Публікації

Показано дописи з квітень, 2022

TLSP and SteamOS

Зображення
  Speaking of the school-age of an average child, most of us will agree that playing games and studying are two essential parts of such a period of life. I can only have a mean man’s tear when I’m trying to remember this peaceful and careless(only now I think so) time. You have nothing to worry about, just enjoy your time… and play video games. Oh yes, and don’t say you’ve never had such a feeling, I won’t believe you. I mean playing on a PC, otherwise you are super-duper rare species, which is on the edge of extinct =). But let’s talk seriously, I think it is a pretty relevant idea to compare two Linux distributions, that have such a relation: school and video games. So maybe you have guessed, I will try to compare Karoshi(now called TLSP or The Linux Schools Project) and SteamOS. Origins and target groups The Linux Schools Project (formerly Karoshi, can be translated literally as "death from overwork" in Japanese) is an operating system designed for schools. It is a Lin

The hacker ethic of early days

  Actually, it was a surprise for me to find out the origins of the word “hacker”. Unfortunately, as with many other examples, it has become the face of something that only harms and spreads disaster. At first, innocent explorers became the number one criminals that can steal the wealth of a whole country. In today's blog, I’ll try to show my opinion about six hacker ideals. 1. Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On Imperative! Let us consider the current world’s situation – propaganda indeed performed a great role in converting people into zombies. Probably the number of such individuals could be fewer if everybody had access to the internet. Their only source of any kind of information is TV, which is highly manipulative and is controlled to spread misinformation. On Internet, on the other hand, is easier to ban some resource than actually control it. And st

Censorship and privacy

Зображення
  We all live in a time when privacy can’t be provided to a full extent due to numerous factors. Google, Facebook, and other apps usually secretly collect your data for their purposes and rarely do something to help in this situation except not using this kind of service. But for censorship, I mean hiding real facts (not hiding some adult content), it is something that can’t be seen in a democratic country. However not every country is such and we can name various examples even without thinking too much. As a member of a democratic world, it is not acceptable that a whole nation is trying to delete another nation just because they want. But actually, that is what russians have been doing for 300 years and are continuing to do with Ukrainian culture and people. Holodomor, which was an intentional act of genocide against the Ukrainian people was a clear example of russian politics throughout only the last century. You can easily compare articles even in Wikipedia in different languages

Cyber Security in Ukraine: Mitnick's formula

Зображення
We have already discussed the IT special in our countries, now it is a turn to talk about security in this field. Before I started the overview, I may say that nowadays situation in Ukraine is urging security specialists to work in a more effective and time-efficient way. This is all due to numerous cyber attacks on government resources, conducted by Russian hackers, so now it is the best way to flourish for Ukrainian Cyber Security specialists. There is a saying: “what doesn't kill me, makes me stronger” which is very suitable here. Nobody can’t be killed by a cyber attack, so there is the only way to get out of this situation, to progress at a lightning-fast pace. This is happening now with the help of EU specialists (including those guys, who have developed and maintained Estonia’s digital security system). I will display the information using Mitnick’s formula: technology, training, and policy. Technologies…I’m not very competent with particular examples, but I think nearly all