• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    What is “Shadow IT”??

    April 2, 2021 /

    Wikipedia describes Shadow IT as: In big organizations, shadow IT (also known as embedded IT, fake IT, stealth IT, rogue IT, feral IT, or client IT) refers to information technology (IT) systems deployed by departments other than the central IT department, to work around the shortcomings of the central information systems. Shadow IT systems are an important source of innovation, and shadow systems may become prototypes for future central IT solutions. On the other hand, shadow IT solutions increase risks with organizational requirements for control, documentation, security, reliability, etc. via Wikipedia [1] My first thought after digesting some basic information is that Shadow IT sounds like people coming up with…

    read more
    Aaron Comments Off on What is “Shadow IT”??

    You May Also Like

    How Was Colonial Pipeline Hacked/Breached? Because of One Single Employee’s Compromised Password

    June 7, 2021

    Working With the Command-Line Interface–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021

    Wireless, Virtual, Cloud, & Mobile Networking–Advanced IP Networking–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 15, 2021
  • Tech

    Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP

    March 30, 2021 /

    According to the Bleeping Computer new service, PHP’s Git server was hacked via a backdoor to the PHP source code. PHP is a general-purpose scripting language especially suited to web development. Typically a server-side programming language, PHP powers many sites on the internet including big players like Wikipedia and Facebook. In this latest attack the official PHP Git repository was hit and the code base was tampered with. Yesterday, two malicious commits were pushed to the php-src Git repository maintained by the PHP team on their git.php.net server. The threat actors had signed off on these commits as if these were made by known PHP developers and maintainers, Rasmus Lerdorf …

    read more
    Aaron Comments Off on Hackers Add a Backdoor to PHP Source Code; 79% of Websites Use PHP

    You May Also Like

    More Notes!!! [Ruby Programming Language Notes]

    May 19, 2021

    Modern Ethernet–The Physical Network–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 11, 2021

    Some Quick Notes On Python Syntax…

    May 24, 2021
  • Tech

    Protected: What is Equinix? And Why Are They So Important??

    March 23, 2021 /

    There is no excerpt because this is a protected post.

    read more
    Aaron Enter your password to view comments.

    You May Also Like

    Function Overloading–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021

    Internet & The Cloud—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 6, 2021

    Ethernet Basics–The Physical Network–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 11, 2021
  • Tech

    Post-Quantum Cryptography: The Race Is On

    March 18, 2021 /

    Quantum computers and quantum cryptography have become hot industry buzzwords that are popping up more in the press. With that, the question becomes what happens to the security of our data covered by today’s pre-quantum cryptography technology? This Forbes article helps highlight solutions on the way in the race to post-quantum cryptography: The good news is that solutions are on the way. Recognizing the urgency of the task and the time needed to formulate, choose, standardize and deploy new systems, the U.S. National Institute of Standards and Technology (NIST) launched a Post-Quantum Cryptography (PQC) standardization process in 2016. In July 2020, NIST announced seven third-round candidates, covering both public-key encryption (PKE) and digital…

    read more
    Aaron Comments Off on Post-Quantum Cryptography: The Race Is On

    You May Also Like

    Modern Ethernet–The Physical Network–NETWORKING, SECURITY, & MORE ESSENTIALS—CompTIA Network+ (N10-007) NETWORK-PLUS Certification Prep Course Notes

    May 11, 2021

    Hashes–Another Data Structure!!! [Ruby Programming Language Notes]

    May 18, 2021

    Blockchain & Money: Session 8: Public Policy by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 16, 2021
  • Tech

    A 3-Tiered Approach to Securing Your Home Network

    March 10, 2021 /

    Some tips running from basic to advanced, on how to approach securing your home network from Daniel Miessler. via Daniel Miessler

    read more
    Aaron Comments Off on A 3-Tiered Approach to Securing Your Home Network

    You May Also Like

    Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…

    March 10, 2021

    Pointers–STRUCTURED PROGRAMMING Course Notes

    May 29, 2021

    Security Engineering Analysis Framework Notes…

    June 1, 2021
  • Tech

    Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…

    March 10, 2021 /

    A group of hackers say they gained access to live feeds of 150,000 security cameras inside hospitals, prisons, schools and companies, including a Tesla factory. The hackers say they breached a massive trove of security-camera data collected by Silicon Valley startup Verkada Inc., gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. The data breach was carried out by an international hacker collective and intended to show the pervasiveness of video surveillance and the ease with which systems could be broken into, said Tillie Kottmann, one of the hackers who claimed credit for breaching San Mateo, California-based Verkada. Kottmann, who uses they/them pronouns,…

    read more
    Aaron Comments Off on Hackers Breach Thousands of Security Cameras, Exposing Tesla, Jails, Hospitals…

