PRIVACY & SECURITY

HTTP — hypertext transfer protocol. HTTP basically refers to the way that we communicate on the Internet.

HTTPS, otherwise known as hypertext transfer protocol secure, means that the information contained on a website, or information entered into a website, is secure. Most banks, credit card companies and online retail stores will use HTTPS in order to keep your account or payment information secure.

QZVX.COM will default to this HTTPS setting automatically, so there is no need for you to have to change it on your own. You may notice the lock symbol by the URL address line.

HACKING

Most hacking of information happens in the transfer process, from the moment you hit ENTER on your keyboard, to the second the information is received on the company’s server. Https encryption will keep your information safe so that it does not fall into the hands of a hacker.

We use https security protocol at QZVX.COM for many reasons. Readers submit their email address when filling out a comment form. We do not share that email information with anyone.

WHAT INFO DO WE MAINTAIN?

We like to know which of our posts and pages are most popular or trending. Knowing this, we can continue to provide the information readers search the web for. QZVX.COM uses an analytics program similar to the popular Google Analytics, but of a simpler form, designed to fit our particular needs. Understanding our site and app users, provides the information we need to evaluate the performance of our promotions and content.

YOUR IP INFORMATION

QZVX.COM does not store or share reader IP information for purposes of marketing. Most information, provided by the analytics program, is superfluous to our needs and not shared with any third party.

USE OF READER IP INFORMATION

The only purpose we would have for this information is to track SPAMBOTS. In such cases, we block certain IP addresses from reaching our site. For example, hackers who wish to SPAM our site with multiple links to sites containing malware, pornography, and PHISHING attacks.

WHAT IS PHISHING?

Scammers attempt to access our COMMENTS pages in order to to trick you into giving them your personal information. Their comments would include links to websites used for PHISHING purposes. They may try to steal your passwords, account numbers, or Social Security numbers. If they get that information, they could gain access to your email, bank, or other accounts. Scammers launch thousands of phishing attacks like these every day.

Security at QZVX.COM blocks these incoming COMMENTS so that they don’t clutter our site with trash.

SPAM

Email and IP addresses help identify SPAMMERS. Using this information, QZVX.COM blocks SPAMBOTS.

SPAMBOTS

A SPAMBOT is a computer program that helps to spread SPAM across the Internet. SPAMBOTS often scrape contact information, create fake user accounts, or operate stolen social media accounts.

COMMENT MODERATION

Email addresses identify readers who are first-time users of our COMMENTS pages. All first-time COMMENTS are held for moderation. The administrator is notified that there is a new COMMENT. The COMMENT is read, the email address is verified for authenticity against a database of known SPAMMERS. If the email address checks out, and the COMMENT does not contain profanity, defamatory statements or links to PHISHING sites, the COMMENT is approved. The reader is then WHITELISTED. Any COMMENT submitted by the user after that is posted without moderation. Please follow our COMMENT GUIDELINES.

If you have been previously approved to submit COMMENTS, always use the same email address. A new email address will cause your COMMENT to be held for moderation.

We attempt to check comments held for moderation ASAP, but in busy times, this process could take longer.

COMMENT GUIDELINES
At QZVX.COM , we have a standing policy against trolling and wokeness. If you are offended by anything you read at QZVX.COM , understand that we will not attempt to assuage your bruised sensibilities. Elon Musk said, wokeness is basically a humorless society that is simply rife with condemnation and hate. At its heart, wokeness is divisive, exclusionary, and hateful. It gives mean people a shield to be mean and cruel, armored in false virtue. QZVX.COM is not your soapbox. Your priggishness toward this policy will not be tolerated. If you take offense to a remark or an opinion that differs from yours, understand that we will not tolerate your social justice messaging, lecture, or virtue signaling. Once your response crosses the line into name-calling or becomes a political argument, that response is subject to immediate deletion. Your opinion will not influence us to change our opinion. An apology for anything you deem offensive is not forthcoming. Any person found to be using a fake email address will have their comments deleted. Personal attacks are subject to deletion. These offenses can cause readers to be banned from making future comments. You have thousands of reading choices on the Internet. QZVX.COM is offered free to the reader and we are not beholden to the reader for our daily bread or enriched by your advice or political influence. Within this principle, comments are welcome.

