#HTTPS implementation
Explore tagged Tumblr posts
seohabibi · 2 years ago
Text
https://digitalhabibi.com/the-role-of-technical-seo-in-improving-user-experience-and-search-rankings/
This comprehensive guide delves into the nuances of SEO and PPC strategies, helping businesses in Dubai navigate the dynamic digital landscape and choose the optimal approach for their marketing success.
0 notes
beatrice-otter · 4 months ago
Text
We have 30 days until the National Environmental Policy Act (NEPA) laws are rescinded. This is the 50-year bedrock of American conservation. Normally, these actions take years but the administration has provided 30 days for public comment gutting clean water and clean air. Drop what you’re doing, before you make any more calls or read any more social media posts, please populate the Federal Register with dissent.
A. Go to https://www.federalregister.gov/documents/2025/02/25/2025-03014/removal-of-national-environmental-policy-act-implementing-regulations
B. Click on the green rectangle in the upper right corner ("SUBMIT A PUBLIC COMMENT") .
C. Fill in your comment, and info at the bottom, and SUBMIT COMMENT.
51K notes · View notes
aimarketresearch · 27 days ago
Text
Variable Reluctance Market Size, Share, Trends, Opportunities, Key Drivers and Growth Prospectus
0 notes
marmikmaharashtra · 9 months ago
Link
https://marmikmaharashtra.com/cleanliness-will-be-implemented-in-the-district-ceo-neha-bhosle/
0 notes
escon-elevators · 9 months ago
Video
youtube
#CardGame | How #5s can #improve #productivity?
0 notes
fishermod · 1 year ago
Text
https://www.theverge.com/2022/2/25/22949293/tumblr-nycchr-settlement-adult-content-ban-algorithmic-bias-lgbtq
For those who don't remember, here's the lawsuit two years ago where Tumblr (or specifically Automattic) settled with the New York City Commission on Human Rights regarding Tumblr's terribly implemented porn ban targeting LGBTQ folk more than it should. Here's an excerpt detailing what the NYCCHR ordered Tumblr to do:
The settlement gives Tumblr 180 days to hire an expert on sexual orientation and gender identity (SOGI) issues and provide related training to moderators. It must also hire someone with experience in this area as well as expertise in image classification, who will review Tumblr’s moderation algorithms to see if they’re more likely to flag LGBTQ content. As part of an overall review, Tumblr will reexamine 3,000 old cases where a user successfully appealed a takedown, looking for patterns that could indicate bias.
Now, on a totally unrelated note, here's the complaint page for reporting discrimination to the NYCCHR. Completely unrelated to what's going on right now or the rest of this post, I swear.
[edited since it looks like the link broke somehow]
[edit #2: again, for unrelated reasons, here's a link to a post about the San Francisco equivalent]
33K notes · View notes
seoupdateshub · 11 months ago
Text
1 note · View note
gaylienz · 7 months ago
Photo
Tumblr media
The 7 R’s of Sustainability:
Did you know that ‘recycling’ is step 6 of the 7 Rs of sustainability? The other R’s are just as important even if they are often forgotten.
Rethink- Do I really need to buy this? The point of this step is to stop and think.
Refuse- Does this product damage the environment? If so, refuse to spend your money on it. i.e. single use plastics, harsh chemicals
Reduce- How much of this do I really need? Buy less! Buy in bulk when you can as it often equals less packaging to throw out.
Reuse- Can I use this product again? Can I fix what I have so that I don’t need to buy something new? Reuse that plastic water bottle a few times. And instead of buying new, try thrift shopping, flea markets, yard sales etc.
Repurpose- Unlimited creativity! Does this item have another use? i.e. old torn clothes can be rags or plastic cups can be planters.
Recycle- Can I recycle this? Not everything can be. There are also some important steps to making sure your recycling is done properly. If unsure, look up local recycling regulations.
