I use strong passwords 1 u53 $4r0ng-p@5sw0rd$

Secure password management

What is your password? How many passwords do you have? Are you worried about password theft? Is your password safe and secure or are you at risk? Do you use different passwords for each application or the same password for everything? Can you remember your passwords or do you write them down somewhere? How complicated is your password? Could someone easily guess it or crack it. How can you improve the situation and use a better password management system to simplify your life and enhance your password security?

Most people today have a problem with passwords. Simply there are too many of them. Passwords for your computer at home, another at work. Passwords for your mobile, your email, blogs, forums, facebook. Then there are more passwords for your credit card, bank account, PayPal account and so on. We have so many that it is sometimes a wonder that we can remember them all. Or do you, like me, forget them sometimes. Do you just reuse the same password for everything so you can’t forget it? Maybe, to help your remember it, you write your password down somewhere. You might not think that this is much of a problem, but it is. If you do some of the things above, then you are prone to becoming a victim of hackers.

So what? You may be asking, who’s going to hack my email and what benefit could they possibly gain from it? Does it really matter if I get hacked? Well, it is true that hackers aren’t interested in reading your email to your aunt. However, your email is a stepping stone to allow them into other things. They could use your account to send spam. They could get your passwords into other services and websites. The hacker could also use your accounts to hack other more important people. There’s a load of bad things that these hacker guys can do with your accounts that you are not even aware of, so your shouldn’t make it easy for them. Especially when securing passwords is relatively easy to do.

What can you do to secure your passwords? Well, there are a few things that you can do and you probably already know most of them but I’m guessing you don’t bother doing these things cause you don’t understand the benefit that it brings and doing things the way you do now is easy. Well, it’s time for a change. Let us start by explaining why you have to do all this security stuff and what the benefits are. To understand it all properly, you have to know how you could be compromised. If you know the hack, you’ll get why you do what you do to prevent that hack.

So this blog post will go over some of the methods (not all the methods) that could be used to compromise your password. It will then give you some suggestions as to what you should do to prevent this attack and keep your passwords secure.

Over the shoulder attack

Problem: The simplest form of attack possible. Someone watches you as you key in your password and remembers it. We can also include here people looking at the post-it note you left on your desk that has you password written on it.

Solution: Make sure people aren’t watching you when you enter a password. Also never write down your password in plain form anywhere.

Key loggers

Problem: Some malware or rootkit that got accidentally installed on your system without you knowing logs every key that you press and thus records your passwords and reports it back to the hacker. Some people purposely install keyloggers on their computers to record other users e.g. in an internet cafe or where you have a boss that wants to snoop on your work progress.

Solution: Two part solution here. On your own computers ensure that you have up to date anti-virus and malware killers plus firewall to keep your system clean. On other people’s computers, especially public computers, refrain from entering sensitive information, like passwords. You don’t know who has installed what on that machine.

Man in the middle (MITM)

Problem: How secure is the connection between you and the server for the website or service. Is someone listening in and recording everything you send? This is a particular problem on wireless networks, especially public wireless networks such as libraries and hotels.

Solution: If you have a wireless network, secure it with a password to keep it private. If you are using a public wireless network, think twice about entering passwords and other sensitive information. When logging into a website, always try to use the secure HTTPS rather than regular HTTP. This encrypts your information in transit and can foil some Man in the Middle attacks. There are browser add-ons that assist in this such as HTTPS Everywhere and HTTPS Finder or Secure Sites for Chrome.

A man in the middle attack is still possible with https and SSL if the attacker spoofs and fakes his own secure server. Such an attack would show up as the certificate wouldn’t match the website. However, very few people check the certificate names. When using a secure server, you should check up at the top left of the screen, next to the address bar. There will be a green box if the site is secured. Clicking on that box will give you more info about the certificate.

Secure Storage

Problem: Passwords are difficult to remember so people often write them down. Bad idea. Worse people write the password in a text file on their own computer where any hacker can easily find it. At the server side of things, passwords need to be stored in order that you can validate against them. Such passwords should be encrypted but some server admins and programmers neglect this and store passwords in plain text where anyone could read them.

User Solution: If you can, try to keep passwords in your head. The problem is that people today have too many passwords to keep them all in their head. So we need a secure storage system: a Password Manager. There are many such systems on the market. Two that I have used are Keepass and Lastpass. Keepass has the advantage that it is on your desktop computer (and other devices) and is not dependent on a connection to the internet. Lastpass has the advantage of being built into your favourite web browser where you use passwords most and also being highly portable as it’s online, you can access it anywhere. When using a password manager, it is very important to set a Master Password to secure and encrypt the storage.

