by vinova | Apr 24, 2020 | Ruby on Rails
Hey! Paper Leaf is an award-winning digital product agency located in Edmonton, AB. We design & develop innovative custom websites, web applications, and mobile applications –and we are looking to add another full-time Web Developer to our current team of 13 to help us do that. We have a fun, relaxed & flexible environment; a tight-knit team where your voice is heard; a variety of challenging, rewarding, and creative work; and room for professional development. It’s a good place to be. We work on projects for clients across the globe, and you’ll be working on a team that values high-quality execution – not one that is hellbent on burning you out and churning out as much work as possible. You can learn more about our work on the Portfolio page, our team on our About page, and get a good vibe of our culture from our Instagram feed. Sometimes mission statements are bogus, but we believe in ours: to help businesses and organizations grow through elegant execution of design and technology. As well, we believe that diversity in all regards contributes to a broader collective perspective that will consistently improve Paper Leaf and the work we do. We are working hard to increase the diversity of our team wherever we can and we actively encourage everyone to consider becoming a part of it. The Position The Web Developer position at Paper Leaf is a full-stack one – so experience and/or interest in both front and back end is a must. You’ll be working in a modern web development environment (git, version control, etc) on large/complex content managed sites (primarily WordPress – custom builds, not theme customizations), eCommerce sites, web applications (Laravel, React) and...
by vinova | Apr 24, 2020 | mobileapp
MLSDev is a mobile and web app development agency that specializes in all-in-one solutions for businesses, entrepreneurs, and startups. The company’s processes are built around agile methodologies. MLSDev team of experts always uses innovations and works on every project with love and a high level of involvement to satisfy the needs and requirements of customers. MLSDev tries to build more than just a vendor relationship with the clients. They aim to establish friendship and long-lasting transparent cooperation. Services Provided by MLSDev: Main services: business analysis, mobile and web design, web and mobile app development, ongoing development and support. Additional services: proof of concept / technical research, load testing, IoT hardware prototyping and software development, blockchain development. Key Clients: ESPN, McDonald’s, GoPuff, Danone, Panasonic, Alpine, Comfy, ArtStation, LevelUp, Chored, Yummi, and EdgeRift. Ukraine, USA, Poland101 – 250[email protected]Founded: 2009$25-$49/hr. +1-303-317-6054 For over 26 years, we’ve been working as a software innovation partner to Fortune 500 companies, big enterprises and technology challengers. Our team of 1,100+ professionals provides you with a full range of software engineering and consultancy services. Software products that we build help the world’s leading brands transform their businesses, increase their revenues and save up to 40% of the time and operating costs. Services Provided by Eleks: Software Engineering, Technology Consulting, QA, R&D, Business Analysis, UX Consulting, Security Services. Key Clients: Aramex, Eagle, Russman, Medusabusiness, Teleologica, Havas, Reactoo, Blackboard, Accelerated Analytics, Coras, Xceedium, States of Jersey. Ukraine, USA, UK1000+[email protected]Founded: 1991 +1-702-710-4990 Cleveroad team is your reliable partner in software design and development. Starting with an idea, through requirements analysis to UI/UX design creation and development, we work...
by vinova | Apr 23, 2020 | Cyber Security
When the popular security-focused BackTrack Linux distribution was redesigned from the ground up and given the name Kali Linux nearly seven years ago, I remember thinking that it was a fantastic name – and fitting, too. I had the vivid image of the many-handed Hundu goddess of time and change in my mind, with her typical fierce expression and wielding a weapon/tool in each hand, and made an instant association with the newly Debian-based distro containing hundreds of preinstalled penetration testing programs. As it turned out, its developers did not have the goddess in mind – or anything else, really – when they chose the new name, but the association stuck with me as I continued to follow the distro’s development through the years. The Kali Linux user base Kali Linux is a household name for people working in the information security arena. Not everyone uses it, but they do know about it. According to Jim O’Gorman, Chief Content and Strategy officer at Offensive Security and leader of the Kali team, Kali users generally fall into two buckets: highly informed, experienced professionals/hobbyist and individuals that are new to Linux in general. “As a whole, I think it’s fair to say that we build and design Kali for security professionals and hobbyists to utilize as a base platform for their work. These are individuals that could easily roll their own version of Linux for their needs, but if Kali is done right, it’s a no-brainer to use it and save the work and effort that would go into building your own,” he told Help Net Security. “As you can imagine,...
