Skysoft Incorporated https://www.skysoftinc.com The Future is Open Mon, 06 Jan 2020 13:51:12 +0000 en-US hourly 1 https://wordpress.org/?v=5.3.2 Predictions for Ransomware in 2020 https://www.skysoftinc.com/predictions-for-ransomware-in-2020/ Sat, 21 Dec 2019 05:46:57 +0000 https://www.skysoftinc.com/?p=2830 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

2020 is almost upon us, and with the new year will come new trends in ransomware. By understanding the tech dangers that could soon arise, you’ll stay protected against even the most malicious of hackers. Ransomware is a type of harmful software used to hijack victims’ data. The hacker forces the victim to pay [...]

The post Predictions for Ransomware in 2020 appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

2020 is almost upon us, and with the new year will come new trends in ransomware. By understanding the tech dangers that could soon arise, you’ll stay protected against even the most malicious of hackers.

Ransomware is a type of harmful software used to hijack victims’ data. The hacker forces the victim to pay a ransom to regain access to the data, oftentimes within a time limit. If the ransom isn’t paid on time, the data could disappear entirely.

Unfortunately, paying a ransom doesn’t ensure that your data will be restored. So, your photos, videos, documents, and even financial records could be inaccessible after an attack. Enlisting IT services for ransomware protection before it impacts you is a prudent choice, in the new year and beyond.

Below, you’ll find our predictions for ransomware in 2020. With these predictions, remember that skilled IT support in Orlando can help you tackle digital security risks for web safety in the new year.

Hackers Will Shift Their Focus to the Cloud.

Surprisingly, ransomware has barely implicated the cloud thus far. But, as individuals and businesses continue to rely on the cloud for data storage, hackers will likely hone in on the cloud in 2020. With this platform, they may gain access to file stores, virtual machine environments, and Amazon S3 Buckets.

Billions of People Are At Risk On The Cloud

A recent news story from Bloomberg revealed that a cloud storing the information of approximately 1.2 billion people was entirely unprotected. The information on the cloud included email addresses, phone numbers, and even social media accounts. This is just a single example of the amount of vulnerable information that clouds could present to hackers in 2020.

After an attack on a cloud, extensive support services are needed for recovery. Ideally, you’ll be able to prevent ransomware before it strikes. But, computer support after an attack in Orlando is available to keep you and your business safe.

Cyber Attacks Will Increase in Proportion to Increased Data Usage.

5G is an exciting development in the realm of mobile data, but it will likely make for more ransomware attacks in 2020. As more networks roll out 5G, more devices will be connected through data on common networks. Then, the networks themselves will be more susceptible to ransomware.

Mobile Usage Continues to Grow

Increased mobile device use will likely increase the number of people targeted by ransomware. Mobile malware attacks grew significantly in 2019, and that trend is expected to continue. In defense, app stores and app users will both need to be on high alert to differentiate malicious apps from genuine apps.

Hackers Will Learn About Victims To Inform Attacks.

As ransomware evolves and becomes more efficient, hackers are learning more about their victims before making an attack. Specifically, hackers are accessing the financial details of their victims before they strike. With this information, hackers can demand an amount of money that they know the victim has while avoiding complete bankruptcy. This gives the hackers the freedom to attack again, if they so choose.

Backup Protection is More Important Than Ever

Hackers are predicted to start targeting victim’s backups, preventing them from fully recovering lost data. This is just one more way that ransomware will become more vicious in the new year, making it all the more important for you to protect your data with managed IT services in Orlando.

AI Will Be Used in Cyber Defense.

While all of our predictions so far have indicated worsening malware attacks for 2020, it’s important to note that cyber defense will significantly improve in the new year, too. In particular, AI will become a significant contributor to companies’ defense strategies. AI technology will allow businesses to recognize potential threats and react to those threats immediately.

What Can You Do To Stay Protected?

