Data avoidance and data minimization is a concept in the field of data protection. The basic idea is that only as much personal data is collected during data processing as is absolutely necessary for the respective application. The concept of data avoidance and data minimization is closely related to the traditional data protection principle that only those personal data may be processed that are … [Read more...]
Computer and Internet
Computer and Internet is catchall section of core computing categories including Cloud Computing, Digital Photography, Virtualization, Networking, Protocols and Others' which are not otherwise more subcategorized. Here also you will get unique articles and news on computer hardware, Software, Networking and Protocols.
What is Software Agent
A software agent (also known as an agent or softbot) is a computer program that is capable of certain independent and self-dynamic (autonomous) behavior. This means that, depending on different states (status), a certain processing operation takes place without any further start signal being given from the outside or an external control intervention during the process. Artificial intelligence … [Read more...]
Usernames on the Internet: Legal Implications
A username or user ID is a name that a user can use to log on to a computer, website, or program. On the Internet, in conjunction with a secure password, it is usually used to log in to a user account and requires prior registration. In the case of services without a fixed user account, e.g. Internet Relay Chat, the nickname may be the same as the username. With the many online services, the … [Read more...]
What is Zero Knowledge Proof
A zero-knowledge proof can prove with a high degree of probability that one knows a secret without betraying the secret. This detection usually happens according to a question-and-answer protocol and has many applications in cryptography. One party tries to prove, the other party verifies. The verifier convinces the verifier with a certain probability that he knows a secret without disclosing … [Read more...]
Ubuntu 22.04 php.ini Optimization (Apache)
If you have followed our previous guides, such as How to Install Apache and PHP on Ubuntu 22.04 Server, then you need to follow this guide for optimum performance of the web server. If you are running a WordPress website or web app with PHP, you may have faced performance problems. Fortunately, these tweaks can make your website fast running. Which php.ini to Tweak? Install … [Read more...]
Anonymization and Pseudonymization
Anonymization and pseudonymization are data protection measures. Anonymization is the modification of personal data in such a way that this data can no longer be assigned to a specific or identifiable natural person or can only be assigned with a disproportionately large expenditure of time, cost and manpower. Complete anonymization is very difficult to obtain. In the case of pseudonymisation, … [Read more...]
What is Proof of Stake
Proof of Stake (PoS for short) refers to a process by which a blockchain network reaches a consensus on which participant is allowed to generate the next block. A weighted random selection is used, whereby the weights of each participant are determined from the duration of participation and/or assets (the "stake"). In contrast to the Proof of Work used in Bitcoin, Proof of Stake does not require … [Read more...]
How Do Privacy Coins Work?
Privacy coin is the name given to cryptocurrencies that enable digital anonymous payments (digital cash). Bitcoin was still considered a privacy coin at the beginning of its launch, and it found its application as a means of payment on numerous darknet marketplaces. However, due to the increasing integration of cryptocurrencies into existing government payment systems, regulatory requirements, … [Read more...]
What Are Fediverse and ActivityPub
Fediverse refers to a network of federated, independent social networks, microblogging services and websites for online publication or data hosting. The concept emerged in 2008 with StatusNet on Identi.ca and from 2012 with GNU Social, and in 2016 it became increasingly widespread with Mastodon and the ActivityPub communication protocol defined by the World Wide Web Consortium (W3C) in 2018. … [Read more...]
How to Add a SSH Pre-Login Message in Ubuntu 22.04
An SSH Pre-login message can deliver a legal warning to unauthorized users. If the response after typing root@ip.address displays only the password: field, then an attacker's advocate in the court may argue that we have not warned his/her innocent client. Of course, you must enable a Passwordless SSH Login method whenever possible, even add a Bastion host for login purpose. But, we can not use … [Read more...]
Basics of Mail Server and Mail Transfer Agent (MTA)
In contrast to telephone or Internet relay chat, which enable simultaneous (synchronous) communication, e-mail – like letter mail – is an asynchronous communication medium: the sender sends his message regardless of whether the recipient can receive it immediately or not. A mail server is a server that can receive, forward, hold, and send emails. The e-mail addresses whose e-mail mailboxes are … [Read more...]