<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet | KC's Blog</title>
	<atom:link href="https://www.kjctech.net/category/internet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.kjctech.net</link>
	<description></description>
	<lastBuildDate>Fri, 06 Oct 2023 17:22:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://i0.wp.com/www.kjctech.net/wp-content/uploads/2016/12/cropped-KC-Logo.png?fit=32%2C32&#038;ssl=1</url>
	<title>Internet | KC's Blog</title>
	<link>https://www.kjctech.net</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">24634607</site>	<item>
		<title>Time to Upgrade Your Monitor</title>
		<link>https://www.kjctech.net/time-to-upgrade-your-monitor/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=time-to-upgrade-your-monitor</link>
					<comments>https://www.kjctech.net/time-to-upgrade-your-monitor/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Mon, 22 Jun 2020 06:43:52 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4486</guid>

					<description><![CDATA[<p>Time to upgrade your monitor. Is it? When you are getting older, your eyes kind can&#8217;t keep up with all those tiny words on a very high-density monitor. For me, a 1080p type works pretty well in most of the cases. According to the DPI Calculator, 100 or so PPI seems to fit me well. But guess what, the world [&#8230;]</p>
The post <a href="https://www.kjctech.net/time-to-upgrade-your-monitor/">Time to Upgrade Your Monitor</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Time to upgrade your monitor. Is it? When you are getting older, your eyes kind can&#8217;t keep up with all those tiny words on a very high-density monitor. For me, a 1080p type works pretty well in most of the cases. According to the <a href="https://www.sven.de/dpi/" target="_blank" rel="noreferrer noopener">DPI Calculator</a>, 100 or so PPI seems to fit me well.</p>



<p>But guess what, the world will just move forward regardless of how bad your eyes become.</p>



<p>So, it&#8217;s <a href="https://tonsky.me/blog/monitors/" target="_blank" rel="noreferrer noopener">time to upgrade your monitor</a>, a great, very informative essay.</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p>To sum up, this is the best setup for programmers:</p><p>1. Text can&#8217;t be made look good on low-resolution displays.<br>2. High-PPI displays are now a commodity, it&#8217;s time to switch.<br>3. Notebooks are ok, but a standalone monitor is always better.<br>4. 4K monitor only makes sense with 2x / 200% scaling.<br>5. If you want to got further, there are now affordable 4K @120 Hz options.</p><cite><a href="https://tonsky.me/">https://tonsky.me/</a></cite></blockquote>The post <a href="https://www.kjctech.net/time-to-upgrade-your-monitor/">Time to Upgrade Your Monitor</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/time-to-upgrade-your-monitor/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4486</post-id>	</item>
		<item>
		<title>How Ransomware Evolved</title>
		<link>https://www.kjctech.net/how-ransomware-evolved/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-ransomware-evolved</link>
					<comments>https://www.kjctech.net/how-ransomware-evolved/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 11 Jun 2019 22:48:24 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Ransomware]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4357</guid>

					<description><![CDATA[<p>In a webnar that details how MegaCortex, the most recent Ransomware, attacks the network, the presenter from Sophos briefly introduced how Ransomware evolved over the years, way back from 1989 when an AIDS trojan was spread by 20K floppy disks via postal office to most recent years attacks including WannaCry in 2017 and MegaCortex in 2019. Guess how many type [&#8230;]</p>
The post <a href="https://www.kjctech.net/how-ransomware-evolved/">How Ransomware Evolved</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>In a webnar that details how MegaCortex, the most recent Ransomware, attacks the network, the presenter from Sophos briefly introduced how Ransomware evolved over the years, way back from 1989 when an AIDS trojan was spread by 20K floppy disks via postal office to most recent years attacks including WannaCry in 2017 and MegaCortex in 2019.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img fetchpriority="high" decoding="async" width="1600" height="899" src="https://i1.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?fit=600%2C337&amp;ssl=1" alt="" class="wp-image-4358" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?w=1600&amp;ssl=1 1600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=250%2C140&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=450%2C253&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=768%2C432&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=600%2C337&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=700%2C393&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=520%2C292&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=360%2C202&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?resize=100%2C56&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-001.png?w=1280&amp;ssl=1 1280w" sizes="(max-width: 640px) 100vw, 640px" /></a></figure>



<p>Guess how many type of ransomware out there? Believe it or not, there are thousands, definitely not covered by the image below:</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png" data-rel="lightbox-image-1" data-rl_title="" data-rl_caption="" title=""><img decoding="async" width="1600" height="899" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?fit=600%2C337&amp;ssl=1" alt="" class="wp-image-4359" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?w=1600&amp;ssl=1 1600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=250%2C140&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=450%2C253&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=768%2C432&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=600%2C337&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=700%2C393&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=520%2C292&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=360%2C202&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?resize=100%2C56&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/GoToWebinar-002.png?w=1280&amp;ssl=1 1280w" sizes="(max-width: 640px) 100vw, 640px" /></a></figure>



<p></p>The post <a href="https://www.kjctech.net/how-ransomware-evolved/">How Ransomware Evolved</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/how-ransomware-evolved/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4357</post-id>	</item>
		<item>
		<title>How To Check if My Email is Encrypted during Transition</title>
		<link>https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-to-check-if-my-email-is-encrypted-during-transition</link>
					<comments>https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Sun, 09 Jun 2019 05:04:43 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[email]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[outlook]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4344</guid>

					<description><![CDATA[<p>Back to the old days when everything goes through the classic SMTP, nothing gets protected. Those were the good days for any man in the middle, picking up confidential information like free gift. Not anymore with the use of TLS, StartTLS, or even better S/MIME which is suitable for your most sensitive information. Every email sent through TLS is encrypted [&#8230;]</p>
The post <a href="https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/">How To Check if My Email is Encrypted during Transition</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Back to the old days when everything goes through the classic SMTP, nothing gets protected. Those were the good days for any man in the middle, picking up confidential information like free gift.</p>



<p>Not anymore with the use of TLS, StartTLS, or even better S/MIME which is suitable for your most sensitive information.</p>