2020 will likely bring a slew of major ransomware attacks. But, you can protect yourself by adopting a few simple habits:

  • Establish and protect a backup of all of your important data so that if one device is compromised, you won’t lose everything.
  • Install a strong firewall to keep intruders from accessing your devices.
  • Use patches to keep the software and systems on your devices current with the latest updates.
  • Don’t give out personal information via email, phone, text, or online message. If you’re getting questionable calls, texts, or emails, contact an IT professional immediately.
  • If you need to use public Wi-Fi, use a reliable VPN (Virtual Private Network) to establish a secure connection.
  • Scan inbound emails for suspicious content and attachments.

Professional Help For Ransomware Protection

Managed IT services in Orlando can provide further protection against ransomware attacks. As you learned above, we predict that ransomware attacks will rise in 2020. But, with evolving AI technology and digital protection services, people and businesses will be well equipped to handle cyber risks.

The post Predictions for Ransomware in 2020 appeared first on Skysoft Incorporated.

]]>
Domain ucfmed.com now for sale with WordPress wewbsite https://www.skysoftinc.com/ucfmed-com-domain-for-sale/ Thu, 12 Dec 2019 23:10:26 +0000 https://www.skysoftinc.com/?p=2826 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

(6) Word domain UCFMED.COM for Sale, includes professionally designed WordPress website designed for a Medical Practice.  Cheers!

The post Domain ucfmed.com now for sale with WordPress wewbsite appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

(6) Word domain UCFMED.COM for Sale, includes professionally designed WordPress website designed for a Medical Practice.  Cheers!

ucfmed.com domain for sale

The post Domain ucfmed.com now for sale with WordPress wewbsite appeared first on Skysoft Incorporated.

]]>
WordPress Docker Swarm docker-nginx-proxy redirects to install https://www.skysoftinc.com/wordpress-docker-swarm-docker-nginx-proxy-redirects-to-install-php/ Thu, 12 Dec 2019 22:38:46 +0000 https://www.skysoftinc.com/?p=2821 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Today I found myself restarting a docker stack, which is running Nginx Proxy on a HA stack running (3) Linux VM's.  After restarting the stack, I noticed that one of my WordPress installs wanted to keep redirecting to the install.php file for WordPress. Typically, you would think this is a wp-config.php or .htaccess file [...]

The post WordPress Docker Swarm docker-nginx-proxy redirects to install appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Today I found myself restarting a docker stack, which is running Nginx Proxy on a HA stack running (3) Linux VM’s.  After restarting the stack, I noticed that one of my WordPress installs wanted to keep redirecting to the install.php file for WordPress.

Typically, you would think this is a wp-config.php or .htaccess file problem, but after digging around for a little bit, i realized that the nginx-gen container had not restarted with the rest of the containers in the jwilder stack.

Simply start up the nginx-gen container, and WordPress will now work properly.

WordPress redirect problem

docker-compose.yml – v3

version: ‘3.3’

services:
db:
image: mariadb:latest
ports:
– 3306
volumes:
– /home/YOU/YOURPROJECT/mariadb:/var/lib/mysql
restart: always
environment:
MYSQL_ROOT_PASSWORD: *****************
MYSQL_DATABASE: yourdbname
MYSQL_USER: yourdbuser
MYSQL_PASSWORD: yourdbpassword
deploy:
placement:
constraints: [node.role == manager] replicas: 1
update_config:
parallelism: 2
delay: 10s
restart_policy:
condition: on-failure

phpmyadmin:
image: phpmyadmin/phpmyadmin
links:
– db:mysql
ports:
– 8080:80
volumes:
– /home/YOU/YOURPROJECT/mariadb:/var/lib/mysql
environment:
MYSQL_USER: yourdbuser
MYSQL_PASSWORD: yourdbpassword
MYSQL_ROOT_PASSWORD: ********************
deploy:
placement:
constraints: [node.role == manager] replicas: 1
update_config:
parallelism: 2
delay: 10s
restart_policy:
condition: on-failure
wordpress:
depends_on:
– db
image: wordpress:latest
volumes:
– /home/YOU/YOURPROJECT/wp_core:/var/www/html
– /home/YOU/YOURPROJECT/wp_content:/var/www/html/wp-content

