Monday, December 21, 2015

Niuewe platform om ZZPers en Opdrachtgever bijelkaar te brengen

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin mi mi, egestas vitae felis ut, interdum porttitor erat. Nullam maximus cursus arcu. Aenean pulvinar varius ligula quis facilisis. Nullam volutpat, lectus vitae sagittis imperdiet, eros dolor dapibus elit, vel placerat mauris massa id justo. Quisque pellentesque blandit nibh eu tristique. Fusce non euismod metus. Duis a metus eget est porttitor semper eget eu odio. Proin quis pulvinar felis. Source: http://zzplinq.nl/nieuws.html

Sunday, December 20, 2015

ZZPLingQ lanceert Mobile APP

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin mi mi, egestas vitae felis ut, interdum porttitor erat. Nullam maximus cursus arcu. Aenean pulvinar varius ligula quis facilisis. Nullam volutpat, lectus vitae sagittis imperdiet, eros dolor dapibus elit, vel placerat mauris massa id justo. Quisque pellentesque blandit nibh eu tristique. Fusce non euismod metus. Duis a metus eget est porttitor semper eget eu odio. Proin quis pulvinar felis. Source: http://zzplinq.nl/nieuws.html

Thursday, December 17, 2015

Onze missie is om ZZP-ers…

ZZPLinQ is een online platform gericht op het beter zichtbaar maken van ZZP-ers. Wij verlenen verschillende diensten en educatie mogelijk die effectief, makkelijk te begrijpen en ZZP-ers helpen om boven de rest in hun sector uit te staan.

ZZPLinQ krijgt dagelijks duizenden unieke bezoekers en opdrachtgevers welke door onze database heen bladeren om de juiste ZZP-er te vinden voor hun opdracht of kennisdeling. ZZP-ers kunnen hun eigen profiel aanpassen, hun zichtbaarheid naar het web, adverteren en vermarkten en dat om hun eigen identiteit en bedrijf te laten groeien. ZZPLinQ en partners werken hard om net dat beetje extra te doen voor hun leden door educatie of andere tools aan te bieden.

Waar wij het meest van houden zijn de unieke verhalen hoe ZZPLinQ bijgedragen heeft aan het succes, hoe bruggen zijn gebouwd en hoe netwerken elkaar hebben voort geholpen. Samen staan we sterk!


We blijven continu verbeteren en uitbreiden. Mocht je een steentje bij willen dragen door een suggestie aan te dragen of op een andere manier dan waarderen wij dat zeer. Neem contact on.

Wednesday, December 16, 2015

Idea Development

Engage your potential customers with a modern website from Activemindz! We provide high-quality web design services and hosting in a wide range of customizable packages. Whether you own a small to medium business or you desire a robust e-Commerce store, ActiveMindz can get your business online in no time. Our friendly service desk is always at your disposal. We will help you with your concerns and provide assistance from setting up your e-mail to transferring your website. You can reach us by phone or send us an e-mail. More at http://www.activemindz.net/web-services.html

Tuesday, December 15, 2015

In a fast and comfortable way of development

Engage your potential customers with a modern website from Activemindz! We provide high-quality web design services and hosting in a wide range of customizable packages. Whether you own a small to medium business or you desire a robust e-Commerce store, ActiveMindz can get your business online in no time. Our friendly service desk is always at your disposal. We will help you with your concerns and provide assistance from setting up your e-mail to transferring your website. You can reach us by phone or send us an e-mail. Source: http://www.activemindz.net/web-services.html!

Monday, December 14, 2015

PRIVACY POLICY

This privacy policy sets out how ActiveMindz uses and protects any information that you give ActiveMindz when you use this website. ActiveMindz is committed to ensuring that your privacy is protected. Should we ask you to provide certain information by which you can be identified when using this website, then you can be assured that it will only be used in accordance with this privacy statement. ActiveMindz may change this policy from time to time by updating this page. You should check this page from time to time to ensure that you are happy with any changes. This policy is effective from [date].

What we collect

We may collect the following information: • name and job title • contact information including email address • demographic information such as postcode, preferences and interests • other information relevant to customer surveys and/or offers

What we do with the information we gather

We require this information to understand your needs and provide you with a better service, and in particular for the following reasons: • Internal record keeping. • We may use the information to improve our products and services. • We may periodically send promotional emails about new products, special offers or other information which we think you may find interesting using the email address which you have provided. • From time to time, we may also use your information to contact you for market research purposes. We may contact you by email, phone, fax or mail. We may use the information to customize the website according to your interests.

Security

We are committed to ensuring that your information is secure. In order to prevent unauthorized access or disclosure, we have put in place suitable physical, electronic and managerial procedures to safeguard and secure the information we collect online.

