance of Google was on full display on TV. They announced the de-ranking of all websites that are not Mobile Ready. They can’t de-rank me any further. All my sites are de-ranked by the 890 other rules they have dreamed up in the last year. Enough is enough. Damn Google, and it arrogance. Damn the arrogance of mobile users trying to destroy the freedom of the Internet. Google designed the Androids with this intention of forcing the internet to comply. This functionality could be designed into the phones, But Google wanted a gestapo method of controlling the internet.

The millions of dollars Google is forcing small business to spend so they control the internet content and how it is displayed is so wrong. The wealth that Google has is because of the data they got from a free internet. Now they are using there gain to ruin the internet.

Remember, they designed the Android and the search Engine. They could have fixed this themselves. Instead, for more profits and control they decide to do this.

Protect Internet Borders and Internet Freedom