ports:
– 80
restart: always
environment:
WORDPRESS_DB_HOST: db:3306
WORDPRESS_DB_USER: yourdbuser
WORDPRESS_DB_PASSWORD: yourdbpassword
WORDPRESS_DB_NAME: yourdbname
WORDPRESS_TABLE_PREFIX: wp_
LETSENCRYPT_HOST: yourdomain.com,www.yourdomain.com
LETSENCRYPT_EMAIL: support@yourdomain.com
VIRTUAL_HOST: yourdomain.com,www.yourdomain.com

deploy:
placement:
constraints: [node.role == manager] replicas: 1
update_config:
parallelism: 2
delay: 10s
restart_policy:
condition: on-failure
volumes:
db_data: {}
wp_core: {}
wp_content: {}

The post WordPress Docker Swarm docker-nginx-proxy redirects to install appeared first on Skysoft Incorporated.

]]>
Top 5 Benefits of Managed IT Services https://www.skysoftinc.com/top-5-benefits-of-managed-it-services/ Mon, 09 Dec 2019 21:04:20 +0000 https://www.skysoftinc.com/?p=2815 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Outsourcing your IT with a managed services company in Orlando should not be a guessing game. Below are some of our top reasons, why you should consider having Skysoft provide you with dependable Managed IT Services for your business – this is only our little list. #1: OPERATIONAL EXPENSES AND CONTROLLING IT COSTS Outsourcing [...]

The post Top 5 Benefits of Managed IT Services appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Outsourcing your IT with a managed services company in Orlando should not be a guessing game. Below are some of our top reasons, why you should consider having Skysoft provide you with dependable Managed IT Services for your business – this is only our little list.

#1: OPERATIONAL EXPENSES AND CONTROLLING IT COSTS

Outsourcing your IT services requires only a small initial investment, unless you are implementing a ground up operation. All of your IT needs should be wrapped up into a single, and predictable monthly cost.  This places the cost of IT services as primarily an operational expense, and far easier to predict and budget for.  We can also bundle your Software as A Service requirements with your IT budgets and plans.

Managed IT services can also lower your IT costs. For example, you could save on licensing, training, consulting, and emergency repairs. You can also frequently get reduced labor rates through a managed services contract, which saves you even more.

#2: VAST POOL OF SOFTWARE AND IT RESOURCES

With our Managed Technology Services, you are hiring a team of experts who have the training, qualifications, certifications, and experience you need.  Your company has access to a vast array of different Software and IT Resources in order to accomplish difficult and complex tasks.  With our years of experience, and the use of state of the art project management tools, we strive to plan, track and execute every plan, on every project.

#3 GET YOUR IT OPERATIONS OFF OF YOUR PLATE

With managed services comes the freedom to focus on the core of your business, not the IT problems.  As business operators, specifically one’s which are hands on like Physicians, being free from worrying about your servers being online is money in your pocket.  This is equally true for your IT staff, if you have your own internal IT support. Outsourcing the management and ongoing maintenance of your technology can free up your IT staff’s time to focus on larger and more demanding projects that otherwise might happen much more slowly.

#4 PROACTIVE VS. REACTIVE

In addition to having access to experts and their skillsets, your organization will be engaged in a proactive solution with our turnkey IT & Managed Technology Services.   We monitor and manage your IT & Software Projects to catch problems before they escalate into serious issues.  Proactive monitoring combined with a fast response can help minimize your IT downtime and the risk of serious, expensive problems. But managed services also means you can keep pace with ongoing and changing demands for IT experience and you can more quickly implement new technology.

Staying up to date with technology is quite a challenge . Who do you call  when you need to make sure your business meets compliance laws and regulations? Your managed IT service provider can help you with critical areas like cyber security, Backup and Disaster Recovery, IT Planning, IT Budgeting and more. Emerging trends and IT needs require new talents and knowledge in the IT industry, as well as fast response times to stay ahead of hackers.