<p>Every email sent through TLS is encrypted to protect the message in transit from one server to another. It requires both mail servers to follow along in order for the encryption to work. But not all mail servers are equally made. If an email is sent via TLS but the other end doesn&#8217;t accept TLS, the email will be degraded from TLS. Like back to the old days, email gets decrypted and delivered in plain text. Bad news for you but good news for the man in the middle.</p>



<p>According to <a rel="noreferrer noopener" aria-label="Google (opens in a new tab)" href="https://transparencyreport.google.com/safer-email/overview?encrypt_region_table=region:001;encryption_level:RED&amp;lu=encrypt_region_table" target="_blank">Google</a>, during a 3-month period between March 11, 2019, and June 9, 2019, 89% of emails going out from Gmail and 94% of email received by Gmail are encrypted. And who are the top bad guys?</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-6.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img decoding="async" width="1152" height="569" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?fit=600%2C296&amp;ssl=1" alt="" class="wp-image-4349" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?w=1152&amp;ssl=1 1152w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=250%2C123&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=450%2C222&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=768%2C379&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=600%2C296&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=700%2C346&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=520%2C257&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=360%2C178&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-6.png?resize=100%2C49&amp;ssl=1 100w" sizes="(max-width: 640px) 100vw, 640px" /></a></figure>



<h2 class="wp-block-heading">So how to tell if my incoming emails are encrypted</h2>



<h3 class="wp-block-heading">Gmail</h3>



<p>Google is on top of a lot of things. This is no different. If you are using Gmail as your main mail app, you can easily tell whether the email you received has never been intercepted by the man in the middle.</p>



<p>When you get an email, click the little down arrow to reveal the header and you will find if the message was received through TLS or other encryption method.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="749" height="402" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?fit=600%2C322&amp;ssl=1" alt="" class="wp-image-4348" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?w=749&amp;ssl=1 749w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=250%2C134&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=450%2C242&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=600%2C322&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=700%2C376&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=520%2C279&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=360%2C193&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-5.png?resize=100%2C54&amp;ssl=1 100w" sizes="auto, (max-width: 640px) 100vw, 640px" /></figure>



<h3 class="wp-block-heading">Outlook</h3>



<p>Not as easy as Gmail but still can be done. Open the email you received from outside, click File > Properties.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-7.png" data-rel="lightbox-image-1" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" width="600" height="519" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=600%2C519&#038;ssl=1" alt="" class="wp-image-4350" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=600%2C519&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=250%2C216&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=450%2C389&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=768%2C664&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=700%2C605&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=520%2C450&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=360%2C311&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?resize=100%2C86&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-7.png?w=769&amp;ssl=1 769w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></figure>



<p>And look through the Internet headers section. If you see the word TLS in there somewhere you can safely tell your email is safe during the transition.</p>



<h2 class="wp-block-heading">How to tell if email I am sending is encrypted</h2>



<p>For Gmail, if you have S/MIME enabled on your account, you will see a lock icon that shows the level of encryption supported by your message&#8217;s recipients. Otherwise, there is no direct way to tell whether your email will be safe all the way to the other end.</p>



<p>But there are a few workarounds that we can still take.</p>



<p>First, we can start with an introduction email and only start sending confidential content after receiving one email from other party and verified that it&#8217;s safe.</p>



<p>Or, we can use a <a rel="noreferrer noopener" aria-label="TLS checker (opens in a new tab)" href="https://www.checktls.com" target="_blank">TLS checker</a> to scan and verify that the mail server used by the domain you are communicating with supports at least TLS. It&#8217;s safe to email me confidential stuff because it&#8217;s OK in the TLS column like below.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-8.png" data-rel="lightbox-image-2" data-rl_title="" data-rl_caption="" title=""><img loading="lazy" decoding="async" width="677" height="402" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?fit=600%2C356&amp;ssl=1" alt="" class="wp-image-4351" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?w=677&amp;ssl=1 677w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=250%2C148&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=450%2C267&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=600%2C356&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=520%2C309&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=360%2C214&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-8.png?resize=100%2C59&amp;ssl=1 100w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></figure>



<p>But never send confidential emails to the mail server that&#8217;s not safe like below.</p>



<figure class="wp-block-image"><img loading="lazy" decoding="async" width="639" height="398" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?fit=600%2C374&amp;ssl=1" alt="" class="wp-image-4353" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?w=639&amp;ssl=1 639w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=250%2C156&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=450%2C280&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=600%2C374&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=520%2C324&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=360%2C224&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=500%2C310&amp;ssl=1 500w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-10.png?resize=100%2C62&amp;ssl=1 100w" sizes="auto, (max-width: 639px) 100vw, 639px" /></figure>



<p>Last, if you are using Gmail and need the highest security for sending confidential via email, you can turn on the <strong>Confidential Mode</strong> so entire email communication will be secured.</p>



<figure class="wp-block-image"><a href="//i0.wp.com/kjctech.net/wp-content/uploads/2019/06/image-11.png" data-rel="lightbox-image-3" data-rl_title="" data-rl_caption="" title=""><img loading="lazy" decoding="async" width="651" height="190" src="https://i2.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?fit=600%2C175&amp;ssl=1" alt="" class="wp-image-4354" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?w=651&amp;ssl=1 651w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=250%2C73&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=450%2C131&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=600%2C175&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=520%2C152&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=360%2C105&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2019/06/image-11.png?resize=100%2C29&amp;ssl=1 100w" sizes="auto, (max-width: 640px) 100vw, 640px" /></a></figure>The post <a href="https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/">How To Check if My Email is Encrypted during Transition</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/how-to-check-if-my-email-is-encrypted-during-transition/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4344</post-id>	</item>
		<item>
		<title>Authenticating Emails with SPF, DKIM, and DMARC</title>
		<link>https://www.kjctech.net/authentic-emails-with-spf-dkim-and-dmarc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=authentic-emails-with-spf-dkim-and-dmarc</link>
					<comments>https://www.kjctech.net/authentic-emails-with-spf-dkim-and-dmarc/#comments</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Mon, 29 Apr 2019 18:55:20 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[email security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4288</guid>

