Cloud technology is the need of the hour and most sought after tool to secure ones’ data after the security breaches being reported by reputed online companies such as Yahoo. In 2013, Yahoo reported hack in its system and over 500 million users’ accounts were affected, this is huge number to say the least. (Eugenio, 2017) This glitch in Yahoo’s decision making as not to make security of data its top priority has cost the company and its users significant loses. This should come as a fair warning to all the users and companies whose data is floating on the Internet. [Read more…]
AlertCrypto is a webapp that will give you a notification when your wallet has a certain value.
Ideal when trading crypto currency. I’m proud to announce that our latest development has just been released into public beta. [Read more…]
With the digitization of the world and everything around us, it was just a matter of time that our monetary affairs came in the fold of it. The transformation of trading payments from barter trade, to gold and silver coins, to paper money to credit cards has been an interesting journey. But to think, this was end has been negated big time with the introduction of new payment method called Cryptocurrency. [Read more…]
An Ad Blocker, as the name suggests, block ads that hover on websites every time you try to surf. According to Techopedia, Ad blockers block certain kinds of ads that include pop-up, ad banners and other usual kinds you have to tangle while surfing web and seriously, their frequency can be really exasperating. In this blog we’ll talk about Pi Hole. [Read more…]
Did you see your name, image or information on Google, Bing, or another search engine? Is information about you harming your image or reputation? We will explain how to make them disappear or request that they be dereferenced by the search engines. In short: how to delete information about yourself from the internet. [Read more…]
Let’s Encrypt is a Certification Authority (CA), which makes it easy and free to receive TLS / SSL certificates via an automated system called certbot, thereby allowing the use of an encrypted connection HTTPS. At the moment, the service is in beta test and receive a certificate in a fully automatic mode, it is possible only when using a web server Apache. The idea is simple: download and open to web server with a single command code request and install the certificate and configure it for use, everything is automated, like a boss! For example, let’s try to enable SSL on Apache. [Read more…]
Internet of Things, referred to as IoT nowadays is a technical implementation of devices that are connected to the internet. The internet has taken over almost every aspect of our lives. With the low rates (€€) of connectivity and devices with built in Wi-Fi, it’s no wonder connecting devices with each other or to Internet is taking over the world. Anything with an on and off button can now have remote access through Internet. These devices range from kitchen and laundry appliances to wearable devices such as your watch. People seem to forget sensors that can be placed anywhere in the world, to protect dikes, sewer systems and road systems. In this article we’ll talk about applicances, but we’ll mainly look into the security concerns. [Read more…]
Ever since the bulk of communication and correspondence has become automated, cases of breaches and identity thefts have become a commonplace phenomenon. It has cost the end users their credibility, investor loyalty, and reputation. Cybercrime is a reality which the governments around the world have decided to kerb through the implementation of regular laws. The European Union has taken one such step in the form of Data Protection Regulation, or the European Encryption Directive. [Read more…]
A choice that you should consider!
Privacy has always been a basic right that has been appreciated and promoted by western societies. With the advent of the technological revolution, another Pandora’s Box of complications opened up with regards to the protection of privacy online.
Do you know the Internet and the widespread usage of email with traditional forms of communication all steadily being replaced with online communication, the need to define users’ privacy rights is becoming ever more important?