#5 REDUCING YOUR COMPANY’S LIABILITY

IT Security is a huge area where managed IT services can provide you with benefits. Manged Security Services are also part of managed technology services, with many MSP’s now focusing on becoming managed security service providers (MSSPs). Managed security services can help fill your organization’s security gaps. Skysoft provides comprehensive HIPAA compliance as a service for Medical organizations, we also provide vulnerability and penetration testing services to harden your environments.

THERE IS MUCH MORE…

There are more advantages to managed technology services, outsourcing your IT, and remote network management. Combining our Software and IT talents into one turnkey solution, will create real value for your business.

Managed IT & Technology services will always be an evolving business.  The possibilities are constantly widening especially with Software making its way to mainstream, and the benefits are there for the taking.  Call us now for a free Technology Audit.

The post Top 5 Benefits of Managed IT Services appeared first on Skysoft Incorporated.

]]>
Zero-Day Vulnerability found in Google Chrome https://www.skysoftinc.com/zero-day-vulnerability-found-in-google-chrome/ Thu, 07 Mar 2019 16:27:01 +0000 https://www.skysoftinc.com/?p=2729 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Dangerous Zero-Day Vulnerability found in Google Chrome Hello, Are you a Google Chrome browser user? Be alert! Earlier today, a DANGEROUS Zero-Day Vulnerability was found in Google Chrome. Google Chrome’s Desktop Engineering and Security Lead, John Schuh tweeted : “Also, seriously, update your Chrome installs... like right this minute.” If you’re [...]

The post Zero-Day Vulnerability found in Google Chrome appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Dangerous Zero-Day Vulnerability found in Google Chrome

Hello,

Are you a Google Chrome browser user? Be alert!

Earlier today, a DANGEROUS Zero-Day Vulnerability was found in Google Chrome.

Google Chrome’s Desktop Engineering and Security Lead, John Schuh tweeted :

“Also, seriously, update your Chrome installs… like right this minute.”

If you’re using Google Chrome on Windows, Mac or Linux please update it immediately by following the steps listed below.

This is the only way to secure yourself from the massive potential threat.

How to update your Chrome to the latest version:

Step1. In your Google Chrome browser type in :

chrome://settings/help –> About Google Chrome

Step2. You will see the following if your update was downloaded and is ready to install

Click “Relaunch” to apply the update

This is what you should see if it has successfully updated and you’d be safe from the vulnerability.

Make sure that the version reads 72.0.3626.121

Please share this email with your family, friends and colleagues immediately and ask them to update their chrome browser to the latest version. Make sure they are all safe and secure!

The post Zero-Day Vulnerability found in Google Chrome appeared first on Skysoft Incorporated.

]]>
SpaceMining.io the people behind the “cloudy” cloud https://www.skysoftinc.com/spacemining-io-the-people-behind-the-cloudy-cloud/ Fri, 26 Jan 2018 20:36:19 +0000 https://www.skysoftinc.com/?p=2196 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

I ran across this "Cloud Mining" concept while researching mining protocols.   Seemed promising as they are even paying for Google Ads to promote their site. Heck, they're offering 100GH/s FREE! 10 days ROI and instant withdrawal.Must be raining BTC over there, well, maybe not.  The site claims they have over 211K members!  Wow i said [...]

The post SpaceMining.io the people behind the “cloudy” cloud appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

I ran across this “Cloud Mining” concept while researching mining protocols.   Seemed promising as they are even paying for Google Ads to promote their site. Heck, they’re offering 100GH/s FREE! 10 days ROI and instant withdrawal.

Must be raining BTC over there, well, maybe not.  The site claims they have over 211K members!  Wow i said to myself, this must be the way to go, i just invest .0015000 BTC and i get back .0045000!!!  This ROCKS!!!  I get a 300% return right off the bat?

 

So of course, before I give away my valuable BTC to a Cloud Mining site, I want to do some research.  I went in with a positive attitude and a smile on my face, but walked away scratching my head.  In a day where you can research almost anything, I’m surprised to see that some “legitimate” players are associated with this type of operation.  I say legitimate because the main “verifiable human” in the corporate docs seems legit.  So off i went on my journey.

