Facebook will work with different non-profit organizations, blood banks and individual donors to build a tool which will make it convenient for Indian donors to donate blood for people who are in dire need of it.Every year thousands of people in India seek for potential blood donors via Facebook posts and Zuckerberg believes this approach will bring convenience to Indian people.The procedure includes donors to register on Facebook and get a notification if a person or an organization nearby needs blood. Potential donors can be connected through this procedure, he further mentions in his post.The idea for this feature was organized by their product managers, hackathon and Hema Budaraju.Zucerkberg also mentioned in his post that this issue is personal to their product manager, Hema, whose father was in dire need of blood during his chemotherapy sessions due to cancer.
Recently, the English Wikipediacompleted an RFC for increasingthe minimum password requirements for users with certain advancedpermissions. This came after two Administrator accounts were compromised as part of a demonstration by a benevolent party.
Two-factor authentication is a scheme where in addition to requiring a password to log in, you also have an app on your phone that provides a code that changes regularly. In order to log in, you need both your password, and this regularly changing code. The idea is that even if someone knows your password, they would also have to steal your phone (Or infect it with malware, etc), in order to compromise your account.
 There are many potential pitfalls associated with the use of social media or social media management apps on firm devices. Be wary of social media applications and platforms, as they are frequently invaded by cybercriminals and hacktivists. Giving another application access to your credentials for one site or account could result in other linked accounts being hijacked.
 See, e.g., Dan Lamothe, U.S. Military Social Media Accounts Apparently Hacked by Islamic State Sympathizers, Wash. Post, Jan. 12, 2015, available at -twitter-account-apparently-hacked-by-islamic-state-sympathizers/?Post+generic=%3Ftid%3Dsm_twitter_washingtonpost, archived at -AM6V.
 See Matthew J. Schwartz, How to Hack Facebook in 60 Seconds, InformationWeek (June 28, 2013, 11:08 AM), -to-hack-facebook-in-60-seconds/d/d-id/1110576?, archived at -ZUPE; see also Fred Stutzman, Ralph Gross & Alessandro Acquiti, Silent Listeners: The Evolution of Privacy and Disclosure on Facebook, 4 J. Privacy & Confidentiality, no. 2, 2012, at 7, 7.
To learn more, the Canvas Learning Management system has an excellent open course on LTI development that you can enroll yourself in with a free Canvas account. Once enrolled in the course, you can launch your own locally developed LTI app within the course to check how parameters and data are exchanged between the LMS and the tool.
To give an example related to libraries, a library may decide to block all international traffic to their licensed e-resources to prevent foreign hackers who have gotten hold of the username and password of a legitimate user from accessing those e-resources. This would certainly help libraries to avoid a potential breach of licensing terms in advance and spare them from having to shut down compromised user accounts one by one whenever those are found. However, this would make it impossible for legitimate users traveling outside of the country to access those e-resources as well, which many users would find it unacceptable. Furthermore, malicious hackers would probably just use a proxy to make their IP address appear to be located in the U.S. anyway. 2b1af7f3a8