Saturday, September 20, 2014

Netiquette Core Principals For Posting to Groups - Via Netiquette IQ

When I recently came across this article, It occurred to me that I have hardly ever discussed the Netiquette of posting to discussion groups. So I decided to fill that gap with the very good list below. There is also an infographic which accompanied this but it can not be transposed in the space available. Enjoy it and good Netiquette to all!
=======================================
=========================================


May 19, 2014 blogs.onlineeducation.touro.edu

15 Rules of Netiquette for Online Discussion Boards 
  1. Before posting your question to a discussion board, check if anyone has asked it already and received a reply. Just as you wouldn’t repeat a topic of discussion right after it happened in real life, don’t do that in discussion boards either.
  2. Stay on topic – Don’t post irrelevant links, comments, thoughts, or pictures.
  3. Don’t type in ALL CAPS! If you do, it will look like you’re screaming.
  4. Don’t write anything that sounds angry or sarcastic, even as a joke, because without hearing your tone of voice, your peers might not realize you’re joking.
  5. Always remember to say “Please” and “Thank you” when soliciting help from your classmates.
  6. Respect the opinions of your classmates. If you feel the need to disagree, do so respectfully and acknowledge the valid points in your classmate’s argument. Acknowledge that others are entitled to have their own perspective on the issue.
  7. If you reply to a question from a classmate, make sure your answer is accurate! If you’re not 100% sure when the paper is due, DO NOT GUESS! Otherwise, you could really mess things up for your classmates and they will not appreciate it.
  8. If you ask a question and many people respond, summarize all answers and post that summary to benefit your whole class.
  9. Be brief. If you write a long dissertation in response to a simple question, it’s unlikely that anyone will spend the time to read through it all.
  10. Don’t badmouth others or call them stupid. You may disagree with their ideas, but don’t mock the person.
  11. If you refer to something your classmate said earlier in the discussion, quote just
    a few key lines from their post so that others wont have to go back and figure out which post you’re referring to.
  12. Before asking a question, check the class FAQs or search the internet to see if the answer is obvious or easy to find.
  13. Check the most recent comments before you reply to an older comment, since the issue might have already been resolved or opinions may have changed.
  14. Be forgiving. If your classmate makes a mistake, don’t badger him or her for it. Just let it go – it happens to the best of us.
  15. Run a spelling and grammar check before posting anything to the discussion board. It only takes a minute, and can make the difference between sounding like a fool and sounding knowledgeable.
RULE OF THUMB: If you wouldn’t do or say something in real life, don’t do it online either.
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================

Netiquette IQ Technical Term of The Day - Use Case Diagram



Use case diagram

A use case diagram is a graphic depiction of the interactions among the elements of a system. A use case is a methodology used in system analysis to identify, clarify, and organize system requirements. In this context, the term "system" refers to something being developed or operated, such as a mail-order product sales and service Web site. Use case diagrams are employed in UML (Unified Modeling Language), a standard notation for the modeling of real-world objects and systems.
System objectives can include planning overall requirements, validating a hardware design, testing and debugging a software product under development, creating an online help reference, or performing a consumer-service-oriented task. For example, use cases in a product sales environment would include item ordering, catalog updating, payment processing, and customer relations. A use case diagram contains four components.
  • The boundary, which defines the system of interest in relation to the world around it.
  • The actors, usually individuals involved with the system defined according to their roles.
  • The use cases, which are the specific roles played by the actors within and around the system.
  • The relationships between and among the actors and the use cases.
A use case diagram looks something like a flowchart. Intuitive symbols represent the system elements. Here's a simple example:
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================


Netiquette IQ Quotation of The Day - Linkedin



 =======================================
“One of the great things about LinkedIn is it isn’t the same kind of networking that happens at conventions, where you’re wearing a name tag, trying to meet strangers, and awkwardly attempting to make small talk. LinkedIn is networking without the pressure.”
Melanie Pinola
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================


Friday, September 19, 2014

Netiquette IQ Blog of The Day - A Linkedin Flaw Exposes Email Addresses

Here is still another security flaw to a major social media site which can compromise your email address.
===========================================


LinkedIn flaw helps hackers uncover email addresses
By Matt Markovich Published: Sep 17, 2014 at 8:18 PM PDT Last Updated: Sep 18, 2014 at 9:53 AM PDT
komonews.com By Matt Markovich Published: Sep 17, 2014 at 8:18 PM PDT Last Updated: Sep 18, 2014 at 9:53 AM PDTBy Matt Markovich Published: Sep 17, 2014 at 8:18 PM PDT Last Updated: Sep 18, 2014 at 9:53 AM PDTMatt Markovich 9/18/14
SEATTLE -- A pair of self proclaimed "ethical hackers" have discovered what they call a "logic flaw" with the social networking site LinkedIn. 

The flaw could allow anyone with just a basic grasp of navigating a website to authenticate email address using LinkedIn's tool to confirm connections with other members.

Bryan Seely and Ben Caudill of Rhino Security Labs say the flaw could become a hacker's first step to identity theft because it is often the case that a valid email address is a person's user name for many accounts not associated with LinkedIn.

LinkedIn prides itself on offering an effortless ability to check your contact list against their email database of other members to see if you any of your contacts is a LinkedIn member.  But Seely and Caudill demonstrated how they can upload a comma-separated-value file, often known as a CSV file of dozens of email address guesses.  Most email programs can produce a CSV file to allow importing of contacts from one email program to another.

For example, Seely demonstrated how to make a list of email address guesses for billionaire investor and "Shark Tank" star Mark Cuban. Within seconds, LinkedIn displayed Cuban's public profile and confirmed one of Seely's guesses was correct.  Seely then put Cuban's email address into the text function on his iPhone.  Because the address turned blue on his iPhone, that signaled to Seely Cuban's email address is tied to his iphone and he could have an iCloud account.

"Now I can send him a text," said Seely. 

And he did. Cuban would later respond, asking Seely and Caudill to check out Cyberdust, an new messaging app Cuban was investing in.

"You can't get direct access to someone's account through this, but it's a good start," said Caudill. "It's a crack in the infrastructure, essentially it's a start to much bigger attacks, such as the brute forcing with the celebrities recently."

Caudill is referring to the recent access to compromising pictures by hackers to the iCloud accounts of several celebrities, including Jennifer Lawrence.  Brute forcing is a technique hackers used to find a password.

"Brute forcing, which is essentially the idea of taking a user name or known email address in this case, and uploading a huge list of passwords on an automated scale and guessing one after another after another," said Caudill.

When Seely first contacted LinkedIn about his discovery, he said company officials told him "they were not interested."

Now that Seely and Caudill went public with their find, LinkedIn is responding, saying they are working on a fix. A spokeswoman for LinkedIn says the popular social networking site has abuse detection and rate limiting systems in place to prevent abuse of the contact feature Rhino labs says is vulnerable.

Nicole Leverich of LinkedIn said effective immediately, a LinkedIn member can contact the support team and ask to be "manually opted out of having their email address discoverable to people they are not connected with through address book import."

"We are working on building this as an option members can select in settings," she said.

Seely is gaining a reputation for being a security gadfly to some of the larges sites on the web.  Earlier this year he demonstrated how someone can "mapjack" Google maps and create fictitious business listings or change existing business listings using Google own tools.

Last month the two web security researchers demonstrated how anonymous posts on the website Secret were not so secret. They were able to figure out the identity of the people behind the posts that thought they were anonymous.

The two believe the LinkedIn flaw doesn't compromise LinkedIn's online security, but it gives a hacker an opening to validate information that could lead to identity theft.

   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================