The name of the company listed in the UK as SPACEMINING LTD.  They have a link to their “Company Information”  I have provided the link to this document here.

Listed as the CEO is Lewis Wright, sounds legit, I mean there’s a picture of him in a suit on the website.  He looks pretty trustworthy, and he is listed on the company documents.  But wait!  I though I came across this face before, I normally will forget names, but hardly ever a face.  A quick search, and voila!!! Getty Images must have hired him to do a modeling session. Checkout “Business man with arms crossed…” – all image URL credits to @tyriontales

Lei Wang, the CFO can be found here as well.  I couldn’t find any information about this character.  I guess he’s just a model for Getty images too.  And as for the “Lead Developer” – His GPA is pretty low, and might be worried about it.  OK, so you get the point, something is up here, were just not sure what.  So lets keep going.

 

I decided to keep reading the corporate document they filed with the government of the UK, here’s where is starts to get interesting.  On the document, the other “shareholder” is listed as Kieran Daniels.  He WAS the Vice President of Marketing at Verge.

Kieran Daniels @kierankyle

Kieran is the Vice President of Marketing for Verge Currency. He was #6 at Instapage.com and scaled the company from 2,500 to 250,000 users before successfully exiting in January 2015. He is one of the top CRO’s in the world and is passionate about data driven automation and sustainable growth. He is the founder of CryptoAnswer.com and is focused on scaling Verge Currency by implementing proven marketing principles and strategic partnerships. – credits medium.com

 

So why would a reputable, and seemingly successful entrepreneur get involved with what looks like a “less than desirable way” to mount a business with cryptocurrency?  Not sure!  But i ran across some posts that seem to point to some bitterness with Verge.  Apparently the development lead got lazy and didn’t deliver on Wraith Protocol.  From what I understand, the Wraith Protocol is now available.  So, although there really is no clear indication that this is a SCAM, there are some indicators to me PERSONALLY that this might be “less than desirable”.

Conclusion, This might be a legit way to mine, my mind is just kind of blurred on why SpaceMining.io would not put together a better marketing and publicity plan.  After all, people like me will look for this information before handing over money.

This is my personal opinion, if anyone has further information on this topic, please share it so we can all be more aware.

The post SpaceMining.io the people behind the “cloudy” cloud appeared first on Skysoft Incorporated.

]]>
Interledger Protocol Ripple XRP and BigchainDB https://www.skysoftinc.com/interledger-protocol-ripple-and-bigchaindb/ Wed, 24 Jan 2018 23:54:32 +0000 https://www.skysoftinc.com/?p=2158 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

In my previous post about Missing LTC coins after a transfer from a HitBTC (LTC) wallet to a HitBTC (BTC) wallet, I discussed the Interledger Protocol as a technology which should be adopted in order to prevent this type of "ghost" transfer.  I actually think that HitBTC will be able to recover the missing LTC, [...]

The post Interledger Protocol Ripple XRP and BigchainDB appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

In my previous post about Missing LTC coins after a transfer from a HitBTC (LTC) wallet to a HitBTC (BTC) wallet, I discussed the Interledger Protocol as a technology which should be adopted in order to prevent this type of “ghost” transfer.  I actually think that HitBTC will be able to recover the missing LTC, in their forums they mention that it “could” be possible to recover the coins, but the fee far outweighs the recovery. You can read their support page for this situation here.

HitBTC Recovery of Mistaken Transfers

I guess this is fair considering they could just be lost forever if you transferred them to a Bitcoin account from a Bitcoin Cash account – see the section on this here.

HitBTC lost transfers

Yes, I’m scratching my head a little bit on this one, again I assumed that this type of transaction could, or would not happen.  Water under the bridge.  What I really want to discuss is the underlying problem, and where you can find some implementations of the ILP.  While researching this issue, I wanted to find out who the people were behind this ILP.  It led me to ADRIAN HOPE-BAILIE and DIMITRI DE JONGHE.  No surprise there’s a relation between Ripple and BigchainDB.  BigchainDB has implemented the ILP within it’s infrastructure.