by vinova | Apr 19, 2020 | Ruby on Rails
Nowadays we can’t imagine our lives without websites and apps — they changed everything. And as web development continues to grow exponentially, there remains an immense demand for web developers that is projected to grow over a 10-year period. With a wide range of possible ways to become a web developer, most learners are not sure how to begin. In this article, you will find a step-by-step plan on how to become a web developer in 5 months. This article answers three main questions: Part 1: WHY learn to code? Part 2: WHAT you will learn? (the 5-month plan) Part 3: WHEN to start looking for a job? Part 1: WHY learn to code? You can improve your yearly income According to Paysa, a salary comparison website, “A Web Developer earns an average of $91,587, ranging from $77,544 to $103,370, with top earners (the top 10%) earning more than $117,646. Learn more. Your job will be in high demand over 10 years Isn’t it great to receive job offers on a weekly basis? Don’t be afraid that tomorrow you may not have a job. Once established as a highly-skilled web developer, you’ll be even more in demand. Recruiters will be hunting for you…. The United States Bureau of Labor Statistics says, “Employment of web developers is projected to grow 15 percent [through] 2026, much faster than the average for all occupations.” The Bureau of Labor Statistics is no joke. Please read their data and analysis here. You will get flexibility — not tied to a specific location Many developers travel while they work spending months in various countries while their clients or employers are based in another. But ultimately you decide whether to work for...
by vinova | Apr 16, 2020 | mobileapp
Mobile application development industry in the last five years has multiplied in leaps and bounds, changing the way businesses function worldwide. With enterprises aligning mobile apps to their productivity in recent times, and with the rapid innovation in mobile devices across platforms, it calls for mobile app developers to write several versions of an application for many different platforms using a single language and many pieces of reusable code. Are you game for that? Once you intend to realize your mobile app idea, it’s time to validate it, understand the target market, and narrow down the platform on which you ideally would like to build your mobile application. As soon as that is decided, it’s time to select a programming language, keeping in mind your business strategy to make either native, hybrid, or cross-platform apps. Choose the Right Programming Language HTML5 is the ideal programming language if you are looking to build a Web-fronted app for mobile devices. Although it makes various data types simple to insert, accounts for different screen sizes, rationalizes input parameters, and even levels the browser playing field, the problem with HTML5 is that it is still a proposed standard. Currently supported in a lot of different ways by a lot of different browsers, HTML5, from the cost-efficiency point of view, has the advantage of building on the current version of HTML- making the learning curve much shallower than that for a completely new language. Objective-C The primary programming language for iOS apps, Objective-C was chosen by Apple to build apps that are robust and scalable. Being a C-language superset, it does have a number...
by vinova | Apr 15, 2020 | Cyber Security
The total volume of phishing emails and other security threats relating to the Covid-19 coronavirus now represents the largest coalescing of cyber attack types around a single theme that has been seen in a long time, and possibly ever, according to Sherrod DeGrippo, senior director of threat research and detection at Proofpoint. To date, Proofpoint has observed attacks ranging from credential phishing, malicious attachments and links, business email compromise (BEC), fake landing pages, downloaders, spam, and malware and ransomware strains, all being tied to the rapidly spreading coronavirus. “For more than five weeks, our threat research team has observed numerous Covid-19 malicious email campaigns, with many using fear to try to convince potential victims to click,” said DeGrippo. “Criminals have sent waves of emails that have ranged from a dozen to over 200,000 at a time, and the number of campaigns is trending upwards. Initially, we were seeing about one campaign a day worldwide; we’re now observing three to four a day. This increase underscores just how appealing global news can be for cyber criminals.” In the past week alone, a number of deeply concerning campaigns have emerged that appear to be targeting the critical healthcare, manufacturing and pharmaceutical industries. DeGrippo said she had observed a campaign originating from advanced persistent threat (APT) group TA505 – which was behind the Locky ransomware strain and the Dridex banking trojan – using coronavirus loads in a downloader campaign. Downloaders are particularly dangerous threats because once they have been delivered and installed, they can download additional types of malware. The TA505 group is considered to be one of the more significant financially...