How we use cookies

A cookie is a small file which asks permission to be placed on your computer's hard drive. Once you agree, the file is added and the cookie helps analyze web traffic or lets you know when you visit a particular site. Cookies allow web applications to respond to you as an individual. The web application can tailor its operations to your needs, likes and dislikes by gathering and remembering information about your preferences. We use traffic log cookies to identify which pages are being used. This helps us analyze data about web page traffic and improve our website in order to tailor it to customer needs. We only use this information for statistical analysis purposes and then the data is removed from the system. Overall, cookies help us provide you with a better website, by enabling us to monitor which pages you find useful and which you do not. A cookie in no way gives us access to your computer or any information about you, other than the data you choose to share with us. You can choose to accept or decline cookies. Most web browsers automatically accept cookies, but you can usually modify your browser setting to decline cookies if you prefer. This may prevent you from taking full advantage of the website.

Links to other websites

Our website may contain links to other websites of interest. However, once you have used these links to leave our site, you should note that we do not have any control over that other website. Therefore, we cannot be responsible for the protection and privacy of any information which you provide whilst visiting such sites and such sites are not governed by this privacy statement. You should exercise caution and look at the privacy statement applicable to the website in question.

Controlling your personal information

You may choose to restrict the collection or use of your personal information in the following ways: • whenever you are asked to fill in a form on the website, look for the box that you can click to indicate that you do not want the information to be used by anybody for direct marketing purposes • if you have previously agreed to us using your personal information for direct marketing purposes, you may change your mind at any time by writing to or emailing us at [email address] We will not sell, distribute or lease your personal information to third parties unless we have your permission or are required by law to do so. We may use your personal information to send you promotional information about third parties which we think you may find interesting if you tell us that you wish this to happen. If you believe that any information we are holding on you is incorrect or incomplete, please write to or email us as soon as possible, at the above address. We will promptly correct any information found to be incorrect.

Updates

Our Privacy Policy may change from time to time and all updates will be posted on this page.

Sunday, December 13, 2015

About us

Authicon was established in 2014 as the first online security tool using icon sequences. We constantly upgrade the tool for more powerful security, using state-of-the-art technology.
Authicon aims to help to increase the online security of thousands of people worldwide, by protecting online systems of governments, institutions and companies. Authicon wants to become the biggest online security provider in the world. Authicon provides FREE 24/7 support to all customers, regardless of business size.

The Company is privately owned and has offices in the Netherlands and in the Philippines. For questions or suggestions, please feel free to contact us. Source: https://www.authicon.com/index/aboutus!

