Thursday, February 14, 2008

The Art of blogging

A blog is an abbreviated version of a weblog, a website where entries are written in chronological order and commonly displayed in reverse chronological order. Blogs function more like personal online diaries except they're available for others to read them through. Blog has emerged as a very portable social media. It acts as a meeting point for people with same ideologies, hobbies, attributes, characteristics who find a common subject to discuss online.

Blogs may also be used as a means of interaction by professionals and a platfom to share views and information. Many professionals in the IT industry have their own personal blogs, which they use to talk about IT-related issues and discuss new technologies. Blogs have in fact become an important medium of knowledge sharing. Their importance has increased to such an extent that nowadays it's not uncommon to see leading company's including a blog on their official site to facilitate user interaction.

A typical blog combines text, images, and links to other blogs, web pages, and other media related to its topic. Most blogs are primarily textual, although some focus on art, photographs, sketchblog, videos, music, audio (podcasting), etc., are also most commonly becoming a part of a wider network of social media.

But is it as simple as it looks -- an almost free, readily available medium of interchange of ideas, which with single touch point further connects you to a base of millions of other users of the same blog site.

The picture isn't that rosy as it may appear. A recent news report told how a person had been harassed by a number of callers with a malicious intent who gained access to his mobile number through one of the world's famous blogging site without his knowledge.

The incident brought home the fact that it's a "Truman Show" for bloggers, with no privacy for users. Blogging is a treat for hackers, if used in a hurry or unwisely may invite unnecessary troubles.

Few tips to bloggers to avoid hackers:

* If not in use, don't leave the website open.

* Be cautious while logging on other's blogs or visiting sites like YouTube -- they may be a source of virus infections or spywares that may automatically download on your computer and may result in loss of your prized assets -- like online banking and gaming treasures.

* If you receive a message from an unknown blogger in your blog, an in return, you do the same to his or her blog, you may be inviting hidden hackers.

* Careful while surfing unsolicited friendship websites.

* Don't share secrets with other internet users for, e.g., telling them you are a big fan of baseball star Wang JianMing, or even teach them how to trade shares online, etc.

* If not clear why there are pop-up windows, don't press "OK" to get rid of it.

The next generation of security protection solutions needs to pay more attention to the protection of the defense mechanism. Several dangerous moves mentioned earlier are real cases that attracted hidden hackers. Web 2.0 architecture provided by Trend Micro is gradually being used as a dynamic platform. Besides unplugging your Internet line, you can further prevent from being a victim of a hacker by understanding the credibility and reputation rating of Web technology.

ITNATION

Stumble Upon Toolbar Digg!

1 comment:

Anonymous said...

While hackers can be a threat, I believe that the real pitfall of blogging is how it can be so easily careless to compromise one's own privacy. Which is why it's important to choose a blogging platform that gives you finer control of your privacy. I.PH for instance, lets you set EACH post to be visible only to people you choose. Because you select your audience, you give yourself better privacy and therefore, better security as well.