WHITELISTING

Whitelisting is the practice of explicitly allowing some identified readers access to a particular privilege or service. It is the opposite of blacklisting. Once your COMMENT is approved, you are WHITELISTED.

BLACKLISTING

In computing, a blacklist or a blocklist or a denylist is a basic access control mechanism that allows through all elements except those explicitly mentioned. You don’t want to be on the blacklist!

ADDITIONAL SECURITY AT QZVX.COM

BRUTE FORCE ATTACKS

Brute Force Attack is a hacking method which utilizes trial and error techniques to break into a website, a network or a computer system.

Hackers use automated software to send a large number of requests to the target system. With each request, the software attempts to guess the information needed to gain access, like passwords or pin codes.

These tools can also disguise themselves by using different IP addresses and locations, which makes it harder for the targeted system to identify and block these suspicious activities.

A successful brute force attack can give hackers access to your website’s admin area. They can install backdoor, malware, steal user information, and delete everything on your site.

Even unsuccessful brute force attacks can wreak havoc by sending too many requests which slows down the hosting servers and even crash them.

Some basic measures that can be implemented to inhibit brute force attacks include: using a CAPTCHA program to prevent automated attacks, instating rules requiring the use of strong passwords, introducing a delay between log-in attempts, or using VPNs to establish an encrypted tunnel.

The Best Defense Against Brute Force Attacks Is a Cloud-based Defense!

Leveraging the power of our cloud-based servers helps QZVX.COM detect malicious patterns in HTTP traffic upstream, blocking out brute force attacks before they reach our servers. Implementing network and application-layer controls and rate policies, our web hosting platform employs a multi-layered approach to web security, ensuring that QZVX.COM stays protected, no matter where or when attackers choose to strike.

MAIL-LISTS & NOTIFICATIONS

Readers may opt-in to notifications for new postings or new comments. Readers may also easily unsubscribe from these services. If there is a problem with the opt-in process, unsubscribing, member registration, or closing a user account, contact the QZVX.COM administrator at mailbox@qzvx.com
The admin at QZVX.COM does not know your password. If you are a registered member, you will need to use the FORGOT PASSWORD method of changing your password.

READER CONTRIBUTIONS (AUDIO/VIDEO/GRAPHICS/STORIES/NEWS TIPS)

QZVX.COM welcomes the information supplied by readers. Airchecks, personal stories, and historical data are the foundation of this website. QZVX.COM does not offer compensation for any material given by readers. Furthermore, if you submit ideas, articles, audio, and so forth, we reserve the right to pursue derivative works. We are also under no obligation to use material submitted by readers.

SWITCHING IS THE ONLY SAFEGUARD AGAINST A CRAPPY WEB HOSTING COMPANY

In September 2020, with the financial assistance of our many readers, we made the move to “a safe haven”, on the cloud servers at Hostinger.com —
The move had been anticipated for many months, in order to extend the lease of the website domain name and obtain better hosting services, extending our hosting lease into the year 2025.

Before this transaction could take place, the previous hosting company failed to back up our data and through some unknown glitch in their system, this site lost valuable data, including all reader comments posted prior to May 2020. We value all input from our readers and were devastated at the loss of this historical data.

In short order, after some research and cost analysis, this site moved to THE CLOUD. Reader donations and a hefty refund of charges by the previous hosting company covered the cost, allowing us to reach our goal and implement all necessary security measures.

QZVX.COM is now advertiser-supported.

Ezoic Privacy Policy
Annual Request Summary

FAIR USE NOTICE: This site contains copyrighted material, the use of which has not always been specifically authorized by the copyright owner. We make this material available as part of our commentary, criticism, news reporting, and research. We believe this constitutes a fair use of any such copyrighted material as provided for in section 107 of the US copyright law. In accordance with title 17 U.S.C Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.
For more information, go to: http://www.law.cornell.edu/uscode/17/107.shtml

“Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright. In determining whether the use made of a work in any particular case is a fair use the factors to be considered shall include—
(1)the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes;
(2)the nature of the copyrighted work;
(3)the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and
(4)the effect of the use upon the potential market for or value of the copyrighted work.
The fact that a work is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of all the above factors.”

If you wish to use copyrighted material from this site for purposes of your own that go beyond fair use, you must obtain permission from the copyright owner.