by vinova | Apr 13, 2020 | Cyber Security
South Korea is fighting the novel coronavirus (COVID-19) by relying on its technological forte. The country has an advanced digital platform for big-data mining, along with artificial intelligence (AI) and Koreans are leading the technological front, with Samsung competing closely with Apple.Inc of USA. Utilising big-data analysis, AI-powered advance warning systems, and intensive observation methodology, South Korea has already managed to bring the coronavirus situation in the country under control in a short time. The government-run big-data platform stores information of all citizens and resident foreign nationals and integrates all government organisations, hospitals, financial services, mobile operators, and other services into it. South Korea is using the analysis, information and references provided by this integrated data — all different real-time responses and information produced by the platform are promptly conveyed to people with different AI-based applications. Whenever someone is tested positive for COVID-19, all the people in the vicinity are provided with the infected person’s travel details, activities, and commute maps for the previous two weeks through mobile notifications sent as a push system. Government-run health services receive information on the person’s contacts, making it easier to track those whom s/he had met during that time, and bring them under observation and medical tests. AI ensures prompt execution of all these steps. Hospitals, ambulance services, mobile test labs — all rely on IT sector and technology to deliver prompt and efficient services. South Korea also introduced drive-through coronavirus testing, in which a person drives his car inside a mobile testing lab, get his samples collected while sitting inside the vehicle, and gets test results within a few minutes. If...
by vinova | Apr 11, 2020 | Cyber Security
Teens from Fergus are among the youngest cyber security experts in the country. For the third year in a row, students from Centre Wellington District High School in Fergus will be competing against teams from across the country in the international cyber security competition for high school students, Cyber Titan. The senior team ranked third in Canada and 44th in the world this year, a feat that didn’t really surprise them. “We work really well together. We study hard. We practice. Communication is a big part. And we just work really well together as a team. And we know our stuff,” said Edward Noel. Rachel Routly, who was on the all-female team called the Terabytches last year, is now on the mixed-gender senior team. She says all the team members are in the same grade and have classes together, which helps them mesh. She adds, “it’s good to prove that girls can do well when they’re not only on a girls’ team.” Edward Noel was on the senior team last year and says he’s excited about the team’s chances this year. “This team is actually, like, passionate about cyber security,” he said. “The passion combined with the teamwork and the mentality coming in, like, you know, I want to be the best in the world. It’s, like, yeah, that’s what gets you the win.” Get youth thinking about cyber security It’s that passion and drive to learn about cyber security that is also exciting to people in the industry who hope to one day recruit young minds. Kathryn Hodge at the cyber security company eSentire in Waterloo says their firm often focuses on...
by vinova | Apr 9, 2020 | Ruby on Rails
You’ve figured out what’s wrong, and you’ve delivered a laundry list of demands to your web dev team: re-index these pages, fix this duplicate content, redirect these URLs… but how often are those fixes prioritized, and how much time do you invest in pushing to get them there? Cultivating a positive, productive relationship with your web developers is one of the smartest (and most empathetic) things you can do as an SEO. After all, they’re your other half, the key to getting your work done quickly and well. In this Whiteboard Friday, Britney Muller shares six essential ways to get your web dev on board with SEO, from working to better understand their role and offer help when you can, to sharing your wins and asking for feedback on working together. And don’t miss the end — we’ve released our brand-new Web Developer’s SEO Cheat Sheet for 2020, the perfect pairing for today’s video! Click on the whiteboard image above to open a high resolution version in a new tab! Video Transcription Hey, Moz fans. Welcome to another edition of Whiteboard Friday. Today we’re talking all about how to get your web dev on board with SEO. So really excited. I think you’ll notice my biggest point here, and I couldn’t feel more strongly about the fact that we really do have so much to learn from developers, it’s wild. Hopefully, this video helps kind of open some of your minds or expand some of the ways in which you can do that, because it will make you a lot stronger. 1. Create a genuine relationship with developers and...