Thursday, December 10, 2015

Service Terms and Conditions

These Service Terms and Conditions (“Agreement”) constitute a contract between Authicon, a tradename represented by ActiveMindz B.V. with office at Rijssenseweg 37a, 7468 AB, Enter, The Netherlands (“Authicon”), and you. This Agreement includes and incorporates the webpage Order Form with which Customer purchased the Services and any subsequent Order Forms (submitted in written or electronic form), as well as the accompanying Terms and Conditions. By accessing or using the Services, you agree to be bound by this Agreement. If you are entering into this Agreement on behalf of a company, organization or other entity, you represent that you have such authority to bind such entity to this Agreement and are agreeing to these Terms and Conditions on behalf of such entity. If you do not have such authority to enter into this Agreement or do not agree with these Terms and Conditions, you may not use the Services.
DEFINITIONS
“Customer” means the individual or legal entity that has signed up for the Services and agreed to the terms of this Agreement.
“Documentation” means guides, instructions, policies and reference materials provided to Customer by Authicon in connection with the Services, which may be amended from time to time.
“Integration Software” means (a) Authicon proprietary software and (b) open source software used in providing the Services which integrates with Customer’s network or application, as provided in the Documentation.
“Order Form(s)” means the invoice or other forms from Authicon for the initial order for the Service, and any subsequent invoice or other forms from Authicon (submitted in written form or online), specifying, among other things, the maximum number of authorized users, the initial subscription term, the applicable fees and such other charges and terms as agreed between the parties.
“Payment Schedule” means the schedule selected by Customer for payment of Fees (on either an order webpage or an attached Order Form), which may be either monthly by credit card or monthly, annually or multi-year and invoiced in advance, with payment due within thirty days of receipt of invoice.
“Services” means the products and services that are ordered by and/or made available to Customer under a free edition or an Order Form and made available online by Authicon, as described in the Documentation.
“Term” means the subscription term indicated on the Order Form and any subsequent renewal terms.
“User” means any user of the Services who Customer may authorize to enroll to use the Services under the terms of this Agreement.
The terms “you” or “your” refer to the individual using the Services, if an individual is using the Services, or the individual entering into this Agreement on behalf of a legal entity for such legal entity to use the Services.
SERVICES FOR CUSTOMER
Subject to full compliance with the terms and conditions of this Agreement, Authicon will provide the Services to Customer. The Services are subject to modification from time to time at Authicon’s sole discretion, for any purpose deemed appropriate by Authicon. Authicon will use reasonable efforts to give Customer prior written notice of any such modification.
Authicon will make the Services available and the Services will perform substantially in accordance with the description of the services found at https://www.authicon.com. Notwithstanding the foregoing, Authicon reserves the right to suspend Customer’s (or any of its users’) access to the Services: (i) for scheduled or emergency maintenance, or (ii) in the event Customer is in breach of this Agreement, including failure to pay any amounts due to Authicon.
CUSTOMER RESPONSIBILITIES
Customer will cooperate with Authicon in connection with the performance of this Agreement as may be necessary, which may include making available such personnel and information as may be reasonably required to provide the Services or support.
On the Customer’s administrative interface, Customer may designate employee(s) who will be the primary contact(s) for Authicon.
RESTRICTIONS
Customer will not, and will not permit any of its users nor any third party to: reverse engineer, decompile, or otherwise attempt to discover the source code, object code or underlying structure, ideas or algorithms of the Services, Software, or any data related to the Services (provided that reverse engineering is prohibited only to the extent such prohibition is not contrary to applicable law); or use the Services or Software other than in accordance with this Agreement and in compliance with all applicable laws and regulations (including but not limited to any European privacy laws and intellectual property laws).
PAID SERVICES
For Customers enrolled in one of the editions of Services requiring purchase, subject to full compliance with the terms and conditions of this Agreement, Authicon will use commercially reasonable efforts to provide support to Customer as described athttps://www.authicon.com/index/contact and at https://www.authicon.com/index/servicelevelagreement, which includes links to documentation and whitepapers, support hours of coverage, response times, support contact information and other support specifics. Only Customers who have enrolled in one of the editions of Services requiring purchase will receive support from Authicon. Certain parts of the Services or types of Services provided by Authicon are free to use and do not require payment (“Free Services”). Customers who use only Free Services will not receive any support from Authicon.
For Customers enrolled in one of the editions of Services requiring purchase, Authicon represents and warrants that it will not knowingly include, in any Authicon software released to the public and provided to Customer hereunder, any computer code or other computer instructions, devices or techniques, including without limitation those known as disabling devices, Trojans, or time bombs, that intentionally disrupt, disable, harm, infect, defraud, damage, or otherwise impede in any manner, the operation of a network, computer program or computer system or any component thereof, including its security or user data. If, at any time, Authicon fails to comply with the warranty in this Section, Customer may promptly notify Authicon in writing of any such noncompliance. Authicon will, within thirty (30) days of receipt of such written notification, either correct the noncompliance or provide Customer with a plan for correcting the noncompliance. If the noncompliance is not corrected or if a reasonably acceptable plan for correcting them is not established during such period, Customer may terminate this Agreement as its sole and exclusive remedy for such noncompliance. This provision does not apply to Customers who use only Free Services.
CONFIDENTIALITY
Each party (the “Receiving Party”) understands that the other party (the “Disclosing Party”) has disclosed or may disclose information relating to the Disclosing Party’s technology or business (hereinafter referred to as “Confidential Information” of the Disclosing Party).