Rot- Can I compost this? Food waste, yard clippings, newspapers and many other items can be composted instead of being tossed in the trash. Composting is surprisingly simple and helps reduce harmful greenhouse gasses from entering the atmosphere.
What is the point of the R’s? The number one benefit of the 7 R’s are the reduction of the amount of waste sent to incinerators and landfills. The EPA website provides a lot of useful information. Other benefits that we can reap from implementing these concepts in our life are (as listed on the EPA website): • Prevents pollution caused by reducing the need to harvest new raw materials • Saves energy from not making a new product • Reduces greenhouse gas emissions that contribute to climate change • Helps sustain the environment and natural resources for future generations • Saves money from processing our waste • Increases economic security by tapping a domestic source of materials • Helps create jobs in the recycling and manufacturing industries in the United States
https://www.northglenn.org/government/departments/public_works/trash/recycling.php https://www.nrdc.org/stories/composting-101 https://www.epa.gov/recycle https://www.northglenn.org/Recycling%20Article.pdf
6K notes · View notes
zapperrr · 1 year ago
Text
Securing Your Website: Best Practices for Web Developers
As the digital landscape continues to evolve, website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated, it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this article, we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potential threats.
Introduction
In today's interconnected world, websites serve as the digital storefront for businesses, making them vulnerable targets for cyber attacks. From data breaches to malware infections, the consequences of a security breach can be severe, ranging from financial loss to damage to reputation. Therefore, prioritizing website security is essential for maintaining the trust and confidence of users.
Understanding Website Security
Before diving into best practices, it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measures taken to protect websites from cyber threats and unauthorized access. Common threats include malware infections, phishing attacks, SQL injection, cross-site scripting (XSS), and brute force attacks.
Best Practices for Web Developers
Keeping Software Updated
One of the most fundamental steps in website security is keeping all software, including the content management system (CMS), plugins, and server software, updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can be exploited.
Implementing HTTPS
Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users, ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors, as indicated by the padlock icon in the browser's address bar.
Using Strong Authentication Methods
Implementing strong authentication methods, such as multi-factor authentication (MFA) and CAPTCHA, adds an extra layer of security to user accounts. MFA requires users to provide multiple forms of verification, such as a password and a one-time code sent to their mobile device, reducing the risk of unauthorized access.
Securing Against SQL Injection Attacks
SQL injection attacks occur when malicious actors exploit vulnerabilities in web applications to execute arbitrary SQL commands. Web developers can prevent SQL injection attacks by using parameterized queries and input validation to sanitize user inputs effectively.
Protecting Sensitive Data
It's essential to employ encryption techniques to protect sensitive data, such as passwords, credit card information, and personal details, stored on the website's servers. Encrypting data at rest and in transit mitigates the risk of data breaches and unauthorized access.
Regular Security Audits
Conducting regular security audits helps identify vulnerabilities and weaknesses in the website's infrastructure and codebase. Penetration testing, vulnerability scanning, and code reviews enable web developers to proactively address security issues before they are exploited by attackers.
Choosing a Secure Hosting Provider
Selecting a reputable and secure hosting provider is critical for ensuring the overall security of your website. When evaluating hosting providers, consider factors such as security features, reliability, scalability, and customer support.
Evaluating Security Features
Choose a hosting provider that offers robust security features, such as firewalls, intrusion detection systems (IDS), malware scanning, and DDoS protection. These features help protect your website from various cyber threats and ensure continuous uptime.
Ensuring Regular Backups
Regularly backing up your website's data is essential for mitigating the impact of security incidents, such as data breaches or website compromises. Choose a hosting provider that offers automated backup solutions and store backups securely offsite.
Customer Support and Response to Security Incidents
Opt for a hosting provider that provides responsive customer support and has established protocols for handling security incidents. In the event of a security breach or downtime, prompt assistance from the hosting provider can minimize the impact on your website and business operations.
