Posts

Comparsion of Linux distributions (Week 13)

Image
Ubuntu vs CentOS Ubuntu is based on an open source operating system. It is also called a Linux distribution based on the Debian architecture. It has three editions: Ubuntu Desktop, Ubuntu Server and Ubuntu Core. It is the most popular operating system for the cloud and is used as the preferred operating system for Open Stack. It comes with a lot of applications, with more than a thousand applications available in the Ubuntu software center, and its operating system is highly customizable and has top security features. CentOS is also known as the Community Enterprise Operating System. CentOS is mainly used by businesses and developers who do not need to frequently update and install the application, which makes it more stable and secure. It's open source. This makes the process a quick and direct way to install software. [1] Photo 1: Ubunty vs CentOS [1] What do CentOS and Ubuntu have in common? When it comes to comparing Centos and Ubuntu, the first thing to note is that both syste

Hacker Ethic In The Modern World (Week 12)

Image
  A short opinion   The hacker ethic has to do with the idea that people do their duty for the greater good. As a result, the hacker community takes pride in the fact that they are rebelling against the authorities that restrict this level of computer freedom. Hackers are only judged by their ability, as opposed to the various systems in place that power currently dictates, such as schools and universities. Basically, the hacker ethic idealizes the notion of hacking as an art form, something revered rather than contested and frowned upon. Photo 1: Hackers [2] In today's world, hackers have about the same hacker ethic that they try to follow. According to her, the goal in itself is the search for information. Hackers take pleasure in the process of searching for knowledge, sometimes leading to hacking into computer systems. But as mentioned above, without selfish motives. The information obtained as a result is used as a positive experience and necessary knowledge. Free access to co

Two interesting cases about online censorship and about privacy (Week 11)

Image
  Internet was turned off Internet censorship is the restriction or restriction of access to some (or all) websites, imposed on certain users. This can happen due to state, ideological, economic, geographical, labor problems. Photo 1: Internet block [2] For example, desperately clinging to power, Egyptian President Hosni Mubarak turned off the Internet in the country in January 2011, thus depriving Internet journalists of the opportunity to report news to the world, and Egyptian users of access to Internet news resources. The Mubarak government, which was losing ground, could not maintain its ban for long; Internet access was restored about a week later. But the tactic of slowing down or blocking Internet access was adopted from Egypt by the governments of Libya and Bahrain, who also faced popular uprisings. [1] In the age of the Internet, governments have found many ways to control the flow of information - or at least try to do so - by interfering with or restricting digital communic

Security situation in your home country (Week 10)

Image
Cyber security situation in Estonia  In the world of the Internet, national borders do not play a protective role: cybercriminals cannot be prevented from “entering the country”, and there is little help from the laws of the destination country if the criminal has not left his home. Cybersecurity has become an integral part of the state's internal and external security. The RIA Incident Handling Department operates in Estonia in the responsibilities of CERT at the national level and detects, monitors and resolves cybersecurity incidents in Estonian computer networks, informs about risks and organizes preventive actions. [1] Photo 1: CERT-EE [1] Technology: CERT-EE provides the following security technologies and services: The tool allows you to send suspicious files to CERT-EE for analysis: https://paste.cert.ee/ Sandbox CERT-EE (Allows you to control in a secure environment how operating systems running on various virtual and physical platforms will behave whe

IT, Risks and Ergonomics (Week 9)

Image
Examples of ergonomics  + Always On Display Modern smartphones with an AMOLED screen matrix support an interesting and useful feature called Always on Display (AoD), which not only saves battery power, but also displays important information on the display. The AoD function in smartphones allows you to see the current time and date, assess the battery level, find out about missed incoming calls and unread messages. In this case, you do not even need to unlock access to your mobile phone. Displayed information is usually monochrome (B/W) so it is easy to see even in bright sunlight without wasting battery power. [1] On average, the always-on display consumes approximately 1% of battery power per hour. Often this figure is even lower, because when the smartphone is in your pocket or bag, the screen still turns off. With the active use of a mobile phone, energy is also not consumed to support AoD. [2] Photo 1: Always On Display [1] How to enable Always On Display on any Android smartphone

A short depiction of an IT professional in Estonia (Week 8)

Image
 A depiction of IT specialist Today, IT-specialist is a broad concept that combines representatives of many professions working in the field of information technology. These are all kinds of programmers, developers, network and database administrators, moderators, robotics and information security specialists, web designers and even 3D animators. At the same time, with the penetration of information technology into new areas of activity, new professions for IT specialists appear.  Photo 1: Estonia is the place for IT specialists [2] Every year, Estonia estimates its need for IT specialists at an additional 1,500 people, of which 70% have higher education, 30% have specialized ones. The most promising are people with higher education in interdisciplinary areas. Also, highly qualified developers, system analysts/architects in the field of software development and telecommunications are most in demand in Estonia. [2] In Estonia most popular programming languages are Java, JavaScript, .Net

One of the Ten Commandments by Virginia Shea (Week 7)

Image
Adhere to the same standards of behavior online that you follow in real life Nowadays, more and more people communicate via the Internet and we cannot imagine our routine life without gadgets and social networking sites. Today, I want to discuss about second rule in net etiquette by Virginia Shea. Photo 1: 10 rules of netiquette  In real life, most of us obey the law, sometimes because of restrictions, sometimes because of fear of being caught. In the virtual space, the chances of being caught are relatively small. People sometimes forget that there is a living person "behind the screen", and they think that the rules of behavior on the Web are not as strict as in ordinary life. You should refrain from insults, provocations, threats and slander, respect the opinions of other participants in the dialogue, express only constructive criticism. Remember that insults in the Internet can be prosecuted. [1] In addition to, I want to give some advice: Use the correct language. Be pre