					<description><![CDATA[<p>SPF, DKIM, and DMARC are different methods to authenticate your email to serve one dedicated purpose, detecting forged sender addresses in emails used in phishing or spam. SPF, Sender Policy Framework, allows the receiver to check that an email claiming from a specific domain comes from an IP address authorized by that domain&#8217;s admin. A typical SPF record is a [&#8230;]</p>
The post <a href="https://www.kjctech.net/authentic-emails-with-spf-dkim-and-dmarc/">Authenticating Emails with SPF, DKIM, and DMARC</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>SPF, DKIM, and DMARC are different methods to authenticate your email to serve one dedicated purpose, detecting forged sender addresses in emails used in phishing or spam. </p>



<p><strong>SPF</strong>, Sender Policy Framework, allows the receiver to check that an email claiming from a specific domain comes from an IP address authorized by that domain&#8217;s admin. A typical SPF record is a TXT DNS entry similar to this:</p>



<pre class="wp-block-preformatted"> "v=spf1 ip4:192.0.2.0/24 ip4:198.51.100.123 a -all" </pre>



<p>it simply tells that emails from the specific domain are sent either from 192.0.2.0/24 or 198.51.100.123 or should be rejected if came from anywhere else.</p>



<p>Tool to check SPF record:  <a href="https://mxtoolbox.com/spf.aspx">https://mxtoolbox.com/spf.aspx</a> </p>



<p><strong>DKIM</strong>, DomainKeys Identified Mail, allows the receiver to check that an email claiming from a specific domain was indeed authorized by the owner of that domain. It requires a digital signature linked to a domain name for each outgoing email message. At the receiver end, the email can be verified by looking up the sender&#8217;s public key in DNS. To achieve this, you will need a public key entry in the domain&#8217;s DNS as well as a digital certificate on the mail server.</p>



<p>You don&#8217;t need to implement both SPF and DKIM. Utilizing either one of them should be good enough.</p>



<p><strong>/Update on May 7, 2019/ </strong></p>



<p>Thanks to Dave for pointing out that you do need both SPF and DKIM. Yes, SPF and DKIM accomplish the same goal with a different approach. Implementing both would be ideal. I should have pointed out that most of the mail providers like Office 365 and G Suite have default DKIM in place for those who don&#8217;t have it implemented. It&#8217;s always recommended to use your own DKIM key on all outgoing messages.</p>



<p>Tool to verify DKIM setup: <a href="https://mxtoolbox.com/DKIM.aspx">https://mxtoolbox.com/DKIM.aspx</a> </p>



<p>To set up and enable DKIM in Office 365, follow <a href="https://docs.microsoft.com/en-us/microsoft-365/security/office-365-security/use-dkim-to-validate-outbound-email" target="_blank" rel="noopener">this documentation</a>.</p>



<p><strong>DMARC</strong>, Domain-based Message Authentication, Reporting, and Conformance extends both SPF and DKIM and gives the domain owners a way to protect their domain from unauthorized use, a.k.a email spoofing. A TXT entry was added in DNS as a policy to specify which mechanism (SPF or DKIM) is employed when sending emails from that domain and how to check From field presented to end-users.</p>



<pre class="wp-block-preformatted">"v=DMARC1;p=none;sp=quarantine;pct=100;rua=mailto:dmarcreports@example.com;"</pre>



<p>it simply translates that DMARC version 1 will be used with none in Policy, Quarantine in the subdomain, percentage of &#8220;bad&#8221; emails to apply the policy, and an email address to receive aggregate reports.</p>



<p>Note that <strong>_dmarc </strong>needs to be in the Host field when adding the TXT record. You will need to set up either SPF or DKIM first before setting up DMARC. A message that doesn&#8217;t pass SPF or DKIM checks triggers the DMARC policy.</p>



<p>Once it&#8217;s published, the mailbox specified in the entry will be getting reports in XML format once per day.</p>



<p>It&#8217;s recommended to set the policy to none when first implemented so no impact will be made to your email setup. Once you have collected enough data and analyzed it, you can then change the policy to either reject or quarantine.</p>



<p>Tool to verify DMARC record: </p>



<ul class="wp-block-list">
<li><a href="https://mxtoolbox.com/DMARC.aspx">https://mxtoolbox.com/DMARC.aspx</a> </li>



<li><a href="https://www.learndmarc.com/" target="_blank" rel="noopener" title="">https://www.learndmarc.com/</a> &#8211; a visual breakdown of how email servers communicate, giving you a better understanding of SPF, DKIM and DMARC and how they work together.</li>
</ul>



<h2 class="wp-block-heading">Resource</h2>



<ul class="wp-block-list">
<li>SPF Wiki &#8211;  <a href="https://en.wikipedia.org/wiki/Sender_Policy_Framework">https://en.wikipedia.org/wiki/Sender_Policy_Framework</a> </li>



<li>DKIM Wiki &#8211;  <a href="https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail">https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail</a> </li>



<li>DMARC Wiki &#8211;  <a href="https://en.wikipedia.org/wiki/DMARC">https://en.wikipedia.org/wiki/DMARC</a> </li>



<li>DMARC &#8211;  <a href="https://dmarc.org/overview/">https://dmarc.org/overview/</a> </li>



<li>Email Authenticity 101 &#8211;<a href="https://www.alexblackie.com/articles/email-authenticity-dkim-spf-dmarc/" target="_blank" rel="noreferrer noopener"> https://www.alexblackie.com/articles/email-authenticity-dkim-spf-dmarc/</a> </li>
</ul>



<p></p>The post <a href="https://www.kjctech.net/authentic-emails-with-spf-dkim-and-dmarc/">Authenticating Emails with SPF, DKIM, and DMARC</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/authentic-emails-with-spf-dkim-and-dmarc/feed/</wfw:commentRss>
			<slash:comments>2</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4288</post-id>	</item>
		<item>
		<title>OSINT Framework</title>
		<link>https://www.kjctech.net/osint-framework/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=osint-framework</link>
					<comments>https://www.kjctech.net/osint-framework/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 09 Apr 2019 00:09:34 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Resources]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=4275</guid>

