Sunday, August 10, 2014

Why Responsive Design?

I have been researching the concept of responsive design a lot after first hearing about it in my advanced web development and user interface classes in school during my senior year. I had my first websites up and running in 2004, but I didn't know much more than HTML, CSS, and content management until college. When I was first introduced to this lovely concept, I thought it was the most convenient and pretty looking thing I've ever seen. Later that year, I did the mobile application development contest with a friend from school and we took second place in the pair division. I've always enjoyed having a balance with front and back end development, but I always have the desire to implement my creativity wherever possible while still being able to program. The idea of not always having to zoom out to see the page on your phone screen and be able to not have to scroll several times over again to see the entire page definitely captivated me and caught my eye. With all of the research I continue to do on this fascinating topic, I am going to keep adding to this blog. With that, I hope you all enjoy making the internet looking clean, pretty, and accessible to everyone!


Why did I choose Responsive Design for my website? - As I mentioned above, besides for loving to paint the internet pretty and classy, I am definitely a big fan of compatibility, making something as easy as possible to use, and being able to make the most of whatever resources you have.

Issues with Responsive Design? – The only downfall I’ve seen besides for it being new is that HTML5 and CSS3 aren’t compatible with Internet Explorer, which makes the page look kind of wonky when loaded in that browser.

More awesomeness to come soon!

Saturday, August 9, 2014

Move Forward from Rejection

Rejection happens to everyone... whether it's a job that you're applying for, an audition you just had, or whatever it is, it's inevitable and I want the rest of the world to know that you shouldn't feel like it's the end of the world or feel down in the dumps for a long time just from one "sorry letter". To show that it happens to the best of us and that we are all human and can't get accepted to "everything" you apply for (unless you're extremely lucky), I found an old one sitting in my emails, made a little graphic of it, and crossed out all personal information to protect the identity of people and the company!


Saturday, July 26, 2014

What is Dojo (Programming)?

The reason why I’m writing a blog on this is because I want to practice my skills in blog writing in regards to IT-related topics, I want to learn about programming more (and do it more too of course), and I have an assignment at work where I’m helping someone else with Dojo. I’ve never done anything with Dojo (until working), but I have experience from school with Javascript and JQuery. As long as you have a knowledge of one or both of those, you can at least have some sort of beginning foundation to learn Dojo.

The simple answer is that it’s an open source Javascript library/toolkit that adopts functions similar to JQuery, but unfortunately, my coworkers say that it’s harder to understand and utilize than JQuery or Javascript… The main functions it provides (in a workplace) are widgets containing charts and graphs. Dojo is used with asynchronous communication to the server and browser, which means that AJAX functions need to be implemented in order to update content without having to reload the entire page. With Dojo, data can also be stored locally on the client-side securely and with authentication from the user and stored in the server through datastore implementations from the dojo.data namespace.

What is The Onion Router?

I definitely found my final paper for my telecommunications class (which I got an A on) and I am happily posting it here thanks to my fascination with this. The paper is formalized and credit goes to me and everyone listed in the "sources" section below. Enjoy!

The Onion Router

Abstract

The Onion Router (TOR for short) is “a circuit-based low-latency anonymous communication service.”[1] Its purpose is to provide users with a way to access online networks without having the IP address recognized. Internet activity is difficult to trace because of encryption. Layers of relays are encrypted and re-encrypted multiple times and sent across a virtual circuit, which is relayed across the Internet similar to a traffic relay. The process of the relaying can be looked at and compared to layers of an actual onion. TOR protects users from traffic analysis, which can be a major issue in countries with very stringent censorship. Some reasons why people use TOR are to find a loophole around censorship bills, such as CISPA, PIPA, and SOPA. TOR is sponsored and funded by the US Naval Academy and is now developed by the TOR Project.

Keywords: TOR, encryption, relays, IP address anonymity, layers, low latency, traffic relay, traffic analysis, censorship

1. History

           TOR released its first alpha version of the software on September 20, 2002 that was used to communicate sensitive information to bases from naval ships.  Three men named Roger Dingledine, Nick Mathewson and Paul Syverson first created this software. A lot of its funding comes from the US government. The US Naval Research Laboratory originally sponsored TOR. In 2006, the software began being developed by the TOR project, which is a 501(c)(3) research-education nonprofit organization and now has plenty of financial support. Now, as of 2012, 80% of TOR’s $2million dollar budget comes from the US and Swedish governments, as well as other integral supporters. 

