Posts

Showing posts from April, 2022

If a person has control over any function, it can also be used to control the computer (Week 14)

Image
              Currently, I am sitting in front of my laptop and writing this blog with the help of the keyboard and my fingers. However, for some people, it is rather hard to do such things as they might not have a keyboard and/or their fingers. Thanks to today’s technology, we can get over such obstacles with the assistance of the new functionality that we are being presented in the software and hardware world. As I said before, such “impossible” things are now possible not just only because of the new technology, but also thanks to our imagination. In the following paragraphs, I will mention several real-life cases of the principle “if a person has control over any function, it can also be used to control the computer". Real-life Cases From the age of 13 until 17, I used to play a famous battle royale game called “Fortnite”. Additionally, I would watch others play this game, especially on the platforms like Twitch and YouTube.  One day, when I was on YouTube, I came across a

Kali Linux vs Ubuntu (Week 13)

            Initially made as a hobby project, later became a popular set of open-source Unix-like operating systems that were based on the Linux kernel. This operating system kernel was developed by a Finnish-American software engineer known as Linus Torvalds. Furthermore, Linus is also the author of the famous version control system called “Git” which is mostly used for organizing the collaborative work among the programmers. After the release of Linux, several developers started to create new distributions that included the same Linux kernel and different system software and libraries. These distributions included Ubuntu, CentOS, Fedora, Debian, Red Hat Enterprise Linux, OpenSUSE, and others. In addition, the main purpose of creating new distributions was the difference in target groups. For instance, several distributions are specially made for the desktop systems, while other ones are custom-made for server systems and so on  [1] . In the following sections, I will focus on two va

Hacker Culture Applicability in Modern World (Week 12)

  The entire community of hackers regardless of their purpose has a common belief that information should be free. This idea was initially established in the book “Hackers” by Steven Levy in 1984  [1] . In his book, Levy highlighted The Hacker Ethic which is a set of beliefs that is similar to hacker culture. This ethic was initially created at the Massachusetts Institute of Technology (MIT) sometime around the 50s-60s. Furthermore, the term “hacker” back then was a way to characterize college pranks planned by MIT students, and it was used for describing a project initiated or a product made to satisfy some goals as if it was not enough the pleasure for pure engagement  [2] . The Modern World On the other hand, when it comes to my opinion, I believe that the “Hacker Culture” is something rather special, especially in the modern world. Without the “Hacker Culture”, there would be many gaps in the security of the many software applications. In addition, they see these gaps as an iss

Censorship and Privacy (Week 11)

Image
            In recent times, privacy and censorship have come under scrutiny, and information has become a critical asset to both governments and individuals alike gone are the days when people weren’t ultimately affected by what they saw or heard. Even to the point, it has become weaponized. Almost paradoxical, governments try to hide more, and individuals try to seek more. But what do we mean when we say censorship and privacy? In simple terms, censorship is when content is withheld upon a predetermined set of rules that are there to determine whether said content is obscene meanwhile, privacy is the capability of a person to hide their identity and by doing so they would reveal themselves minimally. In the following paragraphs, I entail interesting scenarios both in censorship and privacy that came into a general world view. Ban of Twitter in Nigeria          One of the captivating examples of censorship is when Twitter was banned in Nigeria from June 5 th , 2022, until January 13 t