					<description><![CDATA[<p>On https://osintframework.com/: OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost. I originally created this framework [&#8230;]</p>
The post <a href="https://www.kjctech.net/osint-framework/">OSINT Framework</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>On  <a href="https://osintframework.com/">https://osintframework.com/</a>:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow"><p> OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.<br></p><p>I originally created this framework with an information security point of view. Since then, the response from other fields and disciplines has been incredible. I would love to be able to include any other OSINT resources, especially from fields outside of infosec. Please let me know about anything that might be missing!</p></blockquote>



<p>A good resource, displayed in a cool tree view, when searching for free tools for gather information.</p>The post <a href="https://www.kjctech.net/osint-framework/">OSINT Framework</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/osint-framework/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">4275</post-id>	</item>
		<item>
		<title>Google&#8217;s AIY Project Kits</title>
		<link>https://www.kjctech.net/googles-aiy-project-kits/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=googles-aiy-project-kits</link>
					<comments>https://www.kjctech.net/googles-aiy-project-kits/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Wed, 25 Apr 2018 06:40:46 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Google AIY]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3876</guid>

					<description><![CDATA[<p>It&#8217;s a perfect DIY project with built-in AI, brought to you by Google. The Voice Kit was launched last year and was a huge success. It lets you build your own natural language processor and connect it to the Google Assistant. All fits in a handy little cardboard cube powered by a Raspberry Pi. The release of version 2 upgrades the [&#8230;]</p>
The post <a href="https://www.kjctech.net/googles-aiy-project-kits/">Google’s AIY Project Kits</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>It&#8217;s a perfect DIY project with built-in AI, brought to you by Google.</p>
<p>The <a href="https://aiyprojects.withgoogle.com/voice/" target="_blank" rel="noopener">Voice Kit</a> was launched last year and was a huge success. It lets you build your own natural language processor and connect it to the Google Assistant. All fits in a handy little cardboard cube powered by a Raspberry Pi.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?ssl=1" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-3878" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=600%2C400&#038;ssl=1" alt="" width="600" height="400" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=600%2C400&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=250%2C167&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=450%2C300&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=700%2C467&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=520%2C347&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=360%2C240&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?resize=100%2C67&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003.jpg?w=1120&amp;ssl=1 1120w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>The release of version 2 upgrades the kit with a recently released Raspberry Pi Zero WH and a micro SD card with preloaded OS to help you get started without having to set the card up themselves.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?ssl=1" data-rel="lightbox-image-1" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-3879" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=600%2C292&#038;ssl=1" alt="" width="600" height="292" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=600%2C292&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=250%2C122&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=450%2C219&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=768%2C373&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=700%2C340&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=520%2C253&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=360%2C175&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?resize=100%2C49&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?w=1999&amp;ssl=1 1999w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?w=1280&amp;ssl=1 1280w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/voice-003-1.jpg?w=1920&amp;ssl=1 1920w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>If you need more, how about a <a href="https://aiyprojects.withgoogle.com/vision/" target="_blank" rel="noopener">Vision Kit</a> to make an intelligent camera that experiences with image recognition using machine learning. All is packed also in a cupboard powered by a Raspberry Pi.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?ssl=1" data-rel="lightbox-image-2" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-3881" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=600%2C400&#038;ssl=1" alt="" width="600" height="400" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=600%2C400&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=250%2C167&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=450%2C300&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=768%2C512&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=700%2C467&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=520%2C347&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=360%2C240&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?resize=100%2C67&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/vision-003.jpg?w=1120&amp;ssl=1 1120w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>Both Voice and Vision kits are available from <a href="https://intl.target.com/s?searchTerm=google+aiy" target="_blank" rel="noopener">Target</a> in the US.</p>The post <a href="https://www.kjctech.net/googles-aiy-project-kits/">Google’s AIY Project Kits</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/googles-aiy-project-kits/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3876</post-id>	</item>
		<item>
		<title>The Dots Do Matter &#8211; How To Scam a Gmail User</title>
		<link>https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-dots-do-matter-how-to-scam-a-gmail-user</link>
					<comments>https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Tue, 17 Apr 2018 05:01:35 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[gmail]]></category>
		<category><![CDATA[Netflix]]></category>
		<category><![CDATA[Phishing]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3870</guid>

