Posts

Showing posts with the label social networks

5 Ways to make freelancing your full time jobs

Image
Living the laptop lifestyle isn’t as easy as it seems. Freelance jobs aren’t just one long adventure where you can travel the world with no worries. It’s time-consuming. Even though you may not need to show up to an office every day, it’s still a job. Even so, dedicating yourself to freelancing fulltime can be incredibly rewarding. If you crave to live life on your own schedule you are probably already considering building a career in freelancing, building an online business, or becoming an entrepreneur. Through my experiences, I’ve learned crucial steps to building a career in freelancing. There are certain habits you should invest in if you want to succeed. If you want to learn how to make money online, or how to land freelance writing jobs pay attention to these guidelines. Entrepreneurs and freelancers need to hustle to thrive. If this sounds like you, here are five things that can transform you into a full-time freelancer. 1. Control your schedule, don’t let you...

What does 1st, 2nd, & 3rd degree connection mean in LinkedIn profiles?

Image
Your network is made up of your 1st -degree, 2nd -degree, 3rd -degree connections, and fellow members of your LinkedIn groups. 1st -degree - People you're directly connected to because you've accepted their invitation to connect, or they've accepted your invitation. ... You can contact them by sending a message on LinkedIn . On LinkedIn, people in your network are called connections. Your network is made up of your 1st-degree, 2nd-degree, 3rd-degree connections, and fellow members of your LinkedIn groups. 1st-degree - People you're directly connected to because you've accepted their invitation to connect, or they've accepted your invitation. You'll see a 1st degree icon next to their name in search results and on their profile. You can contact them by sending a message on LinkedIn. 2nd-degree - People who are connected to your 1st-degree connections. You'll see a 2nd degree icon next to their name in search results an...

Some weaknesses in the TOR!

Image
Tor is an interesting and well-designed system, but like any computer system, it has vulnerabilities, and a couple of years ago, Tor was attacked in a particularly successful way by some researchers at Carnegie Mellon University. It uses a large network of computers or relays to anonymize traffic, and this is work by connecting to a Tor node rather than to the destination. And then it sets up what’s called a circuit so a series of nodes within the Tor network that involved in relaying that traffic before it reaches its final destination and because of how the Tor protocol works. It has lots of different circuits active at the same time. So if someone is monitoring one of these nodes or even many of them, they can’t figure out where packets are going or where they are coming from, unless they can control a large part of the Tor network and this is what these attackers were able to do. If attackers have control over enough nodes within the Tor network then for a partic...

Sizes of images on social networks

Image
FACEBOOK : Profile picture  :  180  x 180 Cover picture   :   828  x 315 Shared picture on facebook : 1200 x 900 Shared picture in a link on Facebook : 1200 x 627 Highlight image : 1200 x  717 TWITTER :  Profile picture  :  400 x 400 Header / Cover picture   :   1500 x 500 Shared picture on Twitter : 440 x 220 INSTAGRAM : Profile picture  :  160 x 160 Photo Thumbnail    :   292 x 292 Shared picture on Instagram : 1080 px Feed Photo : 600 px  YOUTUBE : Profile picture  :  800 x 800 Channel  Cover :   1500 x 500 Video Yploads : 1280 x 760  PINTEREST :   Profile picture  :  165 x 165 Board Display  :   222 x 150 Pin : 238 px LINKEDIN :     Thumbnail photo : 160 x 160 Cover photo   : ...