Implementing Firewall Protection
Firewalls act as a barrier between your website and external threats, filtering incoming and outgoing network traffic based on predefined security rules. There are several types of firewalls, including network firewalls, web application firewalls (WAF), and host-based firewalls.
Configuring and Maintaining Firewalls
Properly configuring and maintaining firewalls is crucial for effective security. Define firewall rules based on the principle of least privilege, regularly update firewall configurations to reflect changes in the website's infrastructure, and monitor firewall logs for suspicious activity.
Educating Users about Security
In addition to implementing technical measures, educating users about security best practices is essential for enhancing overall website security. Provide users with resources, such as security guidelines, tips for creating strong passwords, and information about common phishing scams.
Importance of User Awareness
Users play a significant role in maintaining website security, as they are often the targets of social engineering attacks. By raising awareness about potential threats and providing guidance on how to recognize and respond to them, web developers can empower users to stay vigilant online.
Providing Training and Resources
Offer training sessions and educational materials to help users understand the importance of security and how to protect themselves while using the website. Regularly communicate updates and reminders about security practices to reinforce good habits.
Monitoring and Responding to Security Incidents
Despite taking preventive measures, security incidents may still occur. Establishing robust monitoring systems and incident response protocols enables web developers to detect and respond to security threats in a timely manner.
Setting Up Monitoring Tools
Utilize monitoring tools, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, and website monitoring services, to detect abnormal behavior and potential security breaches. Configure alerts to notify you of suspicious activity promptly.
Establishing Incident Response Protocols
Develop comprehensive incident response plans that outline roles, responsibilities, and procedures for responding to security incidents. Establish clear communication channels and escalation paths to coordinate responses effectively and minimize the impact of security breaches.
Securing your website requires a proactive approach that involves implementing a combination of technical measures, choosing a secure hosting provider, educating users about security best practices, and establishing robust monitoring and incident response protocols. By following these best practices, web developers can mitigate the risk of security breaches and safeguard their websites and the sensitive data they handle.
#website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated#it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this#we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potenti#Introduction#In today's interconnected world#websites serve as the digital storefront for businesses#making them vulnerable targets for cyber attacks. From data breaches to malware infections#the consequences of a security breach can be severe#ranging from financial loss to damage to reputation. Therefore#prioritizing website security is essential for maintaining the trust and confidence of users.#Understanding Website Security#Before diving into best practices#it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measur#phishing attacks#SQL injection#cross-site scripting (XSS)#and brute force attacks.#Best Practices for Web Developers#Keeping Software Updated#One of the most fundamental steps in website security is keeping all software#including the content management system (CMS)#plugins#and server software#updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can#Implementing HTTPS#Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users#ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors#as indicated by the padlock icon in the browser's address bar.#Using Strong Authentication Methods#Implementing strong authentication methods
0 notes
swordandstars · 7 months ago
Text
Friends!
Are you feeling hopeless in the face of the oncoming MAGA-pocalypse? Want to do something fast, easy, and free that will make a difference?
If you're in Michigan, keep reading! If you're not, signal boost this to your Mitten State Mutuals!
Michiganders, it's time to contact your state reps and tell them to vote YES on HB 6034 and HB 6035. Together, these two bills comprise the Freedom to Read Act and they severely limit the ability of assholes to ban books in the state of Michigan.
Want to read the bills for yourself? Click here:
https://www.legislature.mi.gov/Search/ExecuteSearch?sessions=2023-2024&docTypes=House%20Bill,Senate%20Bill&contentFullText=%22freedom%20to%20read%22
Tl;dr? Here's an article and video summarizing the Act from CBS News:
Not sure how to contact your Michigan state representatives? Text RESIST to 50409 and Resistbot will walk you through it.
It's easy, it takes about 5 minutes, and you can do it from your couch/bed/puddle of despair.
Tumblr media
Tips for contacting elected officials:
1) If you're asking them to vote YES or NO on something, say that in the first line. Bonus points if you can tag the actual bill (HB/House Bill) number.