					<description><![CDATA[<p>Dots don&#8217;t matter is a feature Google has put on Gmail, meaning If someone accidentally adds dots to your address when emailing you, you&#8217;ll still get that email. For example, if your email is johnsmith@gmail.com, you own all dotted versions of your address: john.smith@gmail.com jo.hn.sm.ith@gmail.com j.o.h.n.s.m.i.t.h@gmail.com The intention of this is good but it also opens a door for a phishing [&#8230;]</p>
The post <a href="https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/">The Dots Do Matter – How To Scam a Gmail User</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p><a href="https://support.google.com/mail/answer/7436150?hl=en" target="_blank" rel="noopener">Dots don&#8217;t matter</a> is a feature Google has put on Gmail, meaning</p>
<blockquote><p>If someone accidentally adds dots to your address when emailing you, you&#8217;ll still get that email. For example, if your email is <strong>johnsmith@gmail.com</strong>, you own all dotted versions of your address:</p>
<ul>
<li><strong>john.smith@gmail.com</strong></li>
<li><strong>jo.hn.sm.ith@gmail.com</strong></li>
<li><strong>j.o.h.n.s.m.i.t.h@gmail.com</strong></li>
</ul>
</blockquote>
<p>The intention of this is good but it also opens a door for a phishing scam. Here is an example.</p>
<p>James Hfisher received an email from Netflix asking him to update his payment details.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?ssl=1" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-large wp-image-3872" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email-600x552.png?resize=600%2C552&#038;ssl=1" alt="" width="600" height="552" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=600%2C552&amp;ssl=1 600w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=250%2C230&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=450%2C414&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=768%2C707&amp;ssl=1 768w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=700%2C644&amp;ssl=1 700w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=520%2C479&amp;ssl=1 520w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=360%2C331&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?resize=100%2C92&amp;ssl=1 100w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?w=1332&amp;ssl=1 1332w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2018/04/netflix-to-gmail-email.png?w=1280&amp;ssl=1 1280w" sizes="auto, (max-width: 600px) 100vw, 600px" /></a></p>
<p>Since the email is genuinely from Netflix, he clicked the link. It logged him in and directed him to an &#8220;<a href="https://www.netflix.com/simplemember/editcredit?locale=en-GB">Update your credit or debit card</a>&#8221; page, which again is genuinely hosted on Netflix. No phishing spotted so far.</p>
<p>But then, he found that he doesn&#8217;t recognize the credit card number shown on the Update page, never seen that number and certainly never used one. What&#8217;s going on?</p>
<p>James finally realized that the email was sent to james.hfisher@gmail.com with a dot in it while the one he uses doesn&#8217;t. The email was supposed to be bounced but instead, it ended up in James&#8217; inbox, thanks to Gmail&#8217;s <strong>dots don&#8217;t matter</strong> feature.</p>
<p>Here is how this runs down, concluded by James eventually.</p>
<ol>
<li>Hammer the Netflix signup form until you find an<code class="highlighter-rouge">gmail.com</code> address which is “already registered”. Let’s say you find the victim,<code class="highlighter-rouge">jameshfisher</code></li>
<li>Create a Netflix account with address,<code class="highlighter-rouge">james.hfisher</code>.</li>
<li>Sign up for a free trial with <a href="https://getfinal.com/">a throwaway card number</a>.</li>
<li>After Netflix applies the “active card check”, cancel the card.</li>
<li>Wait for Netflix to bill the canceled card. Then Netflix emails<code class="highlighter-rouge">james.hfisher</code> for a valid card.</li>
<li>Hope Jim reads the email to <code class="highlighter-rouge">james.hfisher</code>, assumes it’s for his Netflix account backed by <code class="highlighter-rouge">jameshfisher</code>, then enters his card,<code class="highlighter-rouge">**** 1234</code>.</li>
<li>Change the email for the Netflix account to <code class="highlighter-rouge">eve@gmail.com</code>, kicking Jim’s access to this account.</li>
<li>Use Netflix free forever with Jim’s card <code class="highlighter-rouge">**** 1234</code>!</li>
</ol>
<p>So, dots do matter in some cases.</p>
<p>/via <a href="https://jameshfisher.com/2018/04/07/the-dots-do-matter-how-to-scam-a-gmail-user">James Hfisher</a>/</p>The post <a href="https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/">The Dots Do Matter – How To Scam a Gmail User</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/the-dots-do-matter-how-to-scam-a-gmail-user/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3870</post-id>	</item>
		<item>
		<title>HTTPS, HSTS, SSL, Encryption, DV, EV, OV, etc.</title>
		<link>https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=https-hsts-ssl-encryption-dv-ev-ov-etc</link>
					<comments>https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Fri, 09 Mar 2018 23:32:15 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[HTTPS]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">https://www.kjctech.net/?p=3849</guid>