           "Using free software, Tor has enabled roughly 36 million people around the world to experience freedom of access and expression on the Internet while keeping them in control of their privacy and anonymity. Its network has proved pivotal in dissident movements in both Iran and more recently Egypt." [2] Now, TOR is described as a (from Jacob Appelbaum) "part of an ecosystem of software that helps people regain and reclaim their autonomy. It helps to enable people to have agency of all kinds; it helps others to help each other and it helps you to help yourself. It runs, it is open and it is supported by a large community spread across all walks of life." [3]

2. How TOR Works

           Think of an actual onion. An onion has many layers inside of it. With these layers, when TOR is launched from your browser (ex Firefox), you connect to the TOR relay network. The TOR relay has traffic pass to multiple relays. There are several layers, each being one relay with a different IP address. It is almost impossible to determine the IP address of your computer (or the computer you are running TOR from) because during the encryption/re-encryption process, the IP address is hidden. The relay and IP address change as traffic goes between the relays. The IP address is anonymous because TOR doesn’t pick up your computer’s IP address, but it picks up the IP address of the last relay.

           Relays (or layers) are chosen randomly based on the speed, as well as what is closest to where you are/where your destination is. It also takes into account which relay has the least amount of users on that particular relay. After all factors are taken into account, the “best” relay is used; if the best relay is not available, the next best relay is used. The same relay/path is also not used every time. Users can also set the amount of available bandwidth to use.

2.1. Relaying the Traffic

           Since traffic is relayed and people who use this want to keep as low of a profile as possible, the bandwidth can be set in order to keep a low latency. According to figure 1 (below), the public relay (the default setting, which is the one in the middle in the image) is used for any standard network where either you don’t want your location to be tracked through the network. This is also used if you’re trying to access a blocked website. For example, when accessing facebook at work when you’re not allowed to, this helps prevent whoever is checking IPs from seeing and knowing that facebook was accessed from that workplace. Also, if someone is working with a non-government agency in a foreign country when the user doesn’t want to disclose his or her location, as well as wanting to access the agency website, this setting is also ideal. The bottom setting is used when users are trying to get around countries that have strong Internet censorship or highly monitored Internet, such as China, that prevent users from accessing social networking sites, Google, and even Youtube.


Figure 1: This figure shows TOR settings that users would see when using the software [4]

3. TOR and Stringent Censorship Laws

           Many countries, such as China, have very strict censorship laws. According to an article from the New York Times, China has completely blocked websites, such as Google and Youtube. [5] This would be a reason to use TOR because people would want to find ways around the stringent censorship. Even worse, “Although the existence of an Internet police force - estimated at more than 30,000 - has been known for some time, attention has previously focused on their work as censors and monitors. Countless critical comments appear on bulletin boards of major portals such as Sohu and Sina only to be erased minutes, or sometimes just seconds, later. In the most recent case, all postings that blamed corrupt local officials or slow-moving police for the deaths of 88 children in floods last Friday were removed almost as soon as they appeared.” [6] People are outraged, especially in America, by these actions because of how radical and violating they are.

          People should be entitled to post whatever they want on the internet, even political remarks, because it’s a first amendment constitutional right, at least in the US. CISPA, PIPA, and SOPA are examples of bills being passed around the government that are used for regulating Internet privacy/censorship. Although there are many risks for posting something controversial on the Internet, one of the biggest issues is the posting of political comments.

3.1. CISPA

           The most relevant one of the Internet regulation bills is CISPA because PIPA/SOPA are currently on hold and not being dealt with in Congress. CISPA also encompasses both PIPA and SOPA.

           CISPA is the Cyber Intelligence Sharing and Protection Act, as well as the post SOPA/PIPA. If this bill is passed, military and government agencies will be able to share private information from people/companies without a warrant if they think a threat is being imposed. For example, if you download a copyrighted movie, you are mandatorily entitled to share your information with the government and have all of your Internet activity being monitored. Many people disagree with using CISPA being passed in Congress because they feel like it violates amendment rights (ex privacy, freedom of speech). Online websites, such as Reddit, have even held protests of this bill by shutting down their website.


