The Usenet, originally Unix User Network is a global electronic network that represents its own independent service on the Internet alongside the World Wide Web. It was created in 1979, long before the World Wide Web. It provides all kinds of professional discussion forums in pure text form, the newsgroups, in which basically anyone can participate. The participant usually uses a news reader for … [Read more...]
CircuitPython vs. Arduino’s C++ Language for ESP32: A Comparative Analysis
After we published the article, Live Reloading of Arduino Code in ESP32, a reader questioned the difference with CircuitPython. Instead of a direct comparison of Toit and CircuitPython, in this article, we will compare with Arduino's official language. In the world of embedded systems and microcontroller programming, CircuitPython (offered by Adafruit) and Arduino's C++ language (offered by … [Read more...]
Protection and Countermeasures Against Ransomware
In our previously published article, we have discussed how ransomware attacks have become increasingly prevalent and damaging in recent years, posing significant threats to individuals, businesses, and organizations worldwide. These malicious attacks encrypt valuable data and demand ransom payments for decryption keys, causing financial losses, operational disruptions, and reputational damage. … [Read more...]
Security Token Vs Utility Token
With the rise of blockchain technology and cryptocurrency, various types of tokens have emerged, each serving different purposes within the digital economy. Two prominent categories of tokens are security tokens and utility tokens. In this article, we'll discuss the differences between security tokens and utility tokens, exploring their characteristics, use cases, regulatory considerations, and … [Read more...]
How to Encrypt a File for Transport with GnuPG on Windows WSL (Ubuntu)
This guide teaches you how to encrypt a file such as text file before transporting them over the internet to your friend so that nobody else can open and read it. This is essential for maintaining data privacy and security. GnuPG (GNU Privacy Guard) is a powerful open-source encryption tool that allows users to encrypt and decrypt files using public-key cryptography. To follow this guide, you … [Read more...]
What is a Honeypot in Cybersecurity?
A honeypot is a decoy system or network designed to attract and trap malicious actors, allowing security professionals to monitor their activities, analyze tactics, and gather valuable information. Unlike traditional security measures that focus on perimeter defense and intrusion prevention, honeypots operate on the principle of deception, enticing attackers to interact with the decoy environment … [Read more...]
What Is Ransomware?
Ransomware are malicious programs that can be used by an intruder to prevent the computer owner from accessing data, using it or the entire computer system. This involves encrypting data on the foreign computer or preventing access to it in order to demand a ransom for decryption or release. In recent years, ransomware has emerged as one of the most pervasive and damaging cyber threats facing … [Read more...]
1990s Technologies Which Are Still Used Today
The 1990s were a transformative era in technology, marked by the rise of the internet, and the proliferation of electronics and personal computing. This era gave birth to many groundbreaking innovations. While the pace of technological advancement has been rapid since then, several key technologies from the 1990s continue to play significant roles in shaping our world today. From communication to … [Read more...]
What is PGP (Pretty Good Privacy)? How PGP Works?
Pretty Good Privacy is a program developed by Phil Zimmermann for encrypting and signing data. PGP uses a so-called public key method, in which there is a uniquely assigned key pair. It uses a public key, which anyone can use to encrypt data for the recipient and verify their signatures, and a private secret key, which only the recipient owns and is usually protected by a password. Messages to … [Read more...]
Why We Need to Validate File Integrity With Checksums
Ensuring the integrity of files is important for maintaining data reliability and security. Files can become corrupted, altered, or tampered with due to various factors such as transmission errors, hardware failures, malicious attacks, or accidental modifications. To mitigate these risks and ensure the trustworthiness of files, validating file integrity with checksums has become an essential … [Read more...]
Toit & Jaguar: Live Reloading of Arduino Code in ESP32
Toit is a high-level language for live reloading of code on microcontrollers such as ESP32. The written code runs incrementally as we write it, and we receive instant results. We can push changes over WiFi in two seconds. What is unique to Toit is that it uses virtual machine technology to support running multiple containers on ESP32. It is like running a micro-scale Docker on ESP32. Naturally, … [Read more...]