Why not use the password manager that is built into the web browser e.g. “Do you want Firefox to remember this password yes/no?” Well by default, these password managers do not contain a master password and so by default they are insecure. Firefox and Opera users can change this setting to use a master password and encrypt the stored password info. Chrome users cannot do this so Chrome’s password manager is not secure. In addition, web browsers own password managers lack some functions such as being able to backup the password file

Developer Solution: If you are writing an application that needs to store passwords, you should not store the password in plain text. Instead, you should store a hash of the password. Currently, the best recommendations are either to use Bcrypt which is based on Blowfish encryption. You can use scripts such as  PHPass to ingrate these hash systems into your application.

Rainbow tables

Problem: If someone gets a hold of your file/database of stored passwords either from your password manager or from your application’s database, then they can try to reverse the encryption and recover your passwords. Rather than using a Brute Force Attack and trying every possible password, hashing it, and testing – a long slow process that can take days, month or years – you can use rainbow tables. A rainbow table is a database of possible passwords and pre-computed hash values. The hacker can use these to simply search for the hash value in the rainbow table database and read out the password almost instantly.

User Solution: Use a secure password manager such as discussed above along with a master password to encrypt the password data securely. Avoid any password managers that use a simple encryption system or plain text to store your passwords.

Developer Solution: Include random “salt” in your hashing process. A salt is a string of text that is added and hashed together with the password. The intention is that two hashes of the same password should not match. Thus the rainbow table will not find any matches. The salt can be safely stored as plain text in the database alongside the hash. Even if the attacker had both the hash and the salt value he would be unable to use a rainbow table to attack and would instead have to resort to brute force.

Brute Force Attacks

Problem: This attack is what everyone thinks hackers do. Simply guess your password thousands of times until they find the one that works. Since there are allot of possible passwords, it takes a long time to work through all of them. To speed things up, attackers will use a dictionary of common passwords to try first. Did you know that about 2% of people use “password1” as their password? Many other people have an equally simple to guess, commonly used password. The attacker will try all of these first before going on to more random possibilities. If you use a simple, common, easy to guess password then you are prone to this kind of attack.

User Solution: Use longer and more complex passwords that are not based on normal words or names. The longer and more complex the better. Mix in some capital letters, numbers and some punctuation symbols like %, *, @ and & to make it even harder to crack. Of course, this has the problem of making the password harder to remember as well. To fix that you can use a password manager as discussed above but even then you need to remember a secure master password. To remember this password I and other security experts suggest using a passphrase or mnemonics. An example you could use the password “J&WgmiSJCoM24th” which secure and complex but easy to remember because it comes from the phrase “John and Wendy got married in St. James Church on May 24th.” Contracting a phrase like this is a simple way to make a memorable yet secure, long, password.

Developer Solution: There are several things a developer can do to help secure his website or application from brute force attacks. The first is to ensure that your users do not use simple passwords. Insist that they use complex and long passwords. Also keep a blacklist of common and easy to crack passwords and forbid users from selecting them.

The second thing to do is to slow down the hashing process. The longer it takes to create and check the hash from the password, the slower the attack will be. Popular, but dated hashes, such as MD5 and SHA1 are too fast. They take just milliseconds to compute. So an attacker can try many many password combinations in a very short time. Using a hash such a Bcrypt with a high work factor will be slow and thus take longer to crack. Using up as much as half a second for the hashing will cause little inconvenience to your users but greatly inconvenience the attacker.

It used to be the case that cracking an alphanumeric password with a  length of 8 characters secured as an MD5 or SHA-1 hash was difficult. It took months or even years and so could be considered secure. Today your desktop PC could probably do the 218 trillion combinations in about 5 days. If you rent some compute nodes from Amazon it could be done in just 1 hour. Using Bitcoin’s distributed computing network would be even faster, it can calculate SHA-256 at a rate of 11 * 10^12 hash/s or more. So the 8 character alphanumeric password would be cracked in just a few tens of seconds.

By switching from MD5 and SHA-1 to Bcrypt and adding a suitable work factor you would shift the balance much more in your favour, slowing down the hashing by 1000 times or more. A desktop PC might then take 12 years to crack the password. Amazon’s services would be up to 40 days and even Bitcoin would be slowed to over a day to crack. Enough to make the attacker go elsewhere. Additionally, Bcrypt allows you to increase the work factor as time goes by to make the hashing slower as computers get even faster.