by vinova | Apr 8, 2020 | mobileapp
There are cross-platform frameworks like Xamarin, React Native already available in the market to develop iOS and Android apps with single code base. However, Flutter has entered very strongly in the race of the cross-platform mobile app development. In this article, we will explore: What’s Flutter Flutter is Google’s mobile app SDK which allows developers to write apps for iOS and Android using the same language and source code. With Flutter, developers can build native like apps using Dart programming language and using its own widgets. Being backed by Google, Flutter is emerging as strong competitors for the Xamarin and React Native. Flutter uses Dart programming language which was introduced by Google in 2011 and is rarely used by developers. Read more, what are the pros and cons of Flutter. Although, Dart is rarely used language, it’s easy to learn and use. The Dart framework uses Skia C++ engine which has all the protocols, compositions and channels to make apps looks like native. Flutter also has widgets for Material Design and Cupertino that allow developers to easily render the UI on both iOS and Android platform. Brief History of Flutter In the beginning, Flutter was known as “Sky” and only supported on the Android platform. As Flutter used Dart programming language which since long but it was only used inside the Google. Flutter was publicly announced in 2015 at the Dart developer summit, at that time, Flutter used to called as “Sky”. You can watch initial announcement video here. Google then announced Flutter preview release 2 at the Google Developer days in Shanghai and subsequently at Google I/O. Finally,...
by vinova | Apr 7, 2020 | Cyber Security
The objective was simple – see how susceptible the organization is from an external point of view and test the effectiveness of the security controls that are managed enterprise-wide. As such, asides, the company name, we were given “ZERO” information to perform an external black-box penetration Testing. This black-box external penetration Testing Performing with a by a client called (Hackme) OSINT 101 We kicked off with some Open Source Intelligence (OSINT) 101 :). There are quite a number of open source intelligence tools – to assist in gathering emails, subdomains, hosts, employee names, etc from different public sources like search engines and shodan. There is an exhaustive list of such awesome tools here . Using quite a few open source intelligence tools, we obtained publicly available documents relating to the organization using Black-box Penetration Testing methods. With Google dork to the rescue, we ran some basic search strings: “site:*.hackme.com ext:xls OR ext:docx OR ext:pptx” . Of course, our aim was not to tirelessly search for documents. Rather, our objective was to understand the organization’s naming schema by examining the metadata of the documents which is found in the “properties section” of the document (most especially Microsoft Word, PowerPoint, and Excel). One can also use FOCA for this. From this, I noticed that employees emails followed a particular naming convention – the first letter of the firstname + surname @ domain.com i.e. [email protected]. Armed with this knowledge, we forked out from LinkedIn the list of all current employees of Hackme using the following google dork syntax: site:linkedin.com -inurl:dir “at Hackme” “Current”. A typical example is shown below using Google Inc as a...
by vinova | Apr 7, 2020 | Team
In Vancouver, every time we need to know something, we go to our trusty phone. It’s the window we have to the endless stream of pages and links. What, out of all of the possible options, gets our attention? Some of it is being on the first page, for sure. Yet how often have we had to go down the list because of how insufferable the website is? Good B.C. SEO doesn’t make a good website. What makes a good website is a good local web designer. If you’re looking to make a website but don’t have all of the utilities on hand, contacting a professional web designer can do wonders for both your website and the traffic that it generates. There are principles in play that get someone to stay on your site. Best believe the pro’s know it. If you’re in the market to find the best Vancouver web designer you can, here are some things to look for that can make your experience as smooth and positive as possible. They’re Local It may be tempting to check out reviews online for international design firms. That’s all well and good, but having someone that is within your radius is just as important as the resume. Having someone that kind where you’re coming from allows for them to adequately translate your business or idea onto a presentable online space. Try narrowing down the search. For instance, if you’re in Vancouver, it is ideal to check out Vancouver Web Design Companies before expanding. In a city as diverse and technologically driven as Vancouver, you’ll be sure to find a...