The Receiving Party agrees: (i) not to divulge to any third person any such Confidential Information, (ii) to give access to such Confidential information solely to those employees with a need to have access thereto for purposes of this Agreement, and (iii) to take the same security precautions to protect against disclosure or unauthorized use of such Confidential information that the party takes with its own confidential or proprietary information, but in no event will a party apply less than reasonable precautions to protect such Confidential Information. The Disclosing Party agrees that the foregoing will not apply with respect to any information that the Receiving Party can document (a) is or becomes generally available to the public without any action by, or involvement of, the Receiving Party, or (b) was in its possession or known by its prior to receipt from the Disclosing Party, or (c) was rightfully disclosed to it without restriction by a third party, or (d) was independently developed without use of any Confidential Information of the Disclosing Party. Nothing in this Agreement will prevent the Receiving Party from disclosing the Confidential Information pursuant to any judicial or governmental order, provided that the Receiving Party gives the Disclosing Party reasonable prior notice of such disclosure to contest such order. In any event, Authicon may collect data with respect to and report on usage and other aggregate measures of the Services’ performance.
Both Parties will have the right to disclose the existence but not the terms and conditions of this Agreement, unless such disclosure is approved in writing by both Parties prior to such disclosure, or is included in a filing required to be made by a Party with a governmental authority (provided such party will use reasonable efforts to obtain confidential treatment or a protective order) or is made on a confidential basis as reasonably necessary to potential investors or acquirers.
INTELLECTUAL PROPERTY RIGHTS
Except as expressly set forth herein, Authicon alone (and its licensors, where applicable) will retain all intellectual property rights relating to the Services or the Software or any suggestions, ideas, enhancement requests, feedback, recommendations or other information provided by Customer or any third party relating to the Services and/or the Software, which are hereby assigned to Authicon. Customer will not copy, distribute, reproduce or use any of the foregoing except as expressly permitted under this Agreement. This Agreement is not a sale and does not convey to Customer any rights of ownership in or related to the Services or Software, or any intellectual property rights.
PAYMENT OF FEES
Customer will pay Authicon the applicable fees as set forth on the Order Form (the “Fees”) plus all applicable sales, use and other purchase related taxes. If the method of payment is by credit card, Customer agrees to (a) keep Customer’s credit card information updated and (b) authorize Authicon to charge Customer’s credit card the Fees as and when due. Authicon will not charge users any fees for their use of the Services without Customer’s authorization. All payments will be made in accordance with the Payment Schedule.
If a Customer uses only Free Services, Authicon will not charge such Customer any Fees for use of such Free Services, installation or use of the Software associated with Free Services. Such Customer may discontinue using the Free Services at any time, but must immediately remove any Software from its devices.
Unpaid Fees are subject to a finance charge of one percent (1.0%) per month, or the maximum permitted by law, whichever is lower, plus all expenses of collection, including reasonable attorneys’ fees. Fees under this Agreement are exclusive of all taxes, including national, state or provincial and local use, sales, value-added, property and similar taxes, if any. Customer agrees to pay such taxes unless Customer has provided Authicon with a valid exemption certificate. In the case of any withholding requirements, Customer will pay any required withholding itself and will not reduce the amount paid to Customer on account thereof.
TERMINATION
Subject to earlier termination as provided below, this Agreement is for the Term as specified in the Order Form.
In the event of any material breach of this Agreement, the non-breaching party may terminate this Agreement prior to the end of the Term by giving thirty (30) days prior written notice to the breaching party; provided, however, that this Agreement will not terminate if the breaching party has cured the breach prior to the expiration of such thirty-day period. Either party may terminate this Agreement, without notice, (i) upon the institution by or against the other party of insolvency, receivership or bankruptcy proceedings, (ii) upon the other party’s making an assignment for the benefit of creditors, or (iii) upon the other party’s dissolution or ceasing to do business. For Customers using Free Services, Authicon may terminate this Agreement at any time with or without notice and Authicon reserves the right to disable such Customers’ access to or use of the Services at any time with or without notice for any reason or no reason.
For Customer’s enrolled in one of the editions of Services requiring purchase, Customer may terminate this Agreement upon thirty (30) days prior written notice and Authicon may terminate this Agreement upon ninety (90) days written notice to Customer.
Sections 3.2, 4, and 6 through 12 (inclusive) will survive termination, including, without limitation, restrictions, accrued rights to payment, confidentiality obligations, intellectual property rights, warranty disclaimers, and limitations of liability. No refund of Fees shall be due in any amount on account of termination by Authicon pursuant to Section 9.2 or by Customer pursuant to Section 9.3. When this Agreement expires or terminates, Authicon shall cease providing the Service to Customer.
WARRANTY DISCLAIMER
THE SERVICES AND AUTHICON CONFIDENTIAL INFORMATION AND ANYTHING PROVIDED IN CONNECTION WITH THIS AGREEMENT ARE PROVIDED “AS-IS,” WITHOUT ANY WARRANTIES OF ANY KIND. AUTHICON HEREBY DISCLAIMS FOR ITSELF ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING, WITHOUT LIMITATION, ALL IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE, AND NON-INFRINGEMENT.
LIMITATION OF LIABILITY
IN NO EVENT WILL AUTHICON BE LIABLE FOR ANY INDIRECT, PUNITIVE, INCIDENTAL, SPECIAL, OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR IN ANY WAY CONNECTED WITH THE USE OF THE SERVICES OR ANYTHING PROVIDED IN CONNECTION WITH THIS AGREEMENT, THE DELAY OR INABILITY TO USE THE SERVICES OR ANYTHING PROVIDED IN CONNECTION WITH THIS AGREEMENT OR OTHERWISE ARISING FROM THIS AGREEMENT, INCLUDING WITHOUT LIMITATION, LOSS OF REVENUE OR ANTICIPATED PROFITS OR LOST BUSINESS OR LOST SALES, WHETHER BASED IN CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY, OR OTHERWISE, EVEN IF DUO SECURITY HAS BEEN ADVISED OF THE POSSIBILITY OF DAMAGES.