The third thing a developer should do to prevent brute force attacks is to monitor password failures. If a user fails to log in a certain number of times, an alert should be sent to the admin so he can monitor the problem. After a few more failures you may opt to take one of the several measures to halt an attack. The least drastic of these is to ask for an additional step such as completing a CAPTCHA. If the problem persists further, you might consider blocking the user’s accounts or IP addresses. However, that has its own security risks such as a Denial of Service (DoS) attack where the hacker tries many accounts or IP addresses, forcing groups of users to be locked out, thus preventing legitimate people from using your site.


So I hope you found this article useful to help you to secure your passwords. Questions and comments can be left below. If I have missed anything, do mention and I will add to this list.

XKCD password strength

A mobile phone displaying a map with various adverts popping out of the locations.

Advertisers snooping? Stop the tracking cookies

Ever had the feeling that you are being watched. You visit Amazon and look at iPhone headphones, then jump over to YouTube and watch a video but the adverts are suddenly all for iPhone headphones. You go to check you Gmail, and more adverts for headphones. Then you pop by Facebook and more adverts for headphones. No matter where you go, those iPhone headphones just keep following you. Truly you are being watched. Many internet marketing companies are tracking every page you visit and purchase you make, using tracking cookies. They know a huge amount about you and they use that to sell you things.

Understandably, many people worry about these tracking cookies and their adverts. The EU made a law requiring websites to inform you of the cookies and seek your permission to use them. This resulted in a mass of pop-ups on telling that “this site uses cookies” which you probably just ignore – but should you? Should we just accept this snooping into our online lives and is there really anything you can do to stop them tracking you?

Well, in fact, you can opt out of these ad tracking cookie systems. You’ll still see ads and these firms will still make money, but you won’t be having the feeling that someone is watching you. It isn’t perfect. The opt-outs usually also use cookies to log that status so if you clear your cookies, use another machine, or re-install your system, then you will need to repeat the opt-out process again. Also, the companies don’t really want you to opt out, so they have gone out of their way to make you go out of your way if you want to actually opt out. There’s no single off switch and you have to run around a huge number of sites, clicking opt out on each of them.

Is it worth it? Well, I opted out about a year ago, and I like it. I still see ads, but they are different ads. The ads are often less relevant to me than they were before, but that is kind of the idea here.

Why not just use an ad blocker plugin? Well, they are far from perfect. For a start, many publishers simply block their content if they detect an add blocker. Furthermore, the ongoing tit for tat between the advertisers and the blocker means that the blocker might not always stop the tracking even if it blocks the display of the ad. Finally, this method, of opting out, is within the advertiser’s system and they are required by law in many countries to do this, so you can be moderately sure that they won’t circumvent it.

For google, go to //www.google.com/settings/u/0/ads/authenticated
Make sure to turn off all three settings for signed in “Ads based on your interests”, and on the next page, signed out “Ads based on your interests” and “Google Search Ads based on your interests”

Google also uses the Doubleclick cookie and opting out of that requires you to download Google’s plugin from //www.google.com/settings/u/0/ads/plugin

You might also want to review your Google search history and delete that too. Yes, they have everything searched for file and you can view it. //myactivity.google.com/myactivity and also

For Yahoo! group adverts there are several places you need to go:

Network Advertising has an opt out page for many smaller ad companies. Facebook is one of the firms listed so you can opt out of Facebook’s tracker here. Their site doesn’t work too well. You have to click the “choose all companies” opt out button several times as it only opted me out of 5 or 6 out of 110 each time: http://www.networkadvertising.org/choices

Digital Advertising Aliance (DAA) also has the same tool and lets you opt out of many ad providers: http://youradchoices.com/

To opt out of Amazon tracking, you can use the DAA link above or go to https://www.amazon.com/adprefs

For Microsoft (Bing) you should head over to https://choice.microsoft.com/en-GB/opt-out
Also if you have Windows 10:
– Click or tap the Start button.
– Click or tap Settings.
– Click or tap Privacy and then turn off Let apps use my advertising ID for experiences across apps.