2) Only include ONE issue per communication.
3) 1&2 are because these are being skimmed by interns who keep a running tally of what each communication is about. One communication = one point.
3a) Don't be a dick to the interns. Their lives are hard enough.
4) Keep it short. One sentence very clearly stating what you want. One or two sentences about why they should care about what you want ("As a resident of your district, I know you agree that SOMETHING SOMETHING FREEDOM, SOMETHING SOMETHING LIBERTY, SOMETHING SOMETHING THINK OF THE CHILDREN.") Appeal to the person they claim to be in their campaign ads. Get it, give them clear instructions, get out.
5) No profanity.
6) No threats.
7) No memes/ slang/ sarcasm/ lols. You are cosplaying as someone who thinks salt is too spicy and whose greatest joy in life is sorting their collection of plain white socks.
8) 5, 6, & 7 are because anything you communicate to an elected official will become a matter of public record. It goes into a file. And if anyone ever pulls that file, you want to be on record as the most boring, conscientious, polite, non-threatening motherfucker who ever lived.
Now go forth and make your voice heard!
(Hey @unpretty and @official-michigan-posts, can you help get the word out?)
3K notes · View notes
moniquill · 1 year ago
Text
Here is a brief summary of what is happening in Wikipedia right now:
In the last few years (3-4 years) the WikiProject Indigenous peoples of North America, which was originally created to improve the quality and coverage of native issues and native articles on wikipedia, has been hijacked by a small number of users with an extremist agenda. They have been working diligently over the last few years to change the definition of both what it means to be an Indigenous American and even what it means to be state and federally recognized.
The four or five key players (Mainly Editor Yuchitown, Bohemian Baltimore, ARoseWolf, (now retired editor CorbieVreccan, Netherzone and Oncamera) who are part of the “Native American Articles Improvement Project” started implementing these changes slowly, but they started pursuing their goals aggressively after November 2023, when state-recognized tribes retained their voting rights in NCAI. Essentially, after the movement to delegitimize state-recognized tribes failed officially, the key players doubled down on altering and controlling the flow of information about Native Americans through Wikipedia.
The talk page of Lily Gladstone’s article has a relevant discussion here. Initially, the leaders of the WikiProject removed any reference to her being a “Native American Actress” and instead had her as “Self-identifying as Blackfoot” and “Self-identifying as Nez Perce” because her blood quantum was too low to be enrolled in either tribe.
You can see some of the discussion here:
 https://en.wikipedia.org/wiki/Talk:Lily_Gladstone
Eventually they relented and changed her category to being “Of Nez Perce Descent” but you can see in the discussion that they are referring to an article that these editors (Yuchitown, Bohemian Baltimore, and CorbieVreccan) themselves appeared to have mostly written and revised:
https://en.wikipedia.org/wiki/Native_American_identity_in_the_United_States
This statement is very much at odds with even the government’s description, as seen below;
The DOJ Office of Tribal Justice Office on their webpage “Frequently Asked Questions About Native American”, question “Who is an American Indian or Alaskan Native” states:
“As a general principle, an Indian is a person who is of some degree Indian blood and is recognized as an Indian by a Tribe and/or the United States. No single federal or tribal criterion establishes a person's identity as an Indian. Government agencies use differing criteria to determine eligibility for programs and services. Tribes also have varying eligibility criteria for membership.”
In addition, “List” pages have been created on Wikipedia for federally and state recognized tribes. The Wikipedia “List” page for state-recognized tribes is inaccurate in its interpretation of state recognition and not supported by expert reliable sources--(1) Cohen’s Handbook of Federal Indian Law 2012 edition, (2) NCSL.org current stand on state recognition (not the archived list from 2017 which NCSL no longer supports), (3) Koenig & Stein’s paper “Federalism and the State Recognition of Native American Tribes: a survey of state-recognized tribes and state recognition processes across the United States” (both 2008 & updated 2013 in book “ Recognition, sovereignty struggles, and indigenous rights in the United States: A sourcebook”)
https://en.wikipedia.org/wiki/State-recognized_tribes_in_the_United_States
State-recognized tribes who have received recognition through less formal but acceptable means have been moved from the Wikipedia list page on state-recognized tribes to the Wikipedia list page of unrecognized or self-identifying organizations.