THE TOTAL LIABILITY OF AUTHICON, WHETHER BASED IN CONTRACT, TORT (INCLUDING NEGLIGENCE OR STRICT LIABILITY), OR OTHERWISE, WILL NOT EXCEED, IN THE AGGREGATE THE FEES PAID TO AUTHICON HEREUNDER IN THE TWELVE MONTH PERIOD ENDING ON THE DATE THAT A CLAIM OR DEMAND IS FIRST ASSERTED. THE FOREGOING LIMITATIONS WILL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY.


MISCELLANEOUS
If any provision of this Agreement is found to be unenforceable or invalid, that provision will be limited or eliminated to the minimum extent necessary so that this Agreement will otherwise remain in full force and effect and enforceable. This Agreement is not assignable, transferable or sub licensable by Customer except with Authicon’s prior written consent. Authicon may transfer and assign any of its rights and obligations under this Agreement with written notice to Customer. Both parties agree that this Agreement is the complete and exclusive statement of the mutual understanding of the parties and supersedes and cancels all previous written and oral agreements, communications and other understandings relating to the subject matter of this Agreement, and that all waivers and modifications must be in a writing signed by both parties, except as otherwise provided herein. No agency, partnership, joint venture, or employment is created as a result of this Agreement and Customer does not have any authority of any kind to bind Authicon in any respect whatsoever. In any action or proceeding to enforce rights under this Agreement, the prevailing party will be entitled to recover costs and attorneys’ fees. All notices under this Agreement will be in writing and will be deemed to have been duly given when received, if personally delivered; when receipt is electronically confirmed, if transmitted by facsimile or e-mail; and upon receipt, if sent by certified or registered mail (return receipt requested). Authicon may provide notice using the information provided in the most recent Order Form and Customer may provide notice using the contact information provided on https://www.authicon.com. Authicon will not be liable for any loss resulting from a cause over which it does not have direct control. If Customer is not an individual, Customer agrees to participate in press announcements, case studies, trade shows, or other forms reasonably requested by Authicon. If Customer is not an individual, so long as Customer is using the Service and for thirty (30) days thereafter, Customer grants Authicon the right to identify Customer as such on Authicon’s website or other marketing or advertising materials. If Customer is not an individual, Customer grants Authicon the right to use Customer’s name and/or logo for this limited purpose.


Wednesday, December 9, 2015

Fair Use Policy

Using Authicon services create a stream of authentication requests on the network of https://www.authicon.com. The capacity of the authentication requests is limited. To prevent excessive use of this capacity by a small number of users (it is at the expense of other users after all), Authicon has drafted this Fair Use Policy. These conditions are also included in the general conditions.

A fair use policy applies for the use of the paid website edition and the free edition subscriptions. This means that no fixed request limit is set to the amount of authentication requests that you are allowed to generate. This also means that we can intervene if you frequently generate significantly more requests than the average for the corresponding subscription. This has the advantage that you are allowed to generate more authentication requests occasionally, as long as the average authentication requests over longer periods is not significantly higher than that of other users.

When, in our opinion, you have exceeded the determination of this fair use policy, we reserve the right to block the subscription. You will be made aware of this in advance of course and we will first try to find a suitable solution, as long as misuse does not play a role.

Monday, December 7, 2015

Sunday, December 6, 2015

Thursday, December 3, 2015

Daily Support from Second User

As a website administrator you can create a second user to do the website tasks for you. Assign a user and grant certain rights for unblocking user account on daily basis. Source: https://www.authicon.com/index/features!

Wednesday, December 2, 2015

No Writting Down Passwords

Your password will be in a form of icons so no need to write down your passwords. Only you can have access to your password. No more sticky note messing around your table. Source: https://www.authicon.com/index/features!

Tuesday, December 1, 2015

Configurable Icon Board

Set up your icon board design according to your preference. Choose from the color to the sizes on how you want your screen to be. Bring out the artistic side of you! Source: https://www.authicon.com/index/features

Monday, November 30, 2015

Configurable Security Level

Configure security level accordingly for safety precaution. Set the number of icons to be displayed on the screen. Decide how many login trials are allowed. Have it your way! Source: https://www.authicon.com/index/features!

Wednesday, November 25, 2015

Always There

Authicon authentication system stays on the website so there is no fear of your account getting compromised if you lose your device. No extra device needed. Source: https://www.authicon.com/index/features

Tuesday, November 24, 2015

Works Anonymously and Independently

Authicon system works with anonymity and independently, and focuses on privacy and security. Leaks are impossible, and not even malware with root privileges can find out the user’s credentials. Source: http://bit.ly/1kSwewh

Monday, November 23, 2015

Sunday, November 22, 2015

Cheaper than 2-Factor (SMS) Authentication

Authicon authentication provides cost effective solution that can allow you to achieve the stronger authentication you need that has little to no per-user costs and also do not use tokens that carry expiration dates. Source: https://www.authicon.com/index/features

Thursday, November 19, 2015

Bypass Key logging Malware

With the use of icons as password, we add protection from keystroke-stealing malware. Entering iconic password on your icon board provides no detection for key loggers. Source: https://www.authicon.com/index/features!

Wednesday, November 18, 2015

Enhanced Security Level

By using Authicon authentication system, we enhance your website’s security level by decreasing the exposure of your website to potential attacks that can occur through the web. Source: https://www.authicon.com/index/features

Monday, November 16, 2015

Data hack: A Russian gang just stole over billion passwords

A Russian criminal gang has successfully carried out the world’s largest data breach amassing over a billion usernames and passwords as well as over 500 million email addresses.
First reported by the New York Times, this is the single largest breach of its kind and affects a huge variety of websites from well-known brands to personal sites and blogs.
With over a billion ‘keys’ into people’s website accounts the gang has a potential goldmine of information but according to the New York Times it only appears to be using the information to spam people on behalf of other groups and then collect the fees.
- Data Hack: A Russian Gang Just Stole Over A Billion Passwords
Huffington Post UK, 06 August 2014

How often do we read news about username and password being stolen by hackers? This incident addresses the need for industries to take a better look at the methods on how to secure users’ data. On the part of the users, people should also start to rethink how they secure themselves online. Below are some information about the stolen user credentials and how Authicon secure its users data.

Stolen users’ credentials
Online breaches are on the rise and every year, millions of credentials are stolen. End-user credentials (usernames and passwords) are of interest to spammers but what happens to the stolen information? Stolen user’s credentials can be sold in underground markets by hackers at a varying price. The more important the information, the higher the price tag. This is another way of hackers getting money from your account information.

