Posts

Showing posts from April, 2022
 LINUX Week-13 Ubuntu VS Android             Linux is a group of open source Unix-like operating systems which was initially developed by Linus Torvalds. I am gonna discuss briefly, the competition between Ubuntu and Android distributions. Ubuntu is a kind which is mostly recommended to new Linux users as it appears to be the old and the reliable one out there. While Android brings arguments from the users as it is rather not always the most user-friendly one and not the best in terms of privacy. Ubuntu is a free and open-source operating system that is developed and updated by Canonical and a group of developers. It is entirely sponsored by Canonical to ensure continued support and development.  Android, on the other hand, is Google's closed source. Google holds the Android name and logo, and it does not allow uncertified devices to run the OS, keeping the users within the Google ecosystem. In terms of security, they both aspire to be secure with few permissions, but Android has a
 Hackers nowadays Week-12 In terms of ethics and boundaries, hackers are not all created from the same motherboard, regardless of their outward appearance. I feel that the ongoing evolution of technology and procedures, along with constantly learning and adapting to be the best, are at the essence of being a hacker. There are people who hack personal accounts to gather sensitive content and leak pictures for profit, on the other hand those who voluntarily put their lives on the line to make a difference are such complete opposites nowadays. Even though, in today's world money and wealth is more essential than ever, we can not ignore those who literally bully people online-in a way.  It is very possible to say that hackers are much more dangerous than people imagine - given what they have done in the past.
 Privacy Week-11 Well, we know that online privacy is a major topic, but I'd want to take a different approach. All our confidential data is stored in some form of database in countries such as Estonia for example. The data should really be secure. Data can be tracked in case of somebody's attempt to access your data, but that might already be too late. Moreover, when there is an "unauthorized access", why and how it happened is always a question which everyone has to think about. For example with the help of cookies, I believe that we might be able to control the extent to which our personal information is available, even if it may complicate our lives a little. 
 Awareness for cyber space Week-10 Situation in Turkey Turkey has been exposed to many cyber attacks in the country and abroad in recent years. Anonymous, an international hacking group, has carried out attacks especially on public web pages in Turkey. The attacks generally occurred as a denial of service (DDos: Distributed Denial of Service). While these attacks contain political tendencies, they prevent the use of various citizenship services and cause disruptions in the daily life of individuals. There are attacks against both the private sector and the public, and the services of institutions are interrupted. In attacks on banks, electronic commerce systems are damaged, individuals cannot shop over the internet and POS devices of stores become inoperable. Again, on March 31, 2015, there was a long-term power outage in Turkey and the reason for the interruption has not been fully clarified yet. This situation strengthens the possibility that the interruption occurred as a result of