					<description><![CDATA[<p>Here is a list of good writeups, by a couple awesome security experts, Troy Hunt &#38; Scott Helme, about https, SSL, HSTS, encryption, DV, EV, OV, and anything related to that matter. Life is about to get a whole lot harder for websites without HTTPS &#8211; Troy Hunt It&#8217;s taken us a while, but finally we&#8217;re getting to a &#8220;secure [&#8230;]</p>
The post <a href="https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/">HTTPS, HSTS, SSL, Encryption, DV, EV, OV, etc.</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>Here is a list of good writeups, by a couple awesome security experts, <a href="https://www.troyhunt.com" target="_blank" rel="noopener">Troy Hunt</a> &amp; <a href="https://scotthelme.co.uk/" target="_blank" rel="noopener">Scott Helme</a>, about https, SSL, HSTS, encryption, DV, EV, OV, and anything related to that matter.</p>
<p><a href="https://www.troyhunt.com/life-is-about-to-get-harder-for-websites-without-https/">Life is about to get a whole lot harder for websites without HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<p>It&#8217;s taken us a while, but finally we&#8217;re getting to a &#8220;secure by default&#8221; web!</p>
</blockquote>
<p><a href="https://www.troyhunt.com/new-pluralsight-course-what-every-developer-must-know-about-https/">What Every Developer Must Know about HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<p>So that&#8217;s what I&#8217;ve created and <a href="https://app.pluralsight.com/library/courses/https-every-developer-must-know/">I&#8217;m <em>enormously</em> happy to now see it up live on Pluralsight</a>. If you&#8217;ve not tried them before, you can <a href="https://www.pluralsight.com/pricing">get into it for less than $1 a day</a> and gain immediate access to thousands of courses, including some very good content on HTTPS</p>
</blockquote>
<p><a href="https://www.troyhunt.com/i-wanna-go-fast-https-massive-speed-advantage/">I wanna go fast: HTTPS&#8217; massive speed advantage</a> &#8211; Troy Hunt</p>
<blockquote>
<p>This is all simply a test of &#8220;what&#8217;s the fastest we can go over HTTP versus what&#8217;s the fastest we can go over HTTPS&#8221;. I don&#8217;t want fair, I want fast. If you wanna go fast, serve content over HTTPS using HTTP/2.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/journey-to-an-extended-validation-certificate/">A Journey to Get an EV</a> &#8211; Troy Hunt</p>
<p>It&#8217;s a 14-page long journey Troy took to get a green EV for Have I been Pwned. Does it worth the effort?</p>
<blockquote>
<p>This whole EV cert thing is hard to measure in terms of value; I have no idea how many more people will put their email address into HIBP or how much more media or good will or donations it will get. No idea at all.</p>
<p>But what I do know is that it adds transparency and legitimacy to a realm that as I mentioned earlier, tends to be inhabited by a lot of shady characters and that&#8217;s gotta count for something.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/on-the-perceived-value-ev-certs-cas-phishing-lets-encrypt/">On the Value of EV Certs, Commercial CAs, Phishing and Let&#8217;s Encrypt</a> &#8211; Troy Hunt</p>
<blockquote>
<p>The bottom line is that as of today, the effectiveness of EV certs is entirely dependent on people recognising what they mean <em>and</em> actually adapting their behaviour accordingly. It&#8217;s hard to argue with that.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/are-ev-certificates-worth-the-paper-theyre-written-on/">Are EV certificates worth the paper they&#8217;re written on?</a> &#8211; Scott Helme</p>
<blockquote>
<p>I&#8217;m not opposed to the idea or the value of EV certificates but right now they just seem like a nice revenue stream for CAs. The technical and user issues outlined above need to be addressed before EV can have <em>real</em> value. The amount of information and mis-information surrounding them really doesn&#8217;t help and there&#8217;s also some pretty wild claims from CAs about what EV can do.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/debunking-the-fallacy-that-paid-certificates-are-better-than-free-certificates-and-other-related-nonsense/">Debunking the fallacy that paid certificates are better than free ones</a> &#8211; Scott Helme</p>
<blockquote>
<p>When you look at a certificate the only thing we really care about is whether or not the browser is going to accept it, we care if the certificate is valid. To be valid there are various technical criteria outlined above regarding it&#8217;s format, the fields it contains and the data inside them that must be met. There&#8217;s also criteria around how it was issued that the CA must adhere to and all of this plays a part in the ultimate determination made by the browser about the certificate itself. Whether or not anyone handed over some hard-earned cash to purchase the certificate simply does not matter one bit. The browser doesn&#8217;t even have knowledge of whether that happened and there&#8217;d be no way and no need for it to do so. <strong>There&#8217;s absolutely no difference between a free certificate and one that you had to shell out some cash for</strong>.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/do-ssl-warranties-protect-you-as-much-as-rocks-keep-tigers-away/">Do SSL warranties protect you?</a> &#8211; Scott Helme</p>
<blockquote>
<p>All in all, the idea of a warranty on a certificate just seems like some marketing fluff for the CA to add to their sales page. The chances of this being useful are close to non-existent and there doesn&#8217;t appear to be a viable way for a consumer to prove the certificate was the cause anyway.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/certificate-transparency-an-introduction/">Certificate Transparency, an introduction</a> &#8211; Scott Helme</p>
<blockquote>
<p>Certificate Transparency is an open framework for monitoring and auditing the certificates issued by Certificate Authorities in near real-time. By requiring a CA to log all certificates they generate, site owners can quickly identify mis-issued certificates and it becomes much easier to detect a rogue CA.</p>
</blockquote>
<p><a href="https://scotthelme.co.uk/hsts-the-missing-link-in-tls/">HSTS &#8211; The missing link in Transport Layer Security</a> &#8211; Scott Helme</p>
<blockquote>
<p>HSTS allows for a more effective implementation of TLS by ensuring all communication takes place over a secure transport layer on the client side. Most notably HSTS mitigates variants of man in the middle (MiTM) attacks where <a title="Using SSLstrip to MiTM SSL" href="https://scotthel.me/pineapplesslstrip" target="_blank" rel="noopener">TLS can be stripped out of communications </a>with a server, leaving a user vulnerable to further risk.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/understanding-http-strict-transport/">Understanding HTTP Strict Transport Security and preloading it into the browser</a> &#8211; Troy Hunt</p>
<blockquote>
<p>As HTTPS becomes more ubiquitous across the web, this feature should really start to gain traction and hopefully initiatives like <a href="https://letsencrypt.org/">Let’s Encrypt</a> will help expedite that (note also that this is now being reported as “Arriving September 2015”). It’s good times for those wanting to further protect their web assets and not so good for those wanting to intercept other people’s traffic.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/the-6-step-happy-path-to-https/">The 6-Step &#8220;Happy Path&#8221; to HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<ol>
<li>Get a free cert</li>
<li>Add a 301 &#8220;Permanent Redirect&#8221;</li>
<li>Add HSTS</li>
<li>Change Insecure Scheme References</li>
<li>Add the upgrade-insecure-recquests CSP</li>
<li>Monitor CSP reports</li>
</ol>
</blockquote>
<p><a href="https://www.troyhunt.com/5-ways-to-implement-https-in/">5 ways to implement HTTPS in an insufficient manner</a> &#8211; Troy Hunt</p>
<blockquote>
<p>it doesn’t matter how many pages you’re loading securely or how many padlock icons or vendor certifications you drop on the site, once you start sending auth cookies around insecurely, you’re toast. It’s <em>completely</em> pointless to secure those personal details in transit but then let the auth cookie <em>which can load them back up</em> float around in the clear. That is a very insufficient use of HTTPS indeed.</p>
</blockquote>
<p><a href="https://www.troyhunt.com/5-ways-to-tackle-insufficient-https/">5 ways to tackle an insufficient HTTPS implementation</a> &#8211; Troy Hunt</p>
<blockquote>
<p>The simpe way of doing this is for HTTPS everywhere</p>
</blockquote>
<p><a href="https://www.troyhunt.com/ssl-is-not-about-encryption/">SSL is not about encryption</a> &#8211; Troy Hunt</p>
<blockquote>
<p>It’s about assurance. It’s about establishing a degree of trust in a site’s legitimacy that’s sufficient for you to confidently transmit and receive data with the knowledge that it’s reaching its intended destination without being intercepted or manipulated in the process.</p>
</blockquote>
<p>Cheat Sheets &#8211; Scott Helme</p>
<ul>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/csp-cheat-sheet/">CSP Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/hsts-cheat-sheet/">HSTS Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/hpkp-cheat-sheet/">HPKP Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/https-cheat-sheet/">HTTPS Cheat Sheet</a></div>
</li>
<li>
<div class="event"><a class="event-title" href="https://scotthelme.co.uk/performance-cheat-sheet/">Performance Cheat Sheet</a></div>
</li>
</ul>
<p><a href="https://www.troyhunt.com/heres-why-your-static-website-needs-https/">Here is why your static website needs HTTPS</a> &#8211; Troy Hunt</p>
<blockquote>
<p>So that&#8217;s precisely what I&#8217;ve done &#8211; intercepted my own traffic passed over an insecure connection and put together a string of demos in a 24-minute video explaining why HTTPS is necessary on a static website. Here&#8217;s the video and there&#8217;s references and code samples for all the demos used immediately after that:</p>
<p><div class="jetpack-video-wrapper"><iframe loading="lazy" title="Here&#039;s Why Your Static Website Needs HTTPS" width="640" height="360" src="https://www.youtube.com/embed/_BNIkw4Ao9w?feature=oembed" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div>
</p>
</blockquote>
<h2>Some other useful resources</h2>
<p><a href="https://doesmysiteneedhttps.com/">Does My Site Need HTTPS</a></p>
<p><a href="https://istlsfastyet.com/">Is TLS Fast Yet</a></p>
<p><a href="https://www.httpvshttps.com/">HTTP vs HTTPS Test</a></p>
<p><a href="https://haveibeenpwned.com/">Have you been pwned</a> &#8211; Troy Hunt</p>
<p><a href="https://report-uri.com/">Report Uri</a> &#8211; Scott Helme</p>
<p><a href="https://securityheaders.io">Security Headers</a> &#8211; Scott Helme &#8211; check your headers for things like HSTS and HPKP</p>
<p><a href="https://www.ssllabs.com/ssltest/index.html">The infamous SSL Labs</a> &#8211; to check your config</p>The post <a href="https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/">HTTPS, HSTS, SSL, Encryption, DV, EV, OV, etc.</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/https-hsts-ssl-encryption-dv-ev-ov-etc/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3849</post-id>	</item>
		<item>
		<title>Adding Lightbox on A ASP.net Powered Website</title>
		<link>https://www.kjctech.net/adding-lightbox-on-a-asp-net-powered-website/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=adding-lightbox-on-a-asp-net-powered-website</link>
					<comments>https://www.kjctech.net/adding-lightbox-on-a-asp-net-powered-website/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Wed, 03 May 2017 04:56:18 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[ASP.net]]></category>
		<category><![CDATA[Lightbox]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/?p=3468</guid>

