Skip to main content

Design: the production that doesn’t forget the consumer

  I have learnt from creativity and design that the market often doesn’t pursue that someone claims to know.  A clear example is in the case of economic recession when the persons tend not to spend money for superfluous expenses but reduce their purchase to essential. Not even the infamous free obtains in certain event the forecast consent as often the sector tempts exorbitant advertising, pyramidal schemes and other illegal things.  It’s happen to discover in market and marketing analysis for the pre-supply  of an artwork or design project that sometimes that you think cannot like obtains more consent rather than that you think can like.   The company that produces common objects it knows rightly the market study continues also after production and marketability of products.  The study extends what the consumer likes, the level of satisfaction of purchase and if the use of product is the same which is created and produced.  The designers sometimes lik...

Cybersecurity: To be Zero (day)

 

 

For many time I have spent awareness on cybersecurity and beta testing in opensource but also on proprietor operating system, softwares and applications. 

Myself, as graphic programmer, have to meet programming errors bound to development tool so to have the doubt: is there a Zero day? 

To correct an error doesn’t say there isn’t an hidden Zero day, or rather an exception in the development tool that requests a change of procedure to avoid the unknown obstacle in that moment. 

Some errors emerge after many time and after the use of software or platform, they are bound wear of the application codes. 

In a video “Code error - Code correction” I have introduced a tedious argument in the hacking. 

From a creative point of view I said directly the error is more lovely than the correction. 

From a security point of view it’s exactly the opposite, or rather an enormous damage for everyone that meets a Zero day that it wasn’t corrected. 

The motivation to spend awareness on cybersecurity is just this: to instruct the users of pc for home or professional motive to resolve incidental security issue until the bug correction so to have good practice useful to everyone also in the future that can transfer in other situation. 

A pc isn’t a perfect machine. The major of users handle it in non professional mode and for home or game motive so there are controversis between common users and professionals with business activities because they don’t think in the same way. 

If from home motive can be a pleasure to do some things, for example see a film or game and talk with absent kith and kin, from professional motive can be a war with fraudulent attempt to enter illegally in simple operation as a communication with a client or a colleague. 

The human bug is disinformation, or rather they don’t know bug that can be carrier of illegality when they send a mail, a sms or they share or interact with app and games. 

A bug or a Zero day  are  always a carrier of interference, if the bug is on the web or can bring to online activities as web surf or communication platform it's worse. Ask to stay online to use the service can make visible personal data in the case of attacks as "SQL injection" or can damage the digital asset in the case of attacks as "denial of service". 

More than 2FA I have ask for the function of  logout for who has application bound to used PID device without account manager online, if there is a security bug on platform or application in the case of logout the error is of platform or application that didn’t correct an incidental issue login or logout service.  

Often the common users are unaware there is this type of bug and they think are immune from possible illegality that can try to enter in their accounts of service. 

I believe however it’s always a good practice for all to use at least a 2FA system that in the extreme case can block the illegal attempt to access the service, the question of attacks "brute force" it’s better to leave to another occasion.

Comments

Popular posts from this blog

Creative and security information specialist: the indipendence is a imperfect world of freedom

  I was hoping don’t write again a critical post on some arguments because this publication is born with a different purpose, but the persistence of events not related to my will oblige me to write again a critical post. The indipendence and the freedom of thinking taught me by my parents, in south of Italy they often clashed with events didn’t depend from my will but from the circumstances where the diversity and the creativity aren’t view as an added value that can innovate a process for the improvement of society.  Before me, many independent creatives and ethical hackers have talk about this subject, I could have to refrain to speak but I’m a creative coder and sometimes I don’t accept the interference of some people that aren’t in the sector of creativity and computing.  Many people define itself “creative”or “security information specialist”, also when it’s not so.  A client call a physician, a lawyer or an accountant because you need of that professional worke...

Notes from creative journey: “The thinking behind design”

  I begin again to write after a long time of silence and after I have kept at a safe distance the world of writing. It’s not easy to return on one’s steps, especially if you are a visual creative who uses the writing for the necessary to explain the own projects.  It’s hard to explain to people who read you, the reasons which take you to open a publication on web, it’s hard to not think how you can make known the arguments each time you will discuss if you know these arguments are not common but there are few people interested them.  I think the first post must be a preface on what we would like write in the following posts. It must represent our imaginary line on which to pin down the topics we would like to talk about, a reference for all those times we lose sight the pourpose for which to write, a note to be read every time it’s missing the reasons to continue, an engagement to be revise to the need to reorganize own work in a new viewpoint and under new scenary....

From concept design to reality: from fractals to design

  The accomplishment of a concept goes across a long way of many phase until the arrive of the product design to market where a client can buy it and the company can verify if the product collects the consent and the expetation of clients.  If a design competition represents a way to see a great deal of possible concept or not, the accomplishment of a marketable concept is rather different. In architecture it's known before of a preliminary project there is an important step that it's to have a committment and a real demand of the architectural project respondent to the necessity of a service for city or people.  In the design it's seems similar but the planning of an object is tied to the possible industrial production and if there isn't the market or clients for that product it's useles to begin a path for the concept design to the realized product.  To plan, any object or in any scale, it's a complex operation. It supposes a synthesis of function, technique, ...