Thursday, October 30, 2014

Smallish Post 3

The past few years several General Conference talks have focused on sharing the Gospel through social media. I often struggle between wanting to share the Gospel and doing so in a way that feels natural. I don't have Instagram, Pintrest, or SnapChat. I use Facebook pretty infrequently and that is it for social media. When I do go on Facebook I don't actually post anything, rather I look at the messages I have received. I feel like if I were to suddenly post things about my testimony and the church it would be very out of place. From my own experience I don't really pay attention to most of the things posted by people, especially if they are trying to make a direct statement on some issue. Each person needs to identify how they can share the Gospel over social media in a way that fits naturally in with who they are. One example of this for me is when I go somewhere fun with my friends we will take a picture of all of us. I can also do this for things like temple trips.

Monday, October 20, 2014

Book Post 1 - The Cuckoo's Egg

I wonder if a story similar to the one in the Cuckoos Egg would be possible today. Technology has improved greatly since that story took place. These advances make it both easier to track people as well as to hide. I can think of two reasons why it is not likely to happen again. First, Cliff Stoll received a lot of help from individuals at the network companies that probably wouldn't be available today. He called them at unusual hours. They performed call traces because they were interested in what was happening. These people had extra time to help Stoll on his hunt. In today's world I don't think a company would allow one of their employees to waste time on a wild goose chase. Second, the job of searching for a cyber hacker would not be pushed onto one of the individual victims. Federal agencies, such as the FBI, CIA, and NSA, have taken a greater interest in cyber security after incidents like this, and now react quickly to threats of this nature. These agencies are more formal and take proper legal action in conducting their investigations. Any significant work done by a regular person would most likely be discredited because they did not have legal jurisdiction.
This does not mean that we no longer have a responsibility to keep track of things happened on our networks. Every network administrator is charged with ensuring privacy is secured and if a problem is found it should be reported to the proper agencies with jurisdiction to further investigate.