Ripple and BigchainDB

I’m a solutions provider for the IT and Software sectors, so I’m interested in the technology behind the scenes.  This led me to go for the low hanging fruit, for me this would be databases.  Every application which contains history (and some that don’t) utilize modern database platforms to store and analyze data.  Specifically, I deal with HIPAA compliance issues, and everything that comes with it, so i became interested in a platform called BigchainDB.  BigchainDB features decentralized control, immutability and the transfer of digital assets. Seemingly, they have some type of connection with Ocean Protocol A Decentralized Data Exchange Protocol to Unlock Data for AI.

BigchainDB is complementary to decentralized storage, processing and communication building blocks. It can be used side by side with higher-level decentralized computing platforms and applications, and protocols for identity, financial assets, intellectual property and sidechains. BigchainDB fills a gap in the decentralized stack. – BigchainDB

Many applications could use something decentralized like Bitcoin, but capable of storing large amounts of arbitrary data quickly, immutably, and with low latency. BigchainDB is our answer to that challenge: a big-data database with blockchain characteristics including decentralization, immutability and built-in support for creation & transfer of assets. For more information, see the BigchainDB website at bigchaindb.com.

In conclusion, I think it was good to lose a little bit of LTC.  It has brought new awareness on the technology used for trading and moving cryptocurrency.  After all, should you be investing the same percentage of money as percentage of knowledge you have in the technology?

 

@Ripple @Interledger @BigchainDB

The post Interledger Protocol Ripple XRP and BigchainDB appeared first on Skysoft Incorporated.

]]>
My lost LiteCoin (LTC) and why we need ILP https://www.skysoftinc.com/lost-litecoin-ltc-need-ilp/ Wed, 24 Jan 2018 16:19:59 +0000 https://www.skysoftinc.com/?p=2146 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Its very easy these days to transfer cryptocurrency to accounts which will accept the payment, but you will never see the funds.  That's right, they just go poof!  It happened to me last week, it was a very small amount as I was just testing a theory, but indeed, I lost the coins even though [...]

The post My lost LiteCoin (LTC) and why we need ILP appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

Its very easy these days to transfer cryptocurrency to accounts which will accept the payment, but you will never see the funds.  That’s right, they just go poof!  It happened to me last week, it was a very small amount as I was just testing a theory, but indeed, I lost the coins even though I can see the transaction in the block chain.  As a matter of fact, it looks like it ended up on someone else’s LTC wallet even though the coin shows as “unspent”.

This happened as I transferred my LTC to my Bitcoin (BTC) account from within HitBTC, a popular crypto trading platform.  There is also a much more simple platform called Coinbase which seems to be more stable.  Having come from a development background, I thought this “erroneous transfer” would be impossible to do, or at the least, not allowed.  Yet the system did allow me to make the transfer, without any email confirmation.  After waiting for days to see the transfer, it never appeared, it’s just stuck in the block chain.

I did research on how to recover my coins, and apparently it is possible in some cases, but you will always need the private key of the wallet you made the transfer to.  When trading from within online platforms, they own the private keys to the wallets and in turn, you will never see them.  HitBTC claims they will try and recover the coins, but they don’t promise anything and it takes about 2 months for them to respond to an email.  My support ticket is in, I will update this post if anything happens, hopefully someone else can learn something here.

Losing my coins motivated me to research ways in which this can be prevented.  I mean, there has to be a way to not only prevent this, but to allow for transfer of cryptocurrency from disparate systems, without the possibility of loss.  This search led me to the Inter Ledger Protocol (ILP).  If this protocol were in place at HitBTC or any other platform for that matter, this would not have occurred.  The concept is pretty simple, and is being adopted across accredited financial institutions.

The central functions of the interledger protocol are addressing hosts and securing payments across different ledgers.