by vinova | Apr 6, 2020 | Cyber Security
We are data scientists—that is, our job is to understand how to analyze and interpret data. When we analyze the data around covid-19, we are very concerned. The most vulnerable parts of society, the elderly and the poor, are most at risk, but controlling the spread and impact of the disease requires us all to change our behavior. Wash your hands thoroughly and regularly, avoid groups and crowds, cancel events, and don’t touch your face. In this post, we explain why we are concerned, and you should be too. For an excellent summary of the key information you need to know, read Corona in Brief by Ethan Alley (the president of a non-profit that develops technologies to reduce risks from pandemics). Translations Anyone is welcome to translate this article, to help their local communities understand these issues. Please link back to here with appropriate credit. Let us know on Twitter so we can add your translation to this list. Contents We need a working medical system Just over 2 years ago one of us (Rachel) got a brain infection which kills around 1/4 of people who get it, and leaves 1/3 with permanent cognitive impairment. Many others end up with permanent vision and hearing damage. Rachel was delirious by the time she crawled across the hospital parking lot. She was lucky enough to receive prompt care, diagnosis, and treatment. Up until shortly before this event Rachel was in great health. Having prompt access to the emergency room almost certainly saved her life. Now, let’s talk about covid-19, and what might happen to people in Rachel’s situation in the coming...
by vinova | Apr 4, 2020 | Ruby on Rails
Full stack web developers are the Swiss Army knife of the code world. Having that designation means you can produce end to end solutions, which is a highly marketable and agile skillset. But what does it actually take to achieve that status? Whether you’re new, seasoned, or specialized in one end of the stack, there’s a lot to digest here. Feel free to dive in from the top or bounce around to where you need the most support. First off, what really makes a developer full stack? It’s fun and buzzy to say any front end developer is a full stack developer, but being able to deploy a website to Netlify doesn’t make you full stack. This isn’t to be discouraging, just realistically, only having that experience won’t hold up well to that job title in your next interview. While you’re technically creating and deploying your work from start to finish, Netlify, Zeit, and other providers give you the power to do this with their magical tools that take the majority of the stack operations work out of the equation. That’s not to take away from what we’re all able to accomplish now as front end devs. The growing movement to compile and deploy static websites has just made this process simpler on the later half of the stack with benefits across the board. Additionally, with the flexibility of tooling options like being able to run JS on a server, our skillsets are able to transfer to more use cases than ever before. Where we came from The web development landscape has been changing rapidly. WordPress has been king...
by vinova | Apr 3, 2020 | Cyber Security
Wireless Penetration testing actively examines the process of Information security Measures which is Placed in WiFi Networks and also analyses the Weakness, technical flows, and Critical wireless Vulnerabilities. Most important countermeasures we should focus on Threat Assessment, Data theft Detection, security control auditing, Risk prevention and Detection, information system Management, Upgrade infrastructure and the Detailed report should be prepared. Framework for Wireless Penetration Testing 1. Discover the Devices which connected with Wireless Networks. 2. Document all the findings if Wireless Device is Found. 3. If wireless Device found using Wifi Networks, then perform common wifi Attacks and check the devices using WEP Encryption. 4. if you found WLAN using WEP Encryption then Perform WEP Encryption Pentesting. 5. Check whether WLAN Using WPA/WPA2 Encryption .if yes then perform WPA/WPA2 pentesting . 6. Check Whether WLAN using LEAP Encryption .if yes then perform LEAP Pentesting. 7. No other Encryption Method used which I mentioned above, Then Check whether WLAN using unencrypted. 8. If WLAN is unencrypted then perform common wifi network attacks, check the vulnerability which is placed in unencrypted method and generate a report. 9. Before generating a Report make sure no damage has been caused in the pentesting assets. Wireless Pentesting with WEP Encrypted WLAN 1.Check the SSID and analyze whether SSID Visible or Hidden. 2. Check for networks using WEP encryption. 3.If you find the SSID as visible mode then try to sniff the traffic and check the packet capturing status. 4. If the packet has been successfully captured and injected then it’s time to break the WEP key by using a WiFi cracking tool such as Aircrack-ng,...
