فيديو تحذيري في حال تم استخدام الكيماوي مرة أخرى في أي منطقة بسوريا، يرجى النشر على أوسع نطاق
From time to time all web masters get the urge (or the order from on high) to re-vamp their site. For websites that do not include e-commerce business or transaction processing, this SHOULD be a fairly painless procedure.
Unless you are also running a personal web server, it makes sense to discuss your plans with your web hosting provider. At the very least, you will be ensuring they don’t have plans of their own that clash with yours.
Suggested outline procedure:
- 1 Create your plan.
- Walk it through in a “dry run” – it’s very useful to do this with another webmaster.
- Identify milestones with details of how you will recover from potential failures
- 2 Issue advance warning of your plans, and updates if needed, using every communication tool at your disposal
- 3 Create a subdomain for your new system and restrict access to developers only.
- 4 Build, upgrade, or upload your site using the subdomain.
- 5 Test the entire site on the subdomain - use scripts to speed this step if there is a lot of testing required
- 6 Test making and restoring from a backup.
- Note how long it takes to complete steps 6 and 7: this is your “downtime estimate”.
- 7 If your site uses APIs, commenting, imports, feeds, etc, test methods for temporarily freezing access to those functions
- 8 When you’re sure everything is okay:
- Freeze all updates to the live site (if you can’t do this, your downtime clock just started ticking)
- Make a backup of the live site database
- Upload the database to the subdomain
- Run a final batch of tests on the subdomain
- 9 If all tests are positive:
- Temporarily redirect visitors to the new subdomain, keeping interaction frozen, or at least choose the quietest time of the day/night/week.
- Make a complete back up of the new system from the subdomain
- Replace the old site with the new build using the tested system backup from the subdomain
- Test the new build on the main domain
- 10 If all tests are positive, remove the temporary redirect and restore access/unfreeze interactive functionality
Document every step you take in detail, especially file names and locations, whatever changes you make, tests and results. Check your backups, don’t leave it to chance.
You can add extra insurance by creating a complete copy of the old site on a second subdomain, which you can bring into service with a temporary redirect if the plan fails and you run out of time, or if you need to put the project on hold part-way through.
If, having consulted this check list, you do not feel confident about managing your web site upgrade – save yourself the headaches and hire a professional.
by Mary McGuire, Senior Communications Manager, Freedom House
Across the board, the assessed technologies failed to adequately protect user security. In autocratic countries such as Belarus, China, and Iran, this has serious implications for human rights defenders, journalists, and political opposition figures, as well as for ordinary citizens. Individuals who manage to get on the bad side of the government in these countries are harassed, imprisoned, tortured, or even killed, and there is no structure in place to prevent authorities from using mobile phone data to carry out such abuses.
Are citizens in non-democratic countries the only ones who should be concerned? Perhaps not. In the United States and other democracies, there are certainly institutions and procedures designed to protect user privacy, as well as legal remedies if one’s privacy rights are violated. But these safeguards are far from ironclad, and they may be falling behind the pace of technological development. Moreover, even the most benign government is likely to be tempted by the monitoring opportunities associated with devices like smartphones, which a growing number of citizens carry 24 hours a day, seven days a week.
Here are five things everyone should know about the safety of their mobile phones:
Big Brother could be watching. The video and audio recording capabilities that have become so vital to capturing important moments in our lives are also perfect surveillance tools for intrusive governments. It is even possible for the cameras and microphones in smartphones to be remotely activated by government agencies and mobile service providers.
There is nowhere to hide. The Global Positioning System (GPS) that allows us to get directions, find local businesses, and keep tabs on our friends and family members can also be used by governments to track our movements. Because most of our phones rarely leave our sight, we are essentially carrying personal tracking devices.
Our mobile carriers can’t protect us. Mobile providers gather personal data to keep up with our constant desire for customized services, and perhaps more importantly, because it is immensely profitable for them. However, once this data has been gathered, it is for the most part out of our control. Relying on these companies to make the right decisions about who is allowed access to personal information—particularly under threat from governments or when the provider itself is a state enterprise—is not a very safe bet.