					<description><![CDATA[<p>ASP.net doesn&#8217;t have many plugins like WordPress. So if you would like to add Lightbox-kind effect on your ASP.net powered website, you will need to do it manually. Here is how you can do it. 1. Go to this Lightbox site and click Download button to download the script package. 2. Extract the package and save both css and js folder into [&#8230;]</p>
The post <a href="https://www.kjctech.net/adding-lightbox-on-a-asp-net-powered-website/">Adding Lightbox on A ASP.net Powered Website</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p>ASP.net doesn&#8217;t have many plugins like WordPress. So if you would like to add Lightbox-kind effect on your ASP.net powered website, you will need to do it manually.</p>
<p>Here is how you can do it.</p>
<p>1. Go to this <a href="http://lokeshdhakar.com/projects/lightbox2/#getting-started" target="_blank" rel="noopener noreferrer">Lightbox site</a> and click Download button to download the script package.</p>
<p><a href="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png" data-rel="lightbox-image-0" data-rl_title="" data-rl_caption="" title=""><img data-recalc-dims="1" loading="lazy" decoding="async" class="alignnone size-full wp-image-3469" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png?resize=490%2C296" alt="" width="490" height="296" srcset="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png?w=490&amp;ssl=1 490w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png?resize=250%2C151&amp;ssl=1 250w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png?resize=450%2C272&amp;ssl=1 450w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png?resize=360%2C217&amp;ssl=1 360w, https://i0.wp.com/www.kjctech.net/wp-content/uploads/2017/05/Lightbox-2017-05-02-21_54_59.png?resize=100%2C60&amp;ssl=1 100w" sizes="auto, (max-width: 490px) 100vw, 490px" /></a></p>
<p>2. Extract the package and save both css and js folder into your website. For example, I created a separate folder called source and saved both folders in it.</p>
<p>3. Add the following three lines at the top of the page in <code>&lt;head&gt;</code> tag.</p>
<pre class="lang:default decode:true ">    &lt;script src="https://code.jquery.com/jquery-3.2.1.min.js" integrity="sha256-hwg4gsxgFZhOsEEamdOYGBf13FyQuiTwlAQgxVSNgt4=" crossorigin="anonymous"&gt;&lt;/script&gt;
    &lt;script src="/source/js/lightbox.js"&gt;&lt;/script&gt;
    &lt;link href="/source/css/lightbox.css" rel="stylesheet" /&gt;
</pre>
<p>4. Update the link by adding <code>rel="lightbox"</code> and title for image caption. For example,</p>
<pre><code>&lt;a href="images/image-1.jpg" rel="lightbox" title="my caption"&gt;&lt;img src='</code><code>images/image-1.jpg'/&gt;&lt;/a&gt;</code></pre>
<p>That&#8217;s about it, as simple as like that.</p>The post <a href="https://www.kjctech.net/adding-lightbox-on-a-asp-net-powered-website/">Adding Lightbox on A ASP.net Powered Website</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/adding-lightbox-on-a-asp-net-powered-website/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">3468</post-id>	</item>
		<item>
		<title>The first glimpse of IE 9 beta</title>
		<link>https://www.kjctech.net/the-first-glimpse-of-ie-9-beta/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-first-glimpse-of-ie-9-beta</link>
					<comments>https://www.kjctech.net/the-first-glimpse-of-ie-9-beta/#respond</comments>
		
		<dc:creator><![CDATA[Kent Chen]]></dc:creator>
		<pubDate>Thu, 16 Sep 2010 06:05:00 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Microsoft]]></category>
		<category><![CDATA[IE]]></category>
		<category><![CDATA[ie 9]]></category>
		<category><![CDATA[the first glimpse]]></category>
		<category><![CDATA[windows 7]]></category>
		<guid isPermaLink="false">http://www.kjctech.net/2010/09/15/the-first-glimpse-of-ie-9-beta/</guid>