The Wiki page "List of organizations that self-identify as Native American tribes", in particular, is being used to purposely defame legitimate Native American individuals who are members of the tribes/Native communities that are on this list. 
By the parameters set up on Wikipedia, only the colonizer’s governments can acknowledge who is Native American through either federal recognition or state recognition. If an individual is not a member of a federally or state-recognized tribe, then it is determined that they cannot be Native American and are, instead, considered “self-identifying” or only “a descendant of ...” (example Lily Gladstone). As a result, Native individuals are currently being tagged as “self-identifying” and their names are put on “list” pages that strongly imply they are “pretend” Indians.
These editors have indicated that they would like “self-identification” to be the default setting for any people who they deem do not fit within the parameters that they themselves created within Wikipedia.
Moreof, these editors are admin and senior editors within the Wikiproject Indigenous Peoples of North America, and are being called in specifically to weigh on Native Identity, and any project involving any Indigenous Group.
Any attempt to correct misinformation, add information, or change any of these articles is often met with being blocked, reported for various offenses, or reported for having a Conflict of Interest, whether or not that is actually applicable. They have use this strategically in many different pages for many different individuals and groups within the scope of their Wikiprojects.
While changing things in Wikipedia does not change the truth, it is a way to control how most people take in information, and thus they hope to manipulate the narrative to better suit their goals.
This is quick and messy but:
Here is a link to the google document with the other state recognized tribes (Including yours) that were edited by these editors. This is an incomplete list so far that only goes back to September 2023 but I am going to add to it. If you can add to your own part of this list, and send your complaints and information to the arbitrator committee (the email is below) with the involved editors, this will help our case.
The  more tribes who complain, and the more Wikipedia editors complain, the better our case will be. 
https://docs.google.com/document/d/1YNDEjLTrrZ_mMIRCVxtvt69FwCYpJWKs71lBhWa5a9M/edit?usp=sharing
The place to make complaints on Wikipedia is oversight-en-wpwikipedia.org , and
arbcom-enwikimedia.org . It is most helpful to have an editing account on Wikipedia, because Yuchitown and the others will try to defend themselves using Wikipedia methodology and make anyone who confronts them look like the aggressor (see the other tribes who tried to fight back on Wikipedia I found).
The more people and tribes make complaints the more likely it is that this will work and we can rid ourselves of these monsters.
Some of the tribes I have spoken to are taking legal action against these editors. Any groups affected by their policies should also reach out to the news to make knowledge of this more widespread.
Thank you
- quoted with permission from an email sent by an associate of my tribe. Message me for their email address if you'd like to reach out to them.
13K notes · View notes
greyias · 2 years ago
Text
Oh look, it seems everyone has been opted into the unfortunate "experiment" now. For everyone who has been blissfully using the old UI up until now, welcome to hell :)
Do you not like hell? Do you want to leave and crawl back up into the sunlight of the old UI? Well, have I got a link for you! A beautiful tumblr user (who is not me) has gone and fixed things beautifully for you already: https://github.com/enchanted-sword/dashboard-unfucker
You will need to have Tampermonkey installed on your browser of choice, and once that's done, just go to the github link above, and peruse the readme to install. And voila! You have your old dash back!
The authors of XKit Rewritten said during the experiments that at the time, since this was an "experiment" they weren't going to implement anything to revert to the old UI (although who knows if they'll do it now). And the dashboard unfucker has worked beautifully enough for me to where I genuinely couldn't tell if they had ended the experiment or not.
