<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Internet &#8211; BTA Blog</title>
	<atom:link href="https://www.businesstechnologyassociates.com/blog/category/technology/internet/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.businesstechnologyassociates.com/blog</link>
	<description>Weblog about business and technology issues</description>
	<lastBuildDate>Tue, 16 Dec 2025 02:06:48 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Big Bad Bug!</title>
		<link>https://www.businesstechnologyassociates.com/blog/2025/12/big-bad-bug/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 02:06:48 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=417</guid>

					<description><![CDATA[A really serious bug exists in the React Server Components, a popular JavaScript library and the Next.js framework that has reached a imperfect  CVSS score of 10.0! CVE-2025-55182 is a critical remote code execution vulnerability in React Server Components that allows attackers to execute arbitrary code without authentication by exploiting improper input deserialization. This vulnerability &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2025/12/big-bad-bug/" class="more-link">Continue reading<span class="screen-reader-text"> "Big Bad Bug!"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Best Practices for Password Security</title>
		<link>https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/</link>
					<comments>https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/#comments</comments>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Wed, 16 Oct 2024 02:32:24 +0000</pubDate>
				<category><![CDATA[How To]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=410</guid>

					<description><![CDATA[In today’s internet-connect age, strong passwords are your first line of defense against unauthorized access to your personal and professional accounts. Following best practices for password security is crucial to protect your sensitive information from cyber threats. Here are some essential guidelines to help you create and manage secure passwords. 1. Use Long and Complex &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/" class="more-link">Continue reading<span class="screen-reader-text"> "Best Practices for Password Security"</span></a></p>]]></description>
		
					<wfw:commentRss>https://www.businesstechnologyassociates.com/blog/2024/10/best-practices-for-password-security/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Change ownership of a domain in Google Domains</title>
		<link>https://www.businesstechnologyassociates.com/blog/2023/01/change-ownership-of-a-domain-in-google-domains/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Thu, 19 Jan 2023 04:48:07 +0000</pubDate>
				<category><![CDATA[How To]]></category>
		<category><![CDATA[Internet]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=355</guid>

					<description><![CDATA[I used the following steps to transfer a domain name from one Google account to another Google account.  It seems that this procedure has changed recently and existing solutions found on the Internet are out of date.  Surprisingly, Google did not provide the solution either.  I  found the current solution by trial and error.   This &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2023/01/change-ownership-of-a-domain-in-google-domains/" class="more-link">Continue reading<span class="screen-reader-text"> "Change ownership of a domain in Google Domains"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Why does Firefox need it&#8217;s own print dialog?</title>
		<link>https://www.businesstechnologyassociates.com/blog/2021/03/why-does-firefox-need-its-own-print-dialog/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Wed, 03 Mar 2021 19:05:59 +0000</pubDate>
				<category><![CDATA[Firefox]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=333</guid>

					<description><![CDATA[Recently Firefox started loading it&#8217;s own dialog when trying to print a web page, about version 85.  I have never had any real problems with the Ubuntu&#8217;s print dialog, so I was surprised when the Firefox version showed up.  I really like the Simplify Page feature which cleaned up a lot of poorly formatted web &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2021/03/why-does-firefox-need-its-own-print-dialog/" class="more-link">Continue reading<span class="screen-reader-text"> "Why does Firefox need it&#8217;s own print dialog?"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Imagine a Football Game with No Rules</title>
		<link>https://www.businesstechnologyassociates.com/blog/2017/12/imagine-a-football-game-with-no-rules/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Thu, 14 Dec 2017 16:24:32 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[Net Neutrality]]></category>
		<guid isPermaLink="false">https://www.businesstechnologyassociates.com/blog/?p=321</guid>

					<description><![CDATA[Today the FCC is voting to remove rules for Internet Neutrality that were adopted February 26, 2015.  Removing these rules would allow the few Internet Service Providers (ISP) to manipulate your Internet traffic as they see fit.  Comcast was found to be throttling BitTorrent traffic in 2011 and did not stop until the current rules &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2017/12/imagine-a-football-game-with-no-rules/" class="more-link">Continue reading<span class="screen-reader-text"> "Imagine a Football Game with No Rules"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Password Shenanigans</title>
		<link>https://www.businesstechnologyassociates.com/blog/2016/01/password-shenanigans/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Fri, 08 Jan 2016 14:34:56 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=253</guid>