					<description><![CDATA[<p>After the long period of wait with 4 releases of Platform Preview in between, Microsoft finally decided to open the door and unlock the beauty of the web by its first beta of IE 9. Unlike the last 2 releases on 7 and 8, this time, it looks promising. Even after 10 minutes of use, I am already impressed, in [&#8230;]</p>
The post <a href="https://www.kjctech.net/the-first-glimpse-of-ie-9-beta/">The first glimpse of IE 9 beta</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></description>
										<content:encoded><![CDATA[<p><img data-recalc-dims="1" loading="lazy" decoding="async" style="background-image: none; border-bottom: 0px; border-left: 0px; margin: 0px auto; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top: 0px; border-right: 0px; padding-top: 0px" title="image" border="0" alt="image" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2010/09/image.png?resize=600%2C241" width="600" height="241" /></p>
<p>After the long period of wait with 4 releases of Platform Preview in between, Microsoft finally decided to open the door and unlock the beauty of the web by its first beta of IE 9. Unlike the last 2 releases on 7 and 8, this time, it looks promising. Even after 10 minutes of use, I am already impressed, in many aspects. It feels like Microsoft finally has caught up and back in the browser game.</p>
<h2>The look</h2>
<p>It&#8217;s streamlined, simplified in a way that users can truly enjoy the web surfing experience with more vertical space reserved. Comparing to the previous versions, it&#8217;s got address bar and tabs unified, even the search is integrated within the address bar together. It&#8217;s also got toolbars stripped down, with favorites bar and status bar not enabled by default. So users have the maximized space for web surf. It seems that IE 9 offers the most web surfing real estate among all the browsers.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" style="background-image: none; border-right-width: 0px; margin: 0px auto; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top-width: 0px; border-bottom-width: 0px; border-left-width: 0px; padding-top: 0px" title="image" border="0" alt="image" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2010/09/image1.png?resize=640%2C327" width="640" height="327" /></p>
<p>However, the unified tab and address bar doesn&#8217;t help too much for those who often open many tabs at the same time. For those folks, me included, a separated tab and address bar might be more useful.</p>
<h2>The speed</h2>
<p>One of the most significant improvement in IE 9 is the performance. For all the benchmark comparison you can find on the internet, IE 9 is placed pretty much all at the top, or near to the top. The only area that IE 9 is slower than the latest Chrome and Opera is the JavaScript engine, which is still a few millisecond behind. But still, IE 9 beats both browsers in overall performance because of its very first and own full hardware acceleration.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" style="background-image: none; border-bottom: 0px; border-left: 0px; margin: 0px auto; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top: 0px; border-right: 0px; padding-top: 0px" title="image" border="0" alt="image" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2010/09/image2.png?resize=520%2C396" width="520" height="396" /></p>
<p>Even on my 3-year-old laptop, the 50 fishes are still able to swimming in the ocean in 46 FPS speed, which is very smooth. You can test more things out over at <a href="http://ie.microsoft.com/testdrive/Default.html">IE9 Test Drive</a>.</p>
<h2>The tabs</h2>
<p>Finally, you can tear off the tabs in this version of IE, which makes viewing two tabbed web pages side-by-side nicely by simply just snapping them to both sides of your screen. The New Tab Page is also redesigned and displays the sites you visit most often with color codes. </p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" style="background-image: none; border-bottom: 0px; border-left: 0px; margin: 0px auto; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top: 0px; border-right: 0px; padding-top: 0px" title="image" border="0" alt="image" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2010/09/image3.png?resize=520%2C369" width="520" height="369" /></p>
<p>However, there is still one thing that is missing in tab. I still can&#8217;t close the tabs that are not active because there is no cross mark attached on the tabs that I can easily click. I&#8217;d like to see it&#8217;s available when the final version releases.</p>
<p>Also, the tab dragging isn&#8217;t as smooth as it does in Chrome or Firefox. Dragging a whole size of page surely is more difficult than dragging just a preview of the page.</p>
<h2>The standard compliance</h2>
<p>It&#8217;s the most stand compliance browser in IE history. Not only does it support industry web standards, but it also supports the new standard of CSS3 and HTML5. Even though it doesn&#8217;t render my site properly, I believe the effort that goes to make the browser more standard friendly is very noticeable. </p>
<h2>The new features</h2>
<p>There are many new features introduced in IE 9. And among these new nice features, the most interesting, maybe useful one is the pin-2-taskbar. Yes, with IE 9 in Windows 7, you can pin a webpage to the taskbar, simply by dragging the website icon in the address bar into the taskbar. And you can utilize the Jump list to quick access some of the features embedded in the pinned web page.</p>
<p><img data-recalc-dims="1" loading="lazy" decoding="async" style="background-image: none; border-bottom: 0px; border-left: 0px; margin: 0px auto; padding-left: 0px; padding-right: 0px; display: block; float: none; border-top: 0px; border-right: 0px; padding-top: 0px" title="image" border="0" alt="image" src="https://i0.wp.com/www.kjctech.net/wp-content/uploads/2010/09/image4.png?resize=342%2C366" width="342" height="366" /></p>
<p>Lately, I found myself spending much more time on Chrome than IE and Firefox but now I will be switching my focus over to IE 9 a lot more. I will be exploring more features and will be covering them a lot in <a href="http://www.windows7hacker.com/">Windows7hacker</a> in the past a couple of weeks.</p>
<h2>Overall</h2>
<p>I believe IE 9 will be the most significant upgrade since IE 6. While it still dominates in the corporate environment, the new release will be winning back a lot of consumers who have gone part ways with either Firefox or Chrome as well. It&#8217;s still in the early stage of beta testing so will have no doubts that the final release will be much better.</p>The post <a href="https://www.kjctech.net/the-first-glimpse-of-ie-9-beta/">The first glimpse of IE 9 beta</a> first appeared on <a href="https://www.kjctech.net">KC's Blog</a>.]]></content:encoded>
					
					<wfw:commentRss>https://www.kjctech.net/the-first-glimpse-of-ie-9-beta/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">1238</post-id>	</item>
	</channel>
</rss>
