Posts

Showing posts from April, 2022

Comparsion of Linux distributions (Week 13)

Image
Ubuntu vs CentOS Ubuntu is based on an open source operating system. It is also called a Linux distribution based on the Debian architecture. It has three editions: Ubuntu Desktop, Ubuntu Server and Ubuntu Core. It is the most popular operating system for the cloud and is used as the preferred operating system for Open Stack. It comes with a lot of applications, with more than a thousand applications available in the Ubuntu software center, and its operating system is highly customizable and has top security features. CentOS is also known as the Community Enterprise Operating System. CentOS is mainly used by businesses and developers who do not need to frequently update and install the application, which makes it more stable and secure. It's open source. This makes the process a quick and direct way to install software. [1] Photo 1: Ubunty vs CentOS [1] What do CentOS and Ubuntu have in common? When it comes to comparing Centos and Ubuntu, the first thing to note is that both syste

Hacker Ethic In The Modern World (Week 12)

Image
  A short opinion   The hacker ethic has to do with the idea that people do their duty for the greater good. As a result, the hacker community takes pride in the fact that they are rebelling against the authorities that restrict this level of computer freedom. Hackers are only judged by their ability, as opposed to the various systems in place that power currently dictates, such as schools and universities. Basically, the hacker ethic idealizes the notion of hacking as an art form, something revered rather than contested and frowned upon. Photo 1: Hackers [2] In today's world, hackers have about the same hacker ethic that they try to follow. According to her, the goal in itself is the search for information. Hackers take pleasure in the process of searching for knowledge, sometimes leading to hacking into computer systems. But as mentioned above, without selfish motives. The information obtained as a result is used as a positive experience and necessary knowledge. Free access to co

Two interesting cases about online censorship and about privacy (Week 11)

Image
  Internet was turned off Internet censorship is the restriction or restriction of access to some (or all) websites, imposed on certain users. This can happen due to state, ideological, economic, geographical, labor problems. Photo 1: Internet block [2] For example, desperately clinging to power, Egyptian President Hosni Mubarak turned off the Internet in the country in January 2011, thus depriving Internet journalists of the opportunity to report news to the world, and Egyptian users of access to Internet news resources. The Mubarak government, which was losing ground, could not maintain its ban for long; Internet access was restored about a week later. But the tactic of slowing down or blocking Internet access was adopted from Egypt by the governments of Libya and Bahrain, who also faced popular uprisings. [1] In the age of the Internet, governments have found many ways to control the flow of information - or at least try to do so - by interfering with or restricting digital communic

Security situation in your home country (Week 10)

Image
Cyber security situation in Estonia  In the world of the Internet, national borders do not play a protective role: cybercriminals cannot be prevented from “entering the country”, and there is little help from the laws of the destination country if the criminal has not left his home. Cybersecurity has become an integral part of the state's internal and external security. The RIA Incident Handling Department operates in Estonia in the responsibilities of CERT at the national level and detects, monitors and resolves cybersecurity incidents in Estonian computer networks, informs about risks and organizes preventive actions. [1] Photo 1: CERT-EE [1] Technology: CERT-EE provides the following security technologies and services: The tool allows you to send suspicious files to CERT-EE for analysis: https://paste.cert.ee/ Sandbox CERT-EE (Allows you to control in a secure environment how operating systems running on various virtual and physical platforms will behave whe