4. Why TOR?

          Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." [7] This picks up your Internet communication and the source/destination of your traffic (ex which sites you visit), as well as your private identity. TOR helps users to avoid these issues while creating a private network pathway to prevent your information from being tracked. For an e-commerce site, with knowing the destination of where the site is housed and where the users are located, price discrimination is used. Sometimes, people don’t want his or her location revealed; if it were to be revealed on a specific occasion, jobs could be jeopardized, as well as safety. Also, there are instances where users in America may want to stream BBC in Europe since it’s not available in America. Without TOR, when using media players such as HULU or Spotify, these media players check IP addresses to ensure licensing in the proper country. With censorship and violating constitutional rights becoming a constant issue, TOR makes sure that people’s private information remains private and not subject to government monitoring.

4.1. Traffic Analysis

          
With TOR, users want to keep personal information anonymous. With using traffic analysis, it is “a special type of inference attack technique that looks at communication patterns between entities in a system." [9] What that means is that messages are intercepted and examined within the communication patterns when messages are unable to be decrypted when they are encrypted. When the government observes messages for example, those messages, which may contain classified or illegal information, are intercepted and stored. Even more information can be taken from the traffic patterns and used against people. Traffic analysis is done for military intelligence, counter-intelligence, or when security may be an issue.

           From a more technical standpoint, with traffic analysis, data packets on the Internet have two parts: a data payload and a header. The payload contains whatever is sent across the network (ex an email, audio or video file). If the data payload is encrypted, traffic analysis can reveal much of the information due to the header, which is what traffic analysis focuses on. The header discloses information such as the source, destination, and size. An even more in-depth form of traffic analysis even defeats encryption tactics because only the traffic is hidden; the header is still revealed.

5. Uses of TOR in the Real World

           TOR is very widely used, such as by Indymedia, for protecting the privacy of members, as well as their security. Even activist groups, such as the Electronic Frontier Foundation (EFF) see TOR as software that can maintain integral civil liberties on the Internet. It is also used for online company competition analysis. Branches of the US Navy use TOR for gathering important information wile being deployed in the Middle Easy. Law enforcement uses TOR for website surveillance and security during sting operations. People generally are highly in favor of TOR because of how secure it is. It hides and distinguishes users on the TOR network to the most diverse user base. Anonymity is protected, which is what people like.


6. Conclusion

           TOR is a very useful tool for hiding IP addresses and the location of your personal machine. It is even more appealing because it is a free download. When launched in a browser, traffic is passed through multiple relays. Privacy is maintained because the last relay IP is picked up instead of the location of the computer itself. Many individuals and companies use TOR in order to protect personal information, safety, and even for downloading British TV in Tennessee. Since censorship is a very controversial issue in America, people want to use TOR as a legal loophole around the censorship and monitoring. People are very aggravated by CISPA and want to avoid legal issues. Even though people can still use TOR for illegal actions, ultimately, if users want to keep personal information private, TOR is the best tool that can be used out there.

Sources

[1] "Tor: The Second-Generation Onion Router." Tor: The Second-Generation Onion Router. N.p., n.d. Web. 23 Apr. 2013. <https://svn.torproject.org/svn/projects/design-paper/tor-design.html>.

[2] "Free Software Foundation." 2010 Free Software Awards Announced — — Working Together for Free Software. N.p., n.d. Web. 24 Apr. 2013. <http://www.fsf.org/news/2010-free-software-awards-announced>.

[3] "The Verge." The Verge. N.p., n.d. Web. 25 Apr. 2013. <http://www.theverge.com/2013/3/11/4091186/interview-uncut-jacob-appelbaum>.

[4] "Tor." Project: Relay Configuration Instructions. N.p., n.d. Web. 23 Apr. 2013. <https://www.torproject.org/docs/tor-doc-relay.html.en>.

[5]
"Google Is Blocked in China as Party Congress Begins." Bits Google Is Blocked in China as Party Congress Begins Comments. N.p., n.d. Web. 26 Apr. 2013. <http://bits.blogs.nytimes.com/2012/11/09/google-is-blocked-in-china-as-party-congress-begins/?ref=internetcensorship>.

[6] Watts, Jonathan. "China's Secret Internet Police Target Critics with Web of Propaganda."The Guardian. Guardian News and Media, 13 June 2005. Web. 3 May 2013. <http://www.guardian.co.uk/technology/2005/jun/14/newmedia.china>.