Storing user credentials

For safety reasons, we do not store users’ passwords. We only collect the user’s “hashed username” using our hashing method. We collect the users’ username and encrypt it, which serves as its access_id to the system. We store the user data (username) on our own database. The database stores the encrypted values. Source: http://blog.authicon.com/authicon_articles/data-hack-a-russian-gang-just-stole-over-billion-passwords/

Sunday, November 15, 2015

Alert! Massive Hack Compromises 4 Million Federal Employees’ Private Info

No one is safe from hackers, even US federal employees private information gets hacked. According to Engadget, “A group of hackers has attacked the Office of Personnel Management (OPM), stealing sensitive data on 4 million current and former American federal employees. Law enforcement sources tell Reuters that the government believes the perpetrators are from China and have penetrated not just OPM’s IT systems, but also the records it stores at the Department of the Interior’s data center.” Read the complete story here.


To avoid hackers stealing your website’s sensitive data, increase the level of security by using graphical icons. Authicon provides that level of security that makes hacking impossible. Try it now for FREE at http://www.Authicon.com

Thursday, November 12, 2015

Giant Hack May Be First Step in Pursuit of Bigger US Secrets

US secrets are in peril as a giant hack targeted personal files of government employees that spies may use to make their way to more secure computers. Dan Payne, a senior counterintelligence official for the Director of National Intelligence immediately told Federal employees to change their passwords. According to Dan Payne, “Some of you may think that you are not of interest because you don’t have access to classified information,” he said. “You are mistaken.”

Federal officials said Friday the cyber-attack appeared to have originated in China, but they didn’t point fingers directly at the Chinese government. The Chinese said any such accusation would be “irresponsible and unscientific.”
Read the whole story at The New York Times.

Make your website more secure by using graphical icons. Try Authicon today for free. Source: http://blog.authicon.com/authicon_articles/giant-hack-may-be-first-step-in-pursuit-of-bigger-us-secrets/

Wednesday, November 11, 2015

Introducing Authicon

What is graphical password?

A graphical password is an authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI). In a graphical password system, a user needs to choose memorable locations in an image.

A graphical password is easier than a text-based password for most people to remember. It may also offer better security than text-based passwords because many people, in an attempt to memorize text-based passwords, use plain words.

Why Authicon?

Using alphanumerical passwords has been shown to have significant drawbacks. To address this problem, Authicon uses the graphical password technique that deals with shoulder-surfing problem, identity theft and other online attacks.

Traditional cyber security system relying on just usernames and passwords isn’t enough anymore. The key is adding extra layers of protection. Authicon adds an extra layer of protection by using a graphical password technique. The system works by having the user logs in to his account on the website secured by Authicon using his login information – email and password for the particular website. Authicon pop up page will then open where the user has to enter the preselected icons from among a variety of icons displayed. If the correct icons were clicked in, the user would be authenticated. Once the user is authenticated, he can now access his account. Everytime the user will access his account on the website secured by Authicon, he has to enter the correct icons on the Authicon pop up page after every login.

Authicon server is capable of supporting tens of thousands of users and can be easily expanded to users without disrupting its infrastructure. Authicon is accessible through any web browser from anywhere.


Authicon eliminates significant up-front expense by offering a way for companies of any size to implement authentication quickly and inexpensively. Deploying Authicon authentication system is easy, cost-effective and secure. Visit http://blog.authicon.com/introducing-authicon/

Tuesday, November 10, 2015

How to Create a Secure Password

News about online hacks are not very new to us. Every year the criminals make off with millions of passwords. Even the major websites that are known to have high security measures such as Facebook, Twitter, LinkedIn and Google are not spared from these online attacks.

Here are some tips on how to secure and create a unique password:

Do not share your passwords with others, for a very obvious reason – the more people know your password, the more vulnerable your accounts are to unauthorized logins. Don’t ever write your passwords down and never give them out to anyone nor post it on your computer screen or desk.
Make a password that is unique to you and not something that is easily guessed, use a combination of uppercase and lowercase letters, symbols and numbers. Avoid using the common passwords such as ‘123456’, ‘111111 ‘qwerty’, and the most common ‘password’. (“Password”? Really?) Choose a phrase that is unique to you and you can customize for each website you use. For example, one possible phrase is “I like sandwiches” then use numbers and letters to recreate it and add an exclamation point at the end. So “I like sandwiches” becomes “1l1k3s4ndw1ch3s!”. You can put the first letter of the website you are using on your new password phrase. For example, for your Facebook password you can use F1l1k3s4ndw1ch3s! and T1l1k3s4ndw1ch3s! for your Twitter account.

Have a different password for each online account, this reduces the risk of having your other accounts compromised. Using one password for all or most of your accounts is never a good idea – if a criminal gains access to one, all of them are compromised.