    You May Also Like

    What is a “Function” in Programming?, & What is “Object Oriented Programming” (OOP)–Notes

    May 24, 2021

    Default Arguments–Functions–STRUCTURED PROGRAMMING Course Notes

    May 28, 2021

    Blockchain & Money: Session 17: Secondary Markets and Crypto-Exchanges, by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021
  • Music,  Tech

    ‘Kings of Leon’ Will Be the First Band to Release an Album as an NFT; Making it a Digital Collector’s Item

    March 4, 2021 /

    Kings of Leon reigned supreme the past two decades in music and they continue to revolutionize the industry with the release of their latest album as a NFT, or non-fungible token. (If you don’t know what NFTs are, you can still read on about this article, and just be aware that 1, there’s a lot to unpack and digest to really, fully understand what NFTs are, and 2, be advised that NFTs are “kind of a big deal” to many people. Also, Rolling Stone has a “quick” primer here.) Okay, back to Kings of Leon!!! By this move of releasing an album as an NFT they are one of the…

    read more
    Aaron Comments Off on ‘Kings of Leon’ Will Be the First Band to Release an Album as an NFT; Making it a Digital Collector’s Item

    You May Also Like

    J. Cole “The Off-Season” [Album Review]

    June 2, 2021

    MUSIC: Violinist Performs A Piece So Well You Can See It On The Other Muscians’ Faces

    April 19, 2021

    New Album: “Smiling with No Teeth” by Genesis Owusu

    March 5, 2021
  • Tech

    Blockchain Technology: In the News…

    February 5, 2021 /

    From an article on CNET: Forget Bitcoin: Inside the insane world of altcoin cryptocurrency trading Ironically, it’s blockchain, the behind-the-scenes technology, that could be the solution to the burgeoning deepfake problem. In cryptocurrency, the blockchain is an unalterable ledger that tracks every transaction. Once it’s on the ledger, it can’t be altered. That same technology can be used to track anything — like the creation and distribution of a video, from studio to iPhone screen. There are already startups working toward this, like Truepic.  When I asked about blockchain’s ability to neutralize deepfakes, Inman-Grant wasn’t entirely optimistic.  “It’s definitely an arms race, but it’s not an arms race we’re winning right now.”  via…

    read more
    Aaron Comments Off on Blockchain Technology: In the News…

    You May Also Like

    More Programming Notes…

    May 31, 2021

    Control Statements–STRUCTURED PROGRAMMING Course Notes

    May 27, 2021

    Building a P.C.—NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 9, 2021
  • Tech

    Billions were stolen in blockchain hacks last year…

    January 18, 2021 /

    According to this article, the total value of the losses from 122 attacks in 2020 would be worth $3.8 billion today. We know how some hackers passed away their time during the lockdown: By running Bitcoin-related hacks and potentially netting “nearly $3.78 billion” in 2020, according to a report from Atlas VPN. Data collected by Slowmist Hacked showed that there were 122 attacks in 2020, targeting three major areas: –Decentralized apps running on the Ethereum platform had 47 attacks (current value $437 million)  –Cryptocurrency exchanges had 28 attacks (current value $300 million in losses) –27 attacks on blockchain wallets Via ZDNet—Billions were stolen in blockchain hacks last year

    read more
    Aaron Comments Off on Billions were stolen in blockchain hacks last year…

    You May Also Like

    More Programming Notes…

    May 31, 2021

    Troubleshooting Operating Systems–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 10, 2021

    Arithmetic Operators Notes

    May 24, 2021
  • Tech

    Get ready for self-driving banks

    January 18, 2021 /

    This article from the Financial Times looks at the algorithms and blockchain technology that may be required for 21st century regulation. DeFi turns all this on its head. It leverages blockchain technology to deliver services with no human intermediation. One example is creating money markets with algorithmically derived interest rates based on supply and demand — rates that traditional banks set by committee. Other DeFi projects include decentralised exchanges that allow users to trade without brokers, and protocols for lending that do not involve loan officers or credit committees. Although these “self-driving banks” are new, they are not small. They are likely to be mainstream before self-driving cars start to…

    read more
    Aaron Comments Off on Get ready for self-driving banks

    You May Also Like

    Random Number Generation–Functions–STRUCTURED PROGRAMMING Course Notes

    May 27, 2021

    Understanding Partitioning—Implementing Mass Storage–NETWORKING ESSENTIALS—CompTIA A+ (220-1001) A-PLUS Certification Prep Course Notes

    May 9, 2021

    Blockchain & Money: Session 16: Central Banks and Commercial Banking, Part 2 by M.I.T. Sloan School of Management with Professor Gary Gensler

    April 21, 2021
 Older Posts
Newer Posts 

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2025 Starby Four.
Ashe Theme by WP Royal.