Posts

Showing posts from April, 2021

E-SPEAIT Week 13

  Entering the world of Linux can be overwhelming due to the huge number of Linux distributions available. Instead of hopping from one Linux distribution to another, trying to figure out which of them is the best and suits your needs, it’s a much better idea to first learn about their differences and unique characteristics. Here I compare two of those distributions, Arch Linux and Kali Linux. Arch Linux is an independent Linux distribution, inspired by minimalist distributions. Project started in March 2012 by Judd Vinet. First released as 32-bit and in 2006 as 64-bit. Simplicity is the main principle Arch Linux tries to achieve, and this is embodied in four letters: KISS (Keep It Simple, Stupid). It also focuses on modernity and versatility. Arch Linux doesn’t have a default desktop environment, web browser, or music player. Instead, all users start with a barebones operating system and customize it according to their needs and preferences. Although Arch Linux has earned the reputat

E-SPEAIT Week 12

  The values of hackers in the 20-th century, as proposed by Pekka Himanen in his „Hacker Ethic“ are as follows:   Passion   Freedom Work ethic Money ethic   Network ethic Caring Creativity   I believe passion is an aspect that really keeps people going and trying to accomplish something. If there is no passion for the work/hobby you practice, what's the point? Hackers are passionate about what they do and that results in great outcomes. Having freedom to explore other topics and environments is very beneficial. Working on a project until it’s completely finished seems imprisoning. Sometimes doing something completely unrelated to the current project, might give and idea how to improve it or solve a problem Money ethic is another important aspect. While some people use money as something that makes them more valuable or in worst cases, use money as a personality trait. Not valuing immediate money over the actual cause, has developed great things. For example Sir

E-SPEAIT Week 11

  China is a well known example of online censorship. Not only do they block popular apps, social media apps and search engines, but also news sites. The world is becoming more connected online, but China doesn’t seem to care. It has been taken to a level where you need to have a license just to have your own website, app, blog or forum. It’s estimated that 96% of online traffic in Chine goes through Chinese servers. All this censorship has been turned into success by some local companies. Tencent and Alibaba are aren’t just some of the biggest companies in China, but in the entire world. By blocking rival companies like Google and Amazon, people don’t have other choices therefore helping its own companies. China even introduced a law which requires internet companies to register names of users to aid government. Due to the stay-at-home orders Google services are more dominant in schools than before. Teachers use Google Classroom to manage their online classes. Google also has studen

E-SPEAIT Week 10

  Estonia has been recognized as a country that has great cybersecurity. A global heavyweight in cybersecurity even. Prior to 2007 attacks, cyber attacks weren’t takes seriously as an actual threat to the state or citizens. After the attack there was much to learn from the experience, which helped Estonia to get somewhat of a lead in the field. Ten years after the event, Estonia had started to advise other countries about cybersecurity. The country has developed training and cooperation with Luxembourg, Austria, South Korea and NATO. According to Klaid Mägi, former head of the Incident Response Department, Estonia’s preparedness to handle cyber crises has significantly increased over the past decade. The country has created intrusion detection and protection systems, practiced cooperation with public and private institutions, significantly contributed to the awareness of users and is participating in international co-operations. This shows that the technological aspect of „Mitnick fo