The choice is not ours. When we buy a computer, we have the power to install the security tools of our choice, including applications that encrypt communications, circumvent censorship, and detect viruses and malware. When we buy a mobile phone, we are generally forced to use the default settings of the mobile operating systems we purchase. According to the recent Freedom House study, these default settings are grossly inadequate for keeping us secure. Moreover, add-on security and encryption options are often incompatible with the phones and/or limit one’s ability to use other features.
Everyone is to blame. Because mobile security is threatened on various fronts—mobile networks, operating systems, applications, handsets, and users—it is nearly impossible for any single actor to change the situation. The only way to better protect our security is through improved coordination among all players. In the meantime, users in repressive environments should be aware of the risks they are taking, particularly if they are engaging in activities likely to put them on the radar screen of their government.
Photo Credit: Gesa Henselma
The technology that some governments are using to oppress their own citizens is primarily developed in advanced democratic countries. The developers of these tools appear more concerned with potential profits than the potential risks they might pose when misused by repressive regimes. But even those of us who do not have to fear an authoritarian government should care about what we may be giving up in order to live in an interconnected world. Our information is out there, possibly forever, and probably out of our control. It might be time to start demanding new phones and applications that protect our privacy and security as well as entertain us.
- How Do I Protect the Information on My Mobile Phone? (webroot.com)
- Mobile phones might soon come with a health hazard label (androidauthority.com)
- World Bank: 75% of planet’s population now have a mobile phone (intomobile.com)
To make sure everyone stays safe, knows their rights, and keeps their protest movement peaceful and non-violent, here’s a useful checklist.
- DON’T litter. In fact, if you see trash, pick it up! There’s often a fine for littering.
- DON’T indulge in any form of vandalism or anti-social behaviour.
- DON’T block entrances or exits to buildings.
- DO keep to the sidewalks and make sure that others can pass if they need to.
- DON’T bring microphones, bullhorns, air horns, or electric instruments. If you need to be loud then use the people’s microphone.
- DO look out for people who are getting too rowdy or violent. If you see one, politely but firmly encourage them to quiet down, or find your nearest peace keeper if you have them.
- DO keep a buddy! You and your buddy will look out for each other, exchange names, contact details, any essential information such as who to contact in an emergency, or details of any medical needs. Never lose sight of your buddy.
- If you see someone isolated please DO make them your buddy.
- DON’T scream or swear at people; it will only antagonize them. You want them understanding, even admiring and joining you.
- On the other hand, please DO be as loud as you want.
- DO bring your friends and family to peaceful events which affect everyone.
- DO keep marshals, peacekeeping teams, medics and other protest organisers in sight.
- DON’T get distracted from your mission. Remember why you protest.
- DO have a plan – for how to get to a protest, where to meet up with others, what to do when you arrive, and how to get back home.
- DO pay attention to your clothing, especially shoes, and to what personal or valuable items you take with you to a protest
- DO know your rights. Do you have rights to free speech and to peaceful public assembly only under certain conditions?
- DON’T assume you can door say anything you want in the name of freedom of speech. Limit yourself to political speech, stay focused on your goals, and stay within the law.
- DO take pictures and video! Photos of posters or banners that are used in similar protests elsewhere is a good way to show unity and strength of numbers.
- DON’T respond to violence from police, security, thugs, interlopers or rivals with violence.
- DO take photos of, and try to identify if possible, anyone using violence. but..
- Whenever possible, DO give aid to victims as a FIRST PRIORITY, ahead of taking photos or video
- DON’T let others escalate violence and DO protect each other.
Follow these tips if the worst happens. Remember, safety of yourself and others comes FIRST
- If tear gas is deployed DO wet a sleeve or scarf with vinegar, cola, or any liquid you can find and breathe through it as a simple air filter while you leave the area as quickly and safely as possible.
- If physically confronted DON’T fight back. Go limp and protect your core while shouting LOUDLY for help.
- If you have asthma or a heart condition stay back. Keep your medicine on you. Stay safe!
- Pepper spray or tear gas can send you into shock if you’re unprepared. If you’re sprayed DON’T panic. DO keep taking deep breaths of clean air and breathe out slowly. Be aware that it will hurt, a lot, but it will eventually feel better.