Just like google, Bing also stores all your search history. Unlike Google, they don’t make you re-enter your password to view it. So if you boyfriend leaves his laptop open why on the toilet, you can just have a gander at how he search for “Brazilian fart porn” at 22:43 on Sept 12, 2016. https://www.bing.com/profile/history

This statement is false

Price Paradox

It is important to price your products and services correctly. Getting the price wrong can turn away many potential customers. When a business finds itself in trouble, many will suggest cutting prices to improve sales. They say that if you drop prices, you will be more competitive and so more customers will come to than to your competitors. However, cutting prices is often the absolutely wrong thing to do and it could very well be the last nail in the coffin for your business.

Kentucky Fried Chicken has been having some problems recently. In particular, the Chinese branch of KFC has not made the profit it used to.

It may surprise you, but Yum, the group that own KFC and other restaurants such as Pizza Hut and Tacho Bell, do 36% (2010) of there business in China. Since KFC’s introduction in 1987, they have expanded steadily throughout China and KFC now have over 4200 stores there as of the beginning of 2013. It is in stark contrast with KFC in the USA which has seen a contraction due to competition, in China KFC just keeps on growing and there is still room to expand with new stores opening every week. The year 2011 saw sales in China grow by 21%.

That said, 2012/13 has not been a good year for KFC in China. Two big health scares have shaken public confidence in finger licking good sector.

The first came in December 2013 when Chinese inspectors announced that samples of Chicken from suppliers of KFC based in Shandong Province had given their chickens excessive amounts of antibiotics, including amantadine and ribavirin. The farmers had been trying to accelerate the growth rate of the chickens. The Shanghai Food and Drug Administration said that tests conducted by a third-party agency between 2010 and 2011 had found that eight batches of chicken meat supplied to the company by Liuhe Group Co., contained excessive levels of antibiotics.

China has had quite a number of similar scares about food additives in recent years. The biggest of which was the tainting of milk supplies with melamine which caused several babies to die and many more to become seriously ill. The scare around KFC, a popular treat for kids, caused many parents to stop taking their children there.

The second scare was at the end of March 2013 near Shanghai. An outbreak of H7N9 bird flu caused several people to die and many others became ill. Although bird flu cannot be caught by eating chicken, a nervous public stopped eating chicken produce throughout China.

Sales in KFC fell sharply throughout the first two quarters of 2013. Sales, which had fallen noticeably in the first quarter due to the supply scandal, saw a further 29% decline for the month of April 2013. May had an estimated 19% fall and June continues the trend albeit with a slowing fall of 10%.

The response to this problem was in my oppinnion the wrong one. KFC cut it prices.

KFC has always been an expensive choice in China. This has played to its advantage where Chinese people saw KFC as a high quality brand. The idea of American, foreign food that is high quality, tasty and convenient is what made KCF a Chinese success. A typical meal of hamburger, medium fries and cola would cost about 28 RMB. In a country where the average income is just 1500 RMB per month, that is a substantial cost for most people. However, the boom of the economy over the last decade meant that the new middle class could afford to regularly eat this luxury product.

So in April, ignoring the nonsensical flu scare, I went to KFC for lunch. I had in hand a set of coupons that had been posted through my door two weeks before. KFC posts such coupons every three months and I usually make use of them to save a little money. However, after giving my order to the counter staff, she handed me back the coupons. KFC had changed its prices, not just by a little bit, they had slashed them nearly in half. The burger, fries and coke had dropped from 28 RMB to just 15 RMB.

By reducing the price, KFC thought it could stem the fall in sales. It didn’t work. Sales fell non the less because price is not the key factor in the KFC purchase. Other aspects such as quality, convenience, foreignness and taste are what bring customers in. Dropping the price would not influence the customer choice as they would still see the issues of additives and flu as dominant.

KFC is not without competition in China. While other American brands such as McDonalds and Burger King do have a Chinese presence, they are no where near as compressive in coverage of the land. McDonalds has 1300 stores and Burger King, just 64 stores, in China at the beginning of 2013. Rather the competition comes from home grown Chinese and other Asian brands such as Discos, who have a very close copy of KFC’s menu.

Discos was affected by the bird flu just the same as KFC was. They matched KFC’s price cut to the penny.

So the situation was this: KFC were selling fewer chicken meals than before for less money than before. Is it any wonder that they posted a loss of 239 million RMB, or $39 million for the second quarter of 2013.

Things are improving. KFC in China will recover. It won’t be because of the price cut. Rather, as media reporting on the avian flu reduces and the additives scandal becomes just a distant memory, sales will go back to what they were before.

