Postitused

Kuvatud on kuupäeva aprill, 2021 postitused

Arch Linux vs. Chrome OS

If you know anything about Linux, then you should know that there are a lot of different distributions of Linux, including Ubuntu, Debian, Linux Mint etc. One of the best distributions of Linux in the opinion of the Slant community is Arch Linux. Arch Linux is heavily focused on customizability and keeping things simple. While Chrome OS is definitely not even in the top 10 Linux distributions, it has definitely become a sensation as it's an online OS. It also doesn't need that much computing power, making Arch Linux and Chrome OS somewhat similar. In this blog I am going to compare the two operating systems more in detail, bringing out their differences and similarities in different fields. So, let's start off with Arch Linux. Where did Arch Linux begin and what was the purpose of it's creation? The Arch Linux project started in March 2002, when Judd Vinet was inspired by CRUX (another minimalist distribution) and decided to create his own take of the open source operat

The Practical Applicability of The Hacker Ideals in The Modern World (2020s)

Hacking, the art of identifying weaknesses in a computer system or network to exploit the security to gain access to personal or business data. Every hacker has their own ideals and motivations why they do the things that they do, whether it be ethically or unethically. Sometimes even the smallest ideals can be the difference between making a hacker a wanted criminal and an ethical penetration tester. In this blog I am going to talk about the common ideals of hackers and their practical applicability in the modern world, meaning the 2020s. So here is a list of the common ideals of hackers: Passion Freedom Work ethic Passion If you have ever worked on a project that involves coding something then you should know the rewarding feeling of finishing the project. You get to look at your code and see how hours upon hours of work finally all led to something great. This is what passion is all about. That feeling of joy after working on something and in my opinion it is one of the most importa

Two Cases About Internet Censorship And Privacy

When the Internet was first created censorship and privacy were not that big of a deal, since hackers and other malicious users who wanted to get access to private information didn't really exist back then. But a couple of years later the US created acts to censorship the Internet and more organizations started to secure their networks better to create more private communication networks. In this post I am going to talk about two examples of Internet censorship and privacy and a little about the consequences of what happened. Censorship A former Google Engineer, James Damore wrote an internal document for Google employees that openly discussed Google's diversity policies, citing research on average gender differences between men and women. Before it got spread around the Internet the responses were varied. Some agreed and some disagreed, but there really wasn't any serious backlash. But right after it got released to the wide world rational discussion became impossible abou

The Overall Security Situation in Estonia

 In 2007 the first ever widely acknowledged cyber war took place in Estonia and at the peak of these attacks 58 government, newspaper and bank websites were down at the same time. Prior to this incident cyber security had not been taken as a serious threat to a country and it's citizens. There was not common code of conduct against such attacks and nobody knew if a cyber attack against a NATO nation would activate collective defense under Article 5. It wasn't even clear if a state could legitimately respond to cyber-attacks. Now let's jump 10 years into the future and Estonia is known around the world as a cyber security heavy-weight and advises a lot of nations around the world about cyber security related matters. The NATO Cooperative Cyber Defense Centre of Excellence (CCD COE) is also located in Tallinn, the capital of Estonia and it focuses on research, development, training and education in both the technical and non-technical aspects of cyber-defense. Let's take