Each host sending and receiving interledger payments has an interledger module that uses the addresses in the interledger header to transmit interledger payments toward their destinations. Interledger modules share common rules for interpreting addresses. The modules (especially in connectors) also have procedures for making routing decisions and other functions.

Ripple's Interledger Protocol

 

The interledger protocol uses transfer holds to ensure that senders’ funds are either delivered to the destination account or returned to the sender’s account. This mechanism is described in greater detail in the Overview and the Interledger Whitepaper. – The Inter Ledger Protocol (ILP)

Knowing now that i can lose my coins by just making a simple transaction which should not be allowed, i decided to invest in crypto which does have this protocol implemented.  I chose just one for now, Ripple’s XRP.  Not only will you not lose your coins, the ILP will be able to pay anyone no matter what currency you and they use, crypto or fiat.

Conclusion, BE CAREFUL when transferring crypto, read blogs before you make transfers between trading accounts as this can be dangerous as they own the private keys, and if you can, invest in cryptocurrency which has implemented the Interledger Protocol.

The post My lost LiteCoin (LTC) and why we need ILP appeared first on Skysoft Incorporated.

]]>
Data Loss in a Natural Disaster – Hello Irma https://www.skysoftinc.com/data-loss-natural-disaster-hello-irma/ Thu, 07 Sep 2017 21:06:43 +0000 https://www.skysoftinc.com/?p=2127 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

With the rash of cyber attacks that have occurred in 2017, more than ever businesses are walling off their servers and taking the proper precautions against nefarious hackers. Unfortunately, cyber attacks aren’t the only danger to your business. Natural disasters, like Hurricane Harvey which put half of Houston underwater, can also wreak havoc on people’s [...]

The post Data Loss in a Natural Disaster – Hello Irma appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

With the rash of cyber attacks that have occurred in 2017, more than ever businesses are walling off their servers and taking the proper precautions against nefarious hackers. Unfortunately, cyber attacks aren’t the only danger to your business. Natural disasters, like Hurricane Harvey which put half of Houston underwater, can also wreak havoc on people’s lives as well as the health of your business. In 2012, Hurricane Sandy, according to Time Magazine, caused approximately $25 billion in lost business. Some of these losses were unavoidable; people huddled inside their homes without power are unlikely to be productive. However, there are a number of steps companies should take to minimize their potential losses, especially related to data.    

Have A Detailed Plan

Natural disasters can sometimes resemble a slow motion train wreck, allowing companies hours, even days to decide the best course of action regarding their data. Other times businesses aren’t as lucky: lines of communication are lost when you absolutely need them most. Therefore, creating a set plan that doesn’t require a senior leader giving the go ahead to take the proper precautions is best. Clear chains of command in a disaster situation give companies the best chance of retaining valuable information and minimizing losses.    

Multiple Data Centers

For many companies data is beyond invaluable. Losing any amount can lead to lost clients or worse, compromising the company as a whole. In these cases, having multiple data centers, in different areas, can be a godsend when the worst hits. After 9/11 many companies decided to move their data centers closer to their businesses, in the event that flights were grounded. Unfortunately, that would leave said businesses out of luck when a storm hits, taking out both data centers. It also pays to have data centers protected from high probability disasters. For example, in Mississippi flooding is a legitimate concern, while in Oklahoma tornadoes are far more likely.     

Be Familiar With Your IT Company Operating Procedures

Too many businesses rely heavily on their IT cloud to solve any and all issues relating to lost data.  Unfortunately, the cloud isn’t a foolproof invention. Whether it is a lack of access or availability, not all IT cloud services are equal. Understanding what your IT cloud capabilities are before an emergency leaves nothing to chance.

Knowing your own disaster recovery plan isn’t sufficient. To have all your bases covered you also have to know your IT’s recovery plan as well. No one likes surprises when it comes to data loss, especially in a moment of crisis. Understanding your IT company’s plan takes the guess work out of natural disasters. Also, as with any disaster plan it should be tested. Running through procedures and how everything will be handled in case of emergency makes everything run that much smoother once the stuff hits the fan for real.

Data is the 21st century are the veins of any business. Having it the moment it’s needed allows for a profitable, smooth and well functioning entity. Lose that data at the wrong moment and everything can be lost. Ultimately, whether the disruption is from a hacker or a natural disaster, the end result is the same.

 

The post Data Loss in a Natural Disaster – Hello Irma appeared first on Skysoft Incorporated.

]]>
GPS Spoofing and Navy Ships https://www.skysoftinc.com/gps-spoofing/ Fri, 25 Aug 2017 15:26:07 +0000 https://www.skysoftinc.com/?p=2118 Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

As a pilot of both aircraft and cars, GPS technology has become a vital part of my everyday life, whether I realize it or not. We naturally use our smartphones like treasure maps, leading us to our destinations in unknown places. Unfortunately, there are many instances of people trusting their digital treasure map to the [...]

The post GPS Spoofing and Navy Ships appeared first on Skysoft Incorporated.

]]>
Skysoft is an Orlando Web Design and Managed Technology Service provider. With over 20 years in IT & Software, we provide Turnkey Technology Solutions.

As a pilot of both aircraft and cars, GPS technology has become a vital part of my everyday life, whether I realize it or not. We naturally use our smartphones like treasure maps, leading us to our destinations in unknown places. Unfortunately, there are many instances of people trusting their digital treasure map to the point of mortal danger. Regrettably, there are a shocking number of people who have followed their GPS off a cliff, into the desert or some other form of imminent danger. Many people shake their heads at such instances of blind faith but there are far more than anyone cares to admit.

However, in 2017 GPS accounts for so much more than just getting from point A to point B. Now GPS is a vital component in agriculture, military, and many new, exciting technologies.  It wasn’t until recently that GPS was certified for landing in IMC.  Take the new driverless cars, which are in the news daily. They rely on GPS to, you know, drive. Clearly, GPS will continue to be a staple of our time, or will it? In the past few weeks there have been a number of stories that throw into question the reliability of GPS.

In Russia, the United States Navy may have encountered the first signs of GPS hacking. The article details a Navy Captain noticing their state of the art navigation system had them in the wrong location. After investigating his report, the Navy found at least 20 other ships were affected, their GPS placing all of their locations at the same airport. Some may discount said accounts as a glitch, that is, until one does the research.

Todd Humphreys, associated professor at the University of Austin, saw this coming as early as 2013. He conducted field tests in the Mediterranean Sea and wrote a paper detailing how GPS could be hoodwinked. It turns out GPS isn’t as foolproof as we once thought. In fact, it’s getting easier to “spoof” or confuse global satellite positioning. The first proof of such spoofing was found in Moscow, as people playing Pokemon Go found out when their phones told them they were at the Vnukovo Airport. It was theorized that it was the work of the Kremlin, protecting themselves from GPS guided weaponry.

Now, such spoofing can be found far from Russia and military officials are concerned that such trickery has become commonplace. If that’s true, it calls into question the safety of many GPS implementations, such as driverless cars and amazon drone deliveries. However, the recent spate of accidents involving US Navy warships gives us a glimpse of a potentially larger issue.

Our oceans are pathways for essentially the delivery of everything. If hackers are able to render cargo ships blind, it could potentially cause a global wide disruption. Author Greg Milner posed a chilling possibility on a interview with Public Radio International based on his own research, “There hasn’t been a large-scale spoofing attack yet, but that’s probably inevitable. It’s coming.”

The U.S government is so concerned about such a hacking that they have green lighted a number of projects to find a backup for GPS. The Navy is pushing for a Positioning, Navigation and Timing (PNT). Previously defunct forms of navigation, like the LORAN-C which uses radio waves, have been revitalized in response to potential concerns over GPS.

The fact of the matter is hackers have just begun their infiltration into the various digital systems on which we rely so heavily. Moving forward, reliable digital security is only going to become more crucial. It would behoove everyone to look into the soundness of their own cyber security.

The post GPS Spoofing and Navy Ships appeared first on Skysoft Incorporated.

]]>