20K notes · View notes
gajananjogdand45 · 2 years ago
Link
https://marmikmaharashtra.com/village-child-protection-committee-meeting-at-purjal-anjanwadi-for-effective-implementation/
0 notes
starwhoopsass · 1 year ago
Text
IMPORTANT: VOICE YOUR OPPOSITION TO AGE VERIFICATION LAW IF YOU LIVE IN CALIFORNIA-STOP AB3080
Tumblr media
The California age bill verification will be voted in monday, please call your reps and tell them to oppose the bill AB3080 as it threathens online privacy, as your ID will be linked to your browser history when you want to access a website. They deem LGBT content harmful to minors, as well as weapons and tobacco, putting them on the same level as nsfw content. Since a lot of tech companies resides in California (Youtube,Reddit,Discord,twitter) who know how they will implement this if it passes. Please take actions here (a script is included to help you) https://www.defendonlineprivacy.com/ca/action.php
Find your rep here https://findyourrep.legislature.ca.gov/
You can also send faxes using this https://faxzero.com/ If you don't live in California,please spread the word and urge others to take actions, make posts and wteets using the hashtags AB3080 and NoOnAB3080
Remind your reps that companies pull out a of a state when they are required to do age verification. California cannot afford to lose that kind of money. Also specifically speak to Reps who are potentially losing votes or are more easily persuaded by telling them how popular this could be for their careers.
PLEASE REBLOG !
6K notes · View notes
marmikmaharashtra · 2 years ago
Link
https://marmikmaharashtra.com/village-child-protection-committee-meeting-at-belthar-for-effective-implementation/
0 notes
picturejasper20 · 1 year ago
Text
Tumblr media
Wow... people having to identify themselves to a government because of they are part of a group that is seen as ¨other¨ or because they want to learn about a certain topic...where i have seen this before...
I don't know... maybe what it is considered one of the biggest red flags in steps of dehumanization of groups, mainly minorities?
Btw, this is what the people behind KOSA are trying to impose in all the United States of America.
[Image ID: News politcs article about USA politics that says ¨Kansas governor passes law requiring ID to view acts of 'homosexuality' online, vetoes anti-LGBTQ+ bill¨ /.End ID]
Link to the article: https://www.advocate.com/politics/kansas-veto-age-verification-gender-affirming-care-abortion
Edit: Since this gained more notes, for those who don't know KOSA is, it is a USA bill that was reintroduced on May 2023 (last year). It is called ¨Kids Online Safety Act¨ (KOSA for short). It has been introduced and reintroduced for a while now since 2022. It is meant with the intention to ¨protect kids¨ by restricting their use of internet by pushing age restrictions and people having to present their ID to use internet or access certain websites, quite similar to the Kansas state bill that got passed. Many groups and people have criticized this bill for the potential censorship it can come with it and do more harm to the kids than help them. Possible censorship that has been suggested this bill can bring is LGBT+ content, politics and news, mental health search, political and social opinions in general (adults included). What is more, it has been put into question the possible invasion of privacy for both minors and adults by having to share an identification to use certain websites. That people could get censored or doxxed by doing this.
As for the bill itself, there was a hearing earlier today in the Senate. ( April 17th-Wednesday). It could take a while before it gets voted and has to pass different stages. Then it would take months (18 months) to be implemented if it gets passed.
I'm not American myself, so i'm not sure how much i can do about this. What i do recommend is making calls to senators and people involved in pushing this bill to make clear your disapproval of it. Try sign petitions or just telling others about it.
Some sources: https://en.wikipedia.org/wiki/Kids_Online_Safety_Act https://www.stopkosa.com/ https://www.badinternetbills.com/ https://www.eff.org/deeplinks/2024/02/dont-fall-latest-changes-dangerous-kids-online-safety-act
Website to keep track of the KOSA bill movements and cosponsors of the bill:
4K notes · View notes