I’ve seen many instances where a sudden outrage occurs because some ecommerce site like Amazon or some T shirt store ends up selling some product which an outrageous message on it. People will howl: how could they choose to do something so stupid? This article gives a good explanation of just how such stupidity occurs: How Amazon Ended Up With Auschwitz Christmas Ornaments for Sale | WIRED
In a nutshell, things are automated to the point that many of these platforms take on products with little if no review. The cost of review would be much much higher than the occasional cost of having to deal with these exceptions. Given that, expect more and more of this to occur until some legislation comes into play.
A simple way of determining if an email is a phishing attempt is to move your mouse over the link(s) in it to see if they match what is on your screen. For example, if you get an email from Apple that says:
Use this link https://applid.apple.com to verify your account
You might move your mouse over the URL and see that the link is to company https://phishingRUs.com/ or something else.
But what if the URL is a URL shortening site, like http://bit.ly or http://dlvr.it/?
My advice: assume it is a phishing attack. It could be the real company, but most large organizations will not do this. (And if they do, they need to at least be explicit about it in the URL).
My general advice: if you are not sure or uncomfortable, assume it is spam or phishing and delete it.
Then read this: How Smart TVs in Millions of U.S. Homes Track More Than What’s On Tonight – The New York Times.
It’s a year old, but I highly doubt the problem has gone away. You may want to consider at least not buying from the brands listed. You may even go as far as having your TV unplugged when not watching it. For more tips, see this.
I hesitate to echo Barron’s here: Kubernetes Is the Future of Computing. Everything You Should Know. – Barron’s because computing is vast, and there is more to computing than Kubernetes. (AI, for one thing.) But Kubernetes is one of the main drivers of change in IT, and more and more people are moving towards it. If you don’t know much about it and you subscribe to Barron’s, I recommend you read their piece. Otherwise Google “kubernetes for business leaders” or “Kubernetes 101” and you’ll find quite a few good pieces on it.
Short answer: no. Longer answer can be found here: What Would It Take to Shut Down the Entire Internet?
It’s possible to mess up the Internet, but it is a lot harder than you think. Read the piece and find out why.
I was going through this exercise for Using Calico network policies to block traffic when I thought that instead of deploying the webserver image using this command:
kubectl run webserver --image=k8s.gcr.io/echoserver:1.10 --replicas=3
I would create a yaml file to deploy the webserver instead. Unfortunately, there was something about my yaml file that preventing things from working. That’s when I came across this trick.
- Step 1: deploy the web server using the kubectl run command.
- Step 2: run the following command to get the YAML back for the deployment
kubectl get deployment webserver --output yaml > webserver.yaml
- Step 3: edit the webserver.yaml file to remove extra lines. For me, I was able to remove:
- the status section
- the annotations section
- the strategy section
And just keep the following lines (note, note formatted properly):
- image: k8s.gcr.io/echoserver:1.10
Now, you do not have to edit the file. But I think this is cleaner than the full version that comes back.
So you can delete the deployment that was the result of the command line and instead build future deployments using the yaml file.