The lesson to be learned here is that reducing prices is not always the best way to increase sales. KFC could probably have kept its price level throughout 2013 and though sales would have fallen they would have made less of a monetary loss.


Icecream iPhone 5

iPhone 5 is no Ice Cream Sandwich

The long awaited iPhone 5 was recently put on show, however, in China, people have been already been buying their iPhone 5™. Here in China the iPhone 5™ is not a advanced mobile phone, but in fact a brand of ice cream. The iPhone 5™ ice cream has been heavily marketed across the country with adverts everywhere. This has in turn made the iPhone 5™ ice cream very popular throughout the summer months.

I managed to get my hands on one to try out. They come in two flavours, pear and orange. I wonder why pear not apple flavour? Outwardly the packaging shows a picture of a mobile phone similar to, but not actually, an iPhone. Inside is an ice cream on a stick. The iPhone 5™ ice cream is shaped like the apple in the apple logo, except without the signature bite out of the side. You have to make the bite mark yourself. Eating the iPhone 5™ ice cream is pleasant. It is not the best ice cream but good enough that I would buy it again.

The company who produce the ice cream, Deshi Group, have applied for the trademark for iPhone 5™ as a type of ice cream. We will have to wait an see if Apple try to fight that. Apple has already received a bloody nose in China over its trademark registration for other products. In the mean time,  “The ice cream is a bestselling product.” Gao Yuxin, head of the marketing center of Deshi Group.

Blackhawk drops leaflets

Leaflets, Flyers and doorhangers

Many small businesses use leaflet drops as part of their advertising and marketing activities. They may be handed out in the street, at the entrance to a building, placed on peoples doors, cars or into letterboxes. However the distribution method works, the process of designing the campaign remains largely the same.

Leaflet drops work through a numbers game. For every X many thousand flyers you hand out, you will get Y new leads which in turn lead to Z sales. The difference between X and Y is huge. You could hand out many thousands of flyers just to get one sales lead. It is important to understand this before you start. A common mistake with leaflet drops is to just not hand out enough of them to have any effect. People miss-estimate the conversion ratio, they miss-estimate the time it takes to deliver thousands of flyers. After handing out 5,000 flyers, you might feel you’ve done a good days work but you’ll likely be disappointed with the rewards. To get the response to your flyers you have to hand out enough of them. If you are serious about this as a marketing method, put your hand in your pocket and pay out for many tens of thousands of flyers and put in the weeks of leg work required to deliver them all.

The user Crabcake Jonny gives an example of the sort of numbers game involved. Jonny works in insurance and uses doorhangers to provide his leads. He says:

It’s taken them around 2 to 3 weeks to get them out in the past. My return in the past has been .05% closing 1 out of 6 with average premium of around $3,100.


10,000 X .05 = 50 leads = 8 apps X $3,100 = $24,800 AV X 20% = $4,960.

I do indeed personally place 200 per hour in townhome areas – 2 hrs per day = 10 hours per week = 2,000 hangers which means in 2.5 week you’ll have placed 5K worth of business.

Notice that he does 10,000 doorhangers, he delivers 200 per hour, it takes him 3 weeks to delver the all and he only gets 50 new leads for all that work. Jonny’s saving grace is that he has a good lead to sales conversion rate and a high income per sale. If you were selling a lower priced or had a poor lead to sales conversion then the product then the numbers just wouldn’t be profitable.

This is just one example. The numbers for your leaflet drop might vary considerably. I’ve seen some people claiming conversion rate of 1 lead for every 20 leaflets while others get just 1 lead for every 3,000 leaflets. However the numbers work for you, the more leaflets you deliver the more effective your marketing will be.

Many leaflet drops simply had one flyer to everyone they can. Whither it is people walking past the agent or put on someone’s door, everyone gets one. This lacks targeting. A great many leaflets are going to go to people who have no interest in your product or service what so ever. To increase the bang for buck of your campaign, you should try to target your market.

For example, if you have a service designed for people who own cars, you don’t hand out your leaflets to people waiting at a bus stop because they clearly don’t own cars. Instead you would put the leaflets onto car windows in a car park. This will save you time and money and provide more leads for your effort.

It is important to research before you start that your target market is large enough. If you find there only are 3,000 potential customers in your target area then you won’t get the number large enough to see any conversions as described in the previous section. A smaller market sector like that might be better targeted by a more personal direct approach than the stand off effect of flyer drops.

