Posts

Showing posts from April, 2022

Comparsion of Linux distributions (Week 13)

Image
 Comparsion of Linux distributions In todays blog, I am going to compare two by far most popular Linux distributions: Ubuntu and Fedora. Nevertheless people often take them very similar to each other, there are still differences between them. Picture 1: Ubuntu vs Fedora [1] Ubuntu is a pure Linux distro derived from Debian, proclaimed as stable and simple to utilize. The main idea of Ubuntu is to serve everything to every user, whereas Fedora is an environment more like a testing stage for the Red Hat developers.  Ubuntu has always been the most recommended Linux distro for beginners, on top of that, its targeted audience mostly comes from ex-window users. Whereas, the developers-end of Fedora is more popular, as numerous developers are now switching from Ubuntu to Fedora. For a good reason that Fedora is an environment for Red hat developers, not a Distro (more like a clone of RHEL).  Nevertheless, both of these distributions are suitable for developers, Ubuntu is very much suitable f

Hacker ethic in the modern world (Week 12)

Hacker ethic in the modern world In this blog, I am going to talk about hacker ideals or rather known as "hacker ethic", firstly written by Steven Levy and draw an analogy with modern world. Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On Imperative! The right to access information is an essential component of a democratic society. Information access is the freedom that gives the knowledge to create new and even more interesting things. However, the bad thing about society is how ignorant they can be to a particular topic without actually fully understanding it before they judge.  Access to information should be free In my opinion, whether information is free or not is for the person who has it to decide.  Information is not physical and is a pattern that can be copied over to different mediums. Information has its value, and its value depends on its substance and th

Two interesting cases about online censorship and about privacy (Week 11)

Image
Two interesting cases about online censorship and about privacy "Back to the Future" banned in China To start with, China is the second largest movie market outside of the United States, so if a studio wants a movie to be a box office hit around the globe, it’s important to secure a release date in China. However, the country’s government only allows exact amount of foreign films to be released there each year, and there are very strict guidelines about what they will and will not allow in theaters. If a film doesn’t get approval, it’s officially banned throughout Mainland China. And unfortunately, there are some legendary films that sufferred this fate.  There are films that are banned in China for reasons that some readers may find confusing. For example, the Chinese government banned "Back to the Future" because of its use of time travel and “disrespectful portrayal of history.” In 2011, China’s censorship board banned any entertainment that is connected with tim

Security situation in my home country (Week 10)

Image
 Estonian's Security Situation according to "Mitnick's formula" In today's blog I will try to estimate the overall security situation in my home country using Mitnick's formula. In my case, it will be Estonia. To start with, Kevin Mitnick is an American computer security consultant, author, and convicted hacker, best known for his high-profile 1995 arrest and five years in prison for various computer and communications-related crimes. He now runs the security firm Mitnick Security Consulting, LLC. He is also the Chief Hacking Officer and part owner of the security awareness training company KnowBe4, as well as an active advisory board member at Zimperium, a firm that develops a mobile intrusion prevention system. According to his formula security comes from:       1.Technology: networks, firewalls, antiviruses;       2.Training: awareness of different attacks;       3.Policy: set procedures and requirements. Technology: I believe that nowadays all people accep