by vinova | Mar 31, 2020 | mobileapp
Before we proceed any further, here are some facts and figures for you to chew on: If you have eyeballed the figures carefully enough, you would know the mobile app industry is currently running the show. Because the market is hyper competitive, app penetration is deepening at a steady pace without any sign of slowing down. This is great news for developers as well as companies because app development in present times carries all the potential of dynamic pricing. But, are we also going to discuss the research and development costs that come along? As app makers, ask yourselves these six questions: The answer is – with React Native! Before we explain why, let us talk about cross platform compatibility first. How is a Mobile App Developed to be Cross Platform Compatible? A mobile app created to be functional across multiple mobile operating systems with equal efficacy is known to have cross platform compatibility. Such an app can be developed in relatively less time and at a cost that is significantly lower. In other words, this one is a cost effective way of developing apps. Also, because this is the age of WORE (Write Once, Run Everywhere), the process of developing these apps usually involves just a single round of coding. In modern times, this has become a business imperative instead of a choice. With mobile operating systems diversifying and apps needing the best of all platforms, this is a middle ground that delivers neutrality. How Does Cross Platform App Development Reduce Costs? Not many years ago, app development was an idea strictly limited to platform nativeness. Whenever a...
by vinova | Mar 31, 2020 | Cyber Security
Accenture has announced its intentions to acquire Symantec’s Cyber Security Services business from Broadcom Inc. Broadcom scooped up the entire Symantec Enterprise Security business for $10.7 billion in August. The amount Accenture paid for the Cyber Security Services division has not been disclosed. Under the deal, Accenture will take on Symantec’s portfolio of Cyber Security Services, which includes global threat monitoring and analysis, conducted through a network of security operation centres and threat intelligence and incident response services. Symantec’s six security operations centres are located in the United States, the United Kingdom, India, Australia, Singapore, and Japan. Accenture will also now assume responsibility for the 300-plus Mountain View-based staff employed under the Symantec Cyber Security Services business. See also: Cybersecurity staff burnout risks leaving organisations vulnerable to cyberattacks “Becoming part of Accenture Security is a tremendous opportunity for our clients and our cyber warriors around the globe, enabling us to fuse the unique services, capabilities, and solutions of two well-established companies to deliver the next generation of cybersecurity services,” vice president and general manager of Symantec’s Cyber Security Services business John Lionato said. Accenture now boasts a handful of security-focused business units, after previously scooping up Deja vu Security, iDefense, Arismore, Maglan, Redcore, and FusionX. “Cybersecurity has become one of the most critical business imperatives for all organisations regardless of industry or geographic location,” Accenture CEO Julie Sweet said. “With the addition of Symantec’s Cyber Security Services business, Accenture Security will offer one of the most comprehensive managed services for global businesses to detect and manage cybersecurity threats aimed at their companies.” Accenture said that during the 2019 fiscal...
by vinova | Mar 26, 2020 | Cyber Security
Big data holds out big promises for marketing. Notably, it pledges to answer two of the most vexing questions that have stymied marketers since they started selling: 1) who buys what when and at what price? and 2) can we link what consumers hear, read, and view to what they buy and consume? Answering these makes marketing more efficient by improving targeting and by identifying and eliminating the famed half of the marketing budget that is wasted. To address these questions, marketers have trained their big-data telescopes at a single point: predicting each customer’s next transaction. In pursuit of this prize marketers strive to paint an ever more detailed portrait of each consumer, memorizing her media preferences, scrutinizing her shopping habits, and cataloging her interests, aspirations and desires. The result is a detailed, high-resolution close-up of each customer that reveals her next move. But in the rush to uncover and target the next transaction, many industries are quickly coming up against a disquieting reality: Winning the next transaction eventually yields only short term tactical advantage, and it overlooks one big and inevitable outcome. When every competitor becomes equally good at predicting each customer’s next purchase, marketers will inevitably compete away their profits from that marginal transaction. This unwinnable short-term arms race ultimately leads to an equalization of competitors in the medium to long term. There is no sustainable competitive advantage in chasing the next buy. This is not to say firms should never try to predict and capture the next purchase – but that they can only expect above-average returns from this activity in industries where competitors are lagging and...