Reducing dropped adds
You always know someone is doing a leaflet drop further up the street long before you see the agent because you see the litter from the many discarded flyers dropped without even being read. This in part can be reduced by targeting your campaign. If people are really interested in your ad then they will keep it. If you are giving the flyers to the wrong people, then they will be discarded quickly.

Some things that will help increase retention of the leaflets and reduce droppage:

  1. Include some special offer coupon on the leaflet, requiring the people to bring the leaflet to your sales area.
  2. Add a competition to the leaflet. This not only requires people to keep the leaflet but also ensures you capture their name, address, telephone and email at the same time.
  3. Make the leaflet into something useful. For example print it on a shopping back or a common one in Japan is to print onto the side of packet of tissue papers. People will keep this item because it is useful even if they are not initially interested in what you are selling.

People rarely by instantly when presented with a new offer. It takes time to build familiarity. Also your drop just might not have happened at the time they were wanting to buy. Repeating your campaign again and again is important to creating an effect in your market segment. Plan to repeat your leaflet drop three or six times at first before trying to gauge the effect it is having. Each time you repeat, you will have more impact that before as people get to know you and your service.

Call to action
What is the flyer asking people to do. What do you want recipients to do next. Are they to telephone, email, visit a web page, come to your office or what? Many flyers just offer all the contact details of the agent and don’t give a clear path. People may choose the path that is easiest for them, not the path that is most effective for your marketing. For example, if people have to come to your store to purchase something, then telephone enquiries are not really useful to you. You should make it clear that customers should come to your store. Make that action big and strong and reduce the prominence or omit other details. If you want people to telephone you then put the telephone number in big letters and drop your office address.

Tie the action with a reward and it becomes more effective. Compare “Telephone 1234 123456” with “Telephone 1234 123456 now for a free sample”. People respond to something more if they can see the reason for their action clearly. Command words like “now” and “today” also have a strong effect on people causing a stronger response to the flyer.

Simplicity sells
Be careful not to put too much onto your flyer. Keep focused on your target audience. Extra irrelevant information will have a negative effect on the flying. Don’t list every service you can offer in the hope that the recipient might be interested in one of them. It is likely their eye will catch the services that they don’t need and not see the service they needed resulting in them discarding your leaflet. Only put information on the leaflet that is essential for that stage of the marketing process. This ties in with targeting and calls to action above. The service(s) offered must match the target market. The information must lead to the call to action. A call to “Telephone for more information” might not work if you have already provided all the information the customer could ever want. Keep it simple and use a clear, attractive but easy to read design and you will maximise the effect of the flyer.

Steve Jobs Mozac

Google announces the death of JPG

Today google announced a new improved image format for use on the web. They hope that the new webP format will replace the old JPG format that is in common use today.

According to google, 65% of web traffic is images. Anything that can reduce the size of those images will help to speed up the web generally.

That is the aim of the new format. It’s creators claim that on average, webP will reduce image file sizes by 39% compared to JPG. Like the old JPG format, the webP format is lossy – that is, you can trade quality for size to compress files as much as you are comfortable with. DNS Elite does see some problems with this new format.

The first and probably most important is support for the format in web browsers. Without decent cross-browser support, the new format will fail to take off.

Just look at other new image formats such as PNG and SVG. Even years and years after their creation, and even though everyone agrees they are better than their alternatives, they still lack full cross browser support. Without this, designers are reluctant to use these formats.

The new webP format may suffer the same fate. There is a catch 22 involved of course. Most browser creators won’t introduce a new feature unless there is demand and designers won’t use a feature that is not fully supported across the range, including old legacy browsers.

So webP has its work cut out as a new image file format. It could be 10 years or more before we see it take significant market share, if ever.

Image by Tsevis under Creative Commons Attribution-NonCommercial-NoDerivs 2.0 Generic Licence.

Social Media

Just what is the web stuff all about anyway?

The internet and more so the web has changed our lives forever. Nobody could have, 10 years ago, predicted the highly interconnected social web that has been created today. The web of 10 years ago was for the geek. Their vision for the future was an Internet Refrigerator that was aware of your shopping requirements and would order you groceries automatically. Such autonomous, non-personal, applications have failed to happen. Instead, the web has connected and socialised, the reverse of geekiness. Now the web is social life. It is how we arrange to meet friends rather than an excuse for not having any.

I recently came across a youtube video that neatly explains just what the web is and how it has been evolving. Hope you enjoy.

Social media tag cloud. Image by DavidErickson under Creative Commons Attribution-NonCommercial 2.0 Generic