[7] "Tor." Project: Overview. N.p., n.d. Web. 23 Apr. 2013. <https://www.torproject.org/about/overview.html.en>.

[8] "Linux, BSD, and Everything Else..." : Using Tor to View Restricted Video Sites Internationally. N.p., n.d. Web. 2 May 2013. <http://all-things-linux.blogspot.com/2011/07/using-tor-for-viewing-restricted-video.html>.

[9] "Security Laboratory." Traffic Analysis. N.p., n.d. Web. 3 May 2013. <http://www.sans.edu/research/security-laboratory/article/traffic-analysis>.


Sunday, July 13, 2014

How to Use Five Slightly Complex Microsoft Word Functions

Five Somewhat Complex Word Function How-To’s

Note: This is for Microsoft Word 2011. There are two ways to complete each of these functions. One using the top menu bar (“file”, “edit”, “view”, etc.) and the other is to use the tabs at the top of your document window that list “Home”, “Layout”, “Document Elements”, “Tables”, “Charts”, “Smart Art”, and “Review” (except for making the document a webpage). For this project, I will be discussing the latter.

How to change the margins

If you have no idea what margins are, a margin is how far across the page the words extend to.  This is how you make the margins bigger (more whitespace) or smaller (less whitespace):

1. In the list of tabs., next to the button that says “home”, click on the one that says “layout”
2. There are 5 separate areas to look at that deal with adjusting the page orientation. The one on the very left says “page setup” and the one next to it says “margins”. Look at “margins”
3. You can click on a predefined set of margins by clicking on the dropdown arrow and selecting whichever one you want (larger number = more whitespace, smaller number = less whitespace)
4. You can also manually adjust the margins where it says “top”, left”, “bottom”, and “right”


How to place an image from a file onto the page

1. In the list of tabs, stay on the “Home” tab that is preselected
2. Under where the tabs are listed, there are 5 separate areas to look at. Look under “Insert”, which is fourth from the left
3. Click on the dropdown that says “Picture”, which is on the right of the “Insert” area
4. You can either put in clip art or an image that’s saved onto your computer. This time, we will focus on an image saved onto your computer. In the four options listed in the dropdown, click on “Picture from File”, which is the second one from the top
5. A popup will appear in which you can select the image you want on the page
6. Resize the image by clicking on it to make sure the image is highlighted and adjust the image according to how you want it to look/its size

How to make a word document into a web page

In Microsoft Word, a webpage file is listed as a .htm file, which basically enables you to use HTML or be formatted to be displayed on a webpage. HTML is a basic web programming language that is understood by the browser in order to display your content according to your formatting. Here is how you save a document as a webpage:

1. On the top menu bar, after typing your document out, go to “File” and then “Save as Webpage”. A popup window will appear
2.  Enter the name of your document into the text field on top. Leave the rest of the options as default
3. Click on the “ok” button to save the document as a .htm file, which is preselected

How to insert a (text) watermark

If you have no idea what a watermark is, it’s text that appears in a lighter shade behind the rest of your text (or image). This is how you make a watermark:

1. In the list of tabs, click on “Layout”
2. In the second from the right area, look at where it says “Page Background”
3. Click on the “Watermark” icon, which is a picture of a piece of paper with an “A” in it. A popup window will appear
4. The “No Watermark” option is selected by default. Change that to “Text”, which is the last radio button listed
5. When you click on the “Text” radio button, a bunch of options are enabled. Change the font, size, and color. Leave the rest of the options as default
6. To apply these changes, click on the “ok” button

How to put a bibliography in a document without using easybib.com and copying/pasting it

1. In the list of tabs, click on “Document Elements”        
2. In the third from the right area, look at where it says “References”
3. Leave “APA” selected and click on the “Bibliography” drop down. Click on “bibliography”. An area to enter your sources will appear where your cursor is
4. Enter your sources as needed


Updates to Come!

Hello everyone!

Besides for updating a couple of the posts, I haven't made any updates to this particular blog in awhile and am definitely planning on posting much more!

I also decided to change the title from "IT Interview 101" to "IT Field Success" because I want to post about IT-related topics besides for "just interviews" as well.

Any other ideas that come to mind I will post here as well. Enjoy and happy technology reading!