Change your password several times a year, if the site you’re using has a history of being hacked, the software used in hacking major websites often makes it possible for hackers to continue to view your information until you change your password. Set up your password recovery options and keep them up-to-date so you will have a way to get back into your account if you forget your password.

Other ways to secure an account is by using two-factor and multi-factor authentication:
Two-factor authentication uses a username and password and another form of authentication, often times a security code.
Multi-factor authentication uses the three factors of authentication to verify an identity such as a username and password, a security code, and a biometric like voice ID, fingerprint, facial recognition, or iris recognition.

The problem with two-factor authentication is there is always the fear of your device getting lost or stolen which makes it impossible for the user to get the codes being sent to the device. Authicon offers a layer of protection without having to use a device to authenticate. You will never have to worry about not signing in to your account if you lose your device. Authicon layer of protection stays on the website so there is no fear of the code getting lost or stolen. Only you know the icons to input when prompted. This is the main advantage of using Authicon protection.

It is important to choose a strong password to secure your important accounts. It is always a good practice to update your passwords regularly and to remember it. Further secure your accounts by using additional authentication methods. Source: http://blog.authicon.com/how-to-create-a-secure-password/

Monday, November 9, 2015

The Three Factors of Authentication

For the user and website provider, it is important to have a complete understanding of authentication to establish trust in critical business processes. Here we discuss the three factors of authentication.
·                      Something you know – a memorized information such as a word, phrase, number, code or fact known only to the user.
·                      Something you have – having a unique item containing secret information such as a token code, smart card or a USB-interface device.
·                      Something you are – all biometric such as the user’s voice, fingerprints, hand geometry, retinal or iris scans and handwriting.

One-factor Authentication

This is a traditional security process where the user is required to enter a username and password to be granted access.

Two-factor Authentication

Two-factor authentication is a single-factor plus a software- or hardware-generated token code, a smart card or a USB-interface device. It is where the two authentication elements fall under different categories with respect to ‘something you have’, ‘something you are’, and ‘something you know’. A common example for a two-factor authentication is withdrawing money from a cash machine. To withdraw, you will need your bank card (something you have) and a PIN (personal identification number) (something you know) to have a successful transaction. Another example is when entering a password (something you know) and scan a fingerprint (something you are).

Three-factor Authentication

This is the use of three factors to authenticate the user. The three factors meaning ‘something you know’, ‘something you have’, and ‘something you are’. This is a much-preferred form of authentication as it is much more difficult for an intruder to overcome.

Authicon’s Authentication

Most sites these days offer two-factor authentication where you have to login and they send the code to your phone. The problem with this sytem is that mobile phones are easily lost and stolen and if another person has possession of the user’s phone, they could read the text message and fraudulently authenticate. SMS text messages can also be intercepted and forwarded to another phone number, allowing a cybercriminal to receive the authentication code.

With Authicon, there is no need to use a device. The second layer of protection offered by Authicon stays only on the website where you have to login so there’s no worry of it ever getting it lost or stolen. That’s the advantage of Authicon among other sites offering website security. Source: http://blog.authicon.com/the-three-factors-of-authentication/

Sunday, November 8, 2015

Consulting Excellence


Agility and flexibility are the ingredients of our Service Managers. Our skilled Service Managers make sure you receive the highest possible quality of services and have a strong relationship with your clients. We don't use the standard "one size fits all" approach. We use a framework and methodology that fit your needs, not the other way around. Visit http://www.activemindz.net

Thursday, November 5, 2015

Together we do

Next to software development, ActiveMindz provides consultancy that specializes in top quality Project Managers. We help with decisions related to the overall directions where IT Projects should be heading, implementation and deliver on time within budget. The challenges in modern businesses like yours combined with ActiveMindz Projects Managers are the solution in today's fast-changing world. Visit http://www.ActiveMindz.net

Wednesday, November 4, 2015

Alone, you may not have all the answers

Sometimes your needs go beyond software development and web services projects. Whenever you need more than IT-related knowledge, we are the partner who cover this ground. Our project/service managers are cutting through complexity to deliver results. We plan, design and deliver solutions that result in real value. Visit http://www.ActiveMindz.net

Tuesday, November 3, 2015

How Does it Work?

With ActiveMindz mobile app developers, we will help you reach information at your fingertips. We also make sure that our app works on multiple mobile application platforms. You will have one-touch access to your contact information and you can connect with on-the-go consumers. How convenient is that? Try our mobile app now! Visit http://www.ActiveMindz.net

Monday, November 2, 2015

Convenience

In today's world, customers are always on the move and they're using mobile application platforms to get there. It's very convenient to get information whether by using mobile phones, tablets, or other mobile devices. That's the importance of mobile app in today's market. Visit http://www.ActiveMindz.net

Sunday, November 1, 2015

Why Mobile?

The number of smartphones in use has exceeded 1.5 billion and it is estimated to double in 2015. As much as 65% of smartphone users prefer mobile browsers to the ones on their desktops or notebooks. Only last year, more than 45 billion mobile apps were downloaded. It is not a question of ‘if’, it is ‘how your existing business or startup participates in the mobile world. Because we’ve got the know-how, we’ll be happy to take your business to the mobile side. Visit http://www.activemindz.net!

