Сообщения

An illustrative example of ethical theory

Изображение
IT-related application of ethical egoism Ethical egoism is constantly present in everyday life. Today, many people see only benefits for themselves in everything and this applies not only to everyday life but also to the IT sphere. The example that I want to give regarding the IT sphere is related to security protection systems. Today, the IT field is very advanced, which includes the advancement of hacking, the spread of malicious applications and attacks on government agencies, business organizations and civilians. If there is a “disease”, that is, a virus, then a “medicine”, that is, a protective system is always needed. Speaking of the latter, most of the good, high-quality and reliable security protection systems are not free. If state structures and organizations can afford not only protection but also a specialist who is responsible for security, then the general people cannot always afford to purchase even a simple antivirus or firewall. Indeed, it is rare to find a high-qualit

Windows speech recognition

Изображение
The illustrative real-life case of the principle "if a person has control over any function, it can also be used to control the computer": Windows speech recognition Over the past decades, there has been significant progress in the development of the IT field and at the moment a brain-assisted computer controller is being developed, which will one day become a reality. But now we can talk about things that already exist, that is, about controlling a computer with the help of a basic human function - voice. Not everyone knows that the Windows operating system has a certain feature which is speech recognition. This means that a person can communicate with Windows to issue commands, open applications, dictate text and perform other tasks. Further, in this blog post, this feature will be discussed in more detail.     Windows Speech Recognition (WSR) is a speech recognition developed by Microsoft for Windows Vista that allows voice commands to control the desktop user interface; d

Linux distributions: Ubuntu / Kali Linux

Изображение
Comparison of two Linux distributions: Ubuntu / Kali Linux Ubuntu Ubuntu is an operating system for workstations, laptops and servers, it is the world's most popular Linux distribution that was released in 2014. Ubuntu was specifically designed for beginners in Linux or those transitioning from Mac and Windows operating systems.  Ubuntu uses platforms such as x86-64 , ARM64, RISC-V, ppc64le (POWER8 and later), s390x and ARMhf (ARMv7 + VFPv3-D16).   Ubuntu is based on Debian GNU / Linux and is sponsored by Canonical Ltd. Ubuntu has official subprojects that are used for various purposes. Lubuntu and Xubuntu have lower system requirements and are suitable for use on weak and old computers. Another official Edubuntu subproject is being developed for schools and children at home. Gobuntu is an official subproject that uses only free software. The latest official subproject is JeOS, designed for use on virtual machines. Ubuntu releases: Ubuntu is unlicensed software, which means that i

Practical applicability of the values of the hacker ethic

Изображение
Analysis of the values of the hacker ethic Today, there are many hacker gangs or lone hackers who are doing what many cybersecurity model builders think is impossible to do. In this blog post, we will understand what drives hackers and what their values are.  Let’s start with a passion that is fundamentally one of the hacker’s values. Hackers are so-called cyber geniuses and the latter are, as a rule, always obsessed with their research. They drive by the brain mixed with great enthusiasm and a desire to explore, create and adapt, and this combination is perhaps quite insane, but it is also really effective. Hackers have a huge passion for what they do. For them, their work is far from just a job.  Moving on to the second hacker’s value - freedom. If a person is limited in something, that is, if boundaries are set and a number of conditions are provided, then the result will also be limited. Personally, I think that freedom is the main value of hackers. They do not have a work schedule

Online Censorship and Privacy

Изображение
Cases of Online Censorship and Privacy Online censorship I will consider Internet censorship as a case that occurred in Ukraine in 2017. Ukraine belongs to the countries with free access to the Internet, where there is no technical censorship mechanism, such as the USA, most European countries and Japan. The introduction of online censorship in 2017 was quite unexpected, but there were a number of reasons for this. The National Security and Defense Council (NSDC) stated that the reason for the blockade was the dissemination by Russian services of criminal information about the territorial integrity of Ukraine and conducting of information campaigns through blocked resources that violate national security. Also, one of the reasons was the financing by these services of an attack on Ukraine. Internet censorship in Ukraine was introduced by the Internet Association of Ukraine InAU by decree of the President of Ukraine of those days - Petr Poroshenko. It was done on the introduction of new

Cybersecurity assessment in Ukraine with a "Mitnick formula"

Изображение
Description of cybersecurity in Ukraine using a "Mitnick formula" Technology:   Talking about protection technologies, it is better to make an example. In 2009, Zillya! antivirus was released by a Ukrainian antivirus company. Today they provide different security services such as antivirus for business, internet security, total security and just antivirus. Antivirus for Business provides comprehensive protection for the organization against all types of cyber threats with the ability to centrally manage the antivirus. Zilla! Internet Security is designed to proactively protect the Internet. Includes features such as antivirus, firewall, anti-phishing, antispam, optimizer and virtual keyboard. Zilla! Total Security provides protection and at the same time contains a computer control system. Zillya! Total Security includes a firewall, anti-phishing, anti-spam, optimizer, process managers and autorun. Classic antivirus Zillya! provides protection against cyber threats thanks to

Examples of good and bad designs of ergonomