Archive for Security

Google Security Alert

Tuesday, September 9, 2008

Do NOT Use Chrome

Google Chrome LogoOn September 5, 2008, Google announced the launch of its own web browser. Chrome was billed as an open source browser with a “faster more reliable experience.” Seeing as how I might have to eventually program to this browser, I downloaded it for a test-drive to see how it rendered pages compared to Firefox and Internet Explorer.

Posted by: Read full story »
Filed Under: Articles, Product Reviews, Security, Web Design and Development
Tags: , , , , , , ,

Freelancers and Getting paid for Web Rights

Friday, August 22, 2008

A Federal Appeals Court Voids Agreement for Back Pay

New York Times LogoThe New York Times reported on November 20, 2007 that a federal appeals court had thrown out an agreement between freelance writers and publishers. The publishers agreed to pay damages for putting early articles on the web without first securing the rights. (For the whole article, visit the New York Times: Appeals Court Voids Agreement to Pay Freelancers for Work Published on the Web.)

Posted by: Read full story »
Filed Under: Articles, For Writers, Marketing, Security
Tags: , , ,

Personablity vs Security: The Writers’ Quandary

Friday, August 22, 2008

I just saw something scary. I was researching some possible platform building forums for a client when I ran across one that made me cover my face with my hands and shake my head. There on the page, visible to everyone—whether they were members of the forum or not—was a woman who had posted details about herself, her family and her kids as part of this online community. Interspersed with the text were pictures of each of her five kids, labeled with their names and ages. This was signed with her full name, city and state of residence. I scraped my jaw up off of the floor and, on a whim, I went digging into her past posts. I found details about her kids’ personalities, food preferences, school—the list goes on and gets even scarier.

Posted by: Read full story »
Filed Under: Articles, For Writers, Marketing, Security
Tags: , , , , , , ,