Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Tag Archives: Google

Cloud storage Terms of Service comparison: Avoid Google Drive | The Verge Forums

Chances are this will never be an issue, but the standard Google terms are particularly egregious in the context of personal cloud storage.

…. and, it seems to me, that one could never use Google Drive in a business context, since Google will have the right even to “publicly display” the information you upload.

via Cloud storage Terms of Service comparison: Avoid Google Drive | The Verge Forums.

Google Gives Search a Refresh –

To provide answers that arent already in Google’s ever-expanding database, the company will blend new semantic-search technology with its current system to better recognize the value of information on websites and figure out which ones to show in search results. It would do so by examining a Web page and identifying information about specific entities referenced on it, rather than only look for keywords.

via Google Gives Search a Refresh –

Google hacking 2011

An interview with Johnny Long, “regarded as a leading authority on Google hacking. Between his speaking engagements and returning to Uganda, Long found time to straighten out my misperceptions”.

via Google hacking: It’s all about the dorks | TechRepublic.

Microsoft falsely labels Chrome as malware

“Wow, that’s certainly one way to win the browser war,” said Andrew Storms, director of security operations at nCircle Security, over on Network World.

Google has released a new version of Chrome after Microsofts antivirus software flagged the browser as malware and removed it from about 3,000 peoples computers on Friday.

Microsoft apologized for the problem and updated its virus definition file to correct the false-positive problem, according to a post from Ryan Naraine at ZDNet.

“…perhaps Microsoft should have included Google, not just its customers, in its apology”.

via Microsoft falsely labels Chrome as malware | Security – CNET News.

1st impressions of Motorola Xoom: 5 quick insights

Takeaway: The Motorola Xoom is more of a PC replacement than the iPad, but it still has some frayed edges that need to be evened out before most early adopters will want to jump on board.

via First impressions of the Motorola Xoom: Five quick insights | TechRepublic.

Google Rolls Out Two-Factor Authentication

From TechCrunch: Google Rolls Out Two-Factor Authentication For Everyone. You Should Use It.

Another reviewer finds it unwieldy, from ZDnet: Google’s two-factor authentication: nice idea, but unwieldy.

I have implemented this on my Google account… In my past I have seen the effectiveness of 2-factor authentication, even participating in the invention of a two-factor system that worked for Windows Domain authentication where the endpoint members were not trusted.

I was amazed at how many times I had to reauthenticate after turning this on.  Every browser I use on every system I use (plus my phone), and a couple of the non-two-factor systems as is mentioned in the ZDnet review.  But, I got into them all without issue just following the instructions.

I recommend implementing this on your Google account, and I hope that more services roll out a similar tool soon.

Google vs. Bing: The Fallacy Of The Superior Search Engine

Very interesting stuff!

[The author] evaluated 20 different searches split evenly between Transactional and Informational queries and the search engines’ ability to deliver quality results, admitting that quality is a very subjective term, but includes things like timeliness, 1 click access to info, volume of content and lack of spam.

Look at the article to see why Bing won.  Via Google vs. Bing: The Fallacy Of The Superior Search Engine.

Google Encrypted Search News

Google’s Encrypted Search Seems to Stop SEO Poisoning

When you make a search on Google or another major search engine, you probably feel pretty confident that the first page or so of results will be relevant, valid and safe.   Not so! If you’re searching on a popular topic, there’s every chance that malicious links will turn up near the top due to a nasty technique called SEO poisoning…

When you go to rather than just, your search requests go through an encrypted SSL connection. When you click links from the results, the linked-to site does not receive the usual referrer information. A malicious site relying on SEO poisoning to attract visitors won’t be able to tell that you actually came from a search site and hence won’t serve up its evil code. Or at least that’s the thought.

via Google’s Encrypted Search Seems to Stop SEO Poisoning

Google Moves Encrypted Search to a New Site

Googles encrypted search engine, launched in May, has moved to a new Web address that isnt as convenient as its original one but that gives organizations the option to block the site for their users without locking them out of other Google services.

Originally offered at, the encrypted search engine has been relocated to, a move prompted primarily by the requirement of schools and universities to block encrypted search engines for their students.

via Google Moves Encrypted Search to a New Site 

PS: This is my first post using 3G, from a car cruising down the highway.

Google Search over SSL has an oops

According to Google’s Web Search Help blog, the search giant has decided it’s important to keep search inquiries from the prying eyes:

“With Google search over SSL, you can have an end-to-end encrypted search solution between your computer and Google. This secured channel helps protect your search terms and your search results pages from being intercepted by a third party. This provides you with a more secure and private search experience.”

TechRepublic’s Chad Perrin recently penned an article about the benefits of SSL-encrypted Web searches. He also advises caution as some searches are not protected by SSL encryption and under certain circumstances SSL is vulnerable.

via Google Search over SSL has an oops | IT Security |

Does Google Have Wi-Fi Data from Your Company?

Google has been “accidentally” collecting wi-fi data, but not if it was encrypted.

Google is facing scrutiny and investigation around the world following revelations that it has been capturing and archiving wi-fi data collected by its Google Street View vehicles that drive around capturing the image data used by the Street View service. It is questionable whether Google should have done that, but what is not questionable is whether or not Google should have any data from your wi-fi network.

While it may seem like an invasion of privacy–and in some countries or jurisdictions it may very well be–it is not necessarily against the law here in the United States. Frankly, there is no reasonable expectation of privacy for data that you willingly broadcast unencrypted into public airwaves.


%d bloggers like this: