Recently on Social Media and tech-oriented mailing-lists, there has been lots of debate following a statement on the National TV by the Minister of ICT in Mauritius, Mr Tassaragen Chelumbrum Pillay, in which he said that the IPv4 addresses are exhausting and thus we need to move to IPv6. Well, for non-technical people out there, this can sound a little alien-language. The purpose of this article is to try to explain in simplest terms, the IP addressing system, IPv4, IPv6, how to transition effectively from IPv4 to IPv6 and consumer concerns about same. For the writing of this article, I asked my friend, Logan to help me. Why Logan? Well, Logan has Operational Experience in IPv6 with his employer, AFRINIC deploying IPv6 networks in Africa, plus Logan is currently in deep IPv6 research and has even brought forward some security fixes for a few platforms. He is willing to help the Government of Mauritius with his knowledge and expertise. “I would like to help my country, Mauritius, to do the jump to IPv6 in a cost-effective, highly secure, reliable way while conforming to international standards of the IETF…” – to quote some of Logan’s words.
The following is an analysis of the defunt gov.mu (Website of the Government of Mauritius back then), by Nadim [Facebook: https://www.facebook.com/ilearn.mu ] , that I am publishing with his expressed permission. – No political intent behind same Have a nice time reading.
Please note that this analysis was carried out in 2013 and was never published. I got my hands on same, some hours ago and asked for permission to publish it.
Well, this will be a quick post but very important one.
Scrolling through my Facebook feeds, i stumbled across a post from a technology page regarding a vulnerability in some Wireless ASUS Router with USB network storage capabilities. The fact was that anybody could access the contents of the devices without passwords and without much efforts. From wedding pics, to music files to personal videos; everything! After some diving, i found that some people have already had their data stolen by some malicious guy asking for $50 to return the data.
More after the break line..
Most of us have a webcam attached to our PC or embedded in our laptops. We usually use them for video calls over Skype, ooVoo and Windows Live Messenger and sometimes for video recordings. Webcams were also used to live broadcast the demonstrations in the Middle East last year. These uses are of one’s own free will. You’ve chosen to start the video call or you’ve accepted the call; or it is you who clicked the ‘Record’ button. But sometimes, without you doing anything same, your webcam is accessed and what’s in it field of view is watched remotely !
A password is a secret word or string of characters that is used for user authentication to prove identity, or for access approval to gain access to a resource – Wikipedia
So, your password prevents unauthorised access to your personal messages, to your online storage service, to your bank accounts (online), to your social accounts (Facebook, Twitter, MySpace, etc) and thus has to be as hard-to-guess as possible.