Thursday, October 29, 2015

How do I know what they do

We are totally transparent on what we do. You may always have a look at our online task management tool, Jira. You'll always be in the loop of what's happening with the project, with detailed summary of what we did and how long it took. We want you to talk to us! You may call us, Skype with us or send us an e-mail.
If communication isn't enough, the methodologies we use, Agile and Scrum, assure you that you will see the results of our work. We deploy a tangibly improved version of your project every now and then so you can check if what we're doing is exactly how you want it to be.

To get the job done properly, we find out every detail of your business. We value every information you give us. NDAs or other secrecy clauses? Not a problem, we'll sign them. It embodies one of our basic rules: things said in ActiveMindz - stay in ActiveMindz. Visit http://www.ActiveMindz.net!  

Wednesday, October 28, 2015

Tell us about your needs

Coding isn't all what we do, we go far beyond that. We look at your needs, discuss them with you, and design the desired solution based on our joined conclusions, then we get to coding. We assume the day-to-day tasks of your operations and delivery, with a strong focus on rigorous IT governance, quality and operational excellence, so you can focus on your core business. Visit http://www.ActiveMindz.net

Tuesday, October 27, 2015

Let us help you

Technology can transform your business and deliver a competitive advantage. You just need to team up with the right partner. Highly skilled ActiveMindz technical specialists are ready to work with you to analyze, advised and apply IT solutions to meet your business goals and optimize your technology investment. Forget about the development process. Forget about painful staff recruitment or headhunters poaching your team. Forget about documentation, hardware, endless testing. Welcome to ActiveMindz, where the job gets done. Visit http://www.ActiveMindz.net!

Monday, October 26, 2015

Coding

This is our lifeblood. We are experts in any programming language you can come across. Coding might appear unappealing to many but it's the outcome that matters.

But this is not all we do, we take a break from coding from time to time to talk to you. Some problems require ad hoc decisions, that's why we make sure to consult with you every now and then so you can tell us what you think. Visit http://www.ActiveMindz.net

Sunday, October 25, 2015

How do we do it?

First of all, we look deeper into your needs. We want to have a full understanding of your whole business before we move to any conclusions. We consult you with every detail of the project, from the architecture, the technology, the roadmap, the deadline. We make sure that every single detail of your requirement is met. All the mundane details of software development are our headache, never yours. Visit http://www.ActiveMindz.net

Wednesday, October 21, 2015

Why Develop Software?

Engage your potential customers with a modern website from ActiveMindz! We provide high-quality web design services and hosting in a wide range of customizable packages. Whether you own a small to medium business or you desire a robust e-Commerce store, ActiveMindz can get your business online in no time. Visit http://www.ActiveMindz.net

Tuesday, October 20, 2015

Our Own CMS

Our homemade and simple CMS is provided for your convenience. Through our years of experience we know better than anyone that a quick website is important. Our A-brand hardware is readily available. With a large amount of web hosting storage you will never go out of space for your website and there is no need to wait longer to realize your online ambitions. For more information visit http://www.ActiveMindz.net

Monday, October 19, 2015

Our Works

ActiveMindz Web Design specializes in providing complete websites. As a customer you will never have to worry about the website for you will always have an updated one. We ensure that you will be spared from hard work so you can only focus on your primary task at hand. In order to achieve this, ActiveMindz uses three different packages which are combined with a service package. In this way, the website connects with your audience and keeps the site up-to-date for visitors. Visit: http://www.ActiveMindz.net

Sunday, October 18, 2015

Flexibility

As we deal with changing conditions, we roll with the punches and adapt to ever-changing situations. We are firm in our thoughts yet open to what others have to offer - flexibility at its best. Visit http://www.ActiveMindz.net

Thursday, October 15, 2015

Excellence

We achieve excellence by holding on to our core values - integrity, agility and innovation. We under promise yet over deliver. We make ordinary things extraordinarily well. Visit http://www.ActiveMindz.net!


Wednesday, October 14, 2015

TeamWork

We draw strength from each other as a team. We believe that we can do greater things when we are together. Effective teamwork requires oneness, open communication and respect. Visit: http://www.ActiveMindz.net

Tuesday, October 13, 2015

Customer Orientation

We make sure that our customer is always in the loop of things. We deal sensitively with any issues. We are always within reach for every client's needs and wants. We only do what you want us to do.Visit http://www.ActiveMindz.net

Monday, October 12, 2015

Web Application

Making software is where ActiveMindz excels. We know the way from concept to coding and maintenance of existing software. For more information visit http://www.ActiveMindz.net! 

Sunday, October 11, 2015

IT Consulting

Sometimes your needs go beyond software development projects and websites. ActiveMindz is there when you need more than IT-related knowledge. More at http://www.ActiveMindz.net

Wednesday, October 7, 2015

Websites

Reach your potential customers with a modern website ActiveMindz! ActiveMindz offers high quality web design and hosting services in a wide range of customized packages. More at http://www.ActiveMindz.net!

Monday, October 5, 2015