					<description><![CDATA[There seems to be a trend in web security that requires that you type your password, no pasting allowed! This combined with other password &#8220;requirements&#8221; are creating problems for people like me that use very secure long passwords.  That means I use a password safe that generates long random strings of letters and numbers like: &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2016/01/password-shenanigans/" class="more-link">Continue reading<span class="screen-reader-text"> "Password Shenanigans"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>39,000 emails and counting&#8230;.</title>
		<link>https://www.businesstechnologyassociates.com/blog/2015/10/39000-emails-and-counting/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Fri, 16 Oct 2015 17:33:56 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=249</guid>

					<description><![CDATA[Today my Junk folder filled up and would not accept anymore messages!  39,019 junk/spam email messages since January 1, 2015 and that is just the blatantly junk messages.  I receive many more messages from organizations that I have contact with that can &#8220;legally&#8221; send me emails from their push marketing campaigns. Guess what?  I do &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2015/10/39000-emails-and-counting/" class="more-link">Continue reading<span class="screen-reader-text"> "39,000 emails and counting&#8230;."</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Long Live the Internet!</title>
		<link>https://www.businesstechnologyassociates.com/blog/2015/02/long-live-the-internet/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Thu, 26 Feb 2015 19:51:39 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[FCC]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=232</guid>

					<description><![CDATA[Today the FCC adopted new rules for governing the Internet in the United States.  These rules will protect and insure a open and neutral Internet. The FCC’s Open Internet Order contains the following rules. No Blocking; No Throttling; No Paid Prioritization; Standard for Future Conduct; Greater Transparency; Reasonable Network Management; Interconnection; Reclassification of broadband Internet &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2015/02/long-live-the-internet/" class="more-link">Continue reading<span class="screen-reader-text"> "Long Live the Internet!"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Stop Using Microsoft Internet Explorer</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/stop-using-microsoft-internet-explorer/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Tue, 29 Apr 2014 18:59:54 +0000</pubDate>
				<category><![CDATA[Internet]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[IE]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=198</guid>

					<description><![CDATA[If you are using Microsoft Internet Explorer (IE), there are hackers actively using a software bug to gain control of Microsoft Windows computers.  Stop using IE now! This is twice as dangerous as the Heartbleed Bug because an attacker can take control of your computer and do whatever they want with it. US-CERT issued an &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/stop-using-microsoft-internet-explorer/" class="more-link">Continue reading<span class="screen-reader-text"> "Stop Using Microsoft Internet Explorer"</span></a></p>]]></description>
		
		
		
			</item>
		<item>
		<title>Heartbleed Bug &#8211; End of the World or Non-event?</title>
		<link>https://www.businesstechnologyassociates.com/blog/2014/04/heartbleed-bug-end-of-the-world-or-non-event/</link>
		
		<dc:creator><![CDATA[Dirk]]></dc:creator>
		<pubDate>Sat, 12 Apr 2014 14:05:57 +0000</pubDate>
				<category><![CDATA[Business]]></category>
		<category><![CDATA[Internet]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Macintosh]]></category>
		<category><![CDATA[MS Windows]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Technology]]></category>
		<category><![CDATA[bug]]></category>
		<category><![CDATA[OpenSSL]]></category>
		<category><![CDATA[SSL]]></category>
		<guid isPermaLink="false">http://www.businesstechnologyassociates.com/blog/?p=187</guid>

					<description><![CDATA[That about covers the risks.  Now what can you do about it?  First, update your computer (Windows, Mac OS X or Linux/Unix), right now!  Before you read the rest of this post. Most software vendors/service providers recognized the serious nature of this bug and updated their software (the easy part).  So getting the fix is &#8230; <p class="link-more"><a href="https://www.businesstechnologyassociates.com/blog/2014/04/heartbleed-bug-end-of-the-world-or-non-event/" class="more-link">Continue reading<span class="screen-reader-text"> "Heartbleed Bug &#8211; End of the World or Non-event?"</span></a></p>]]></description>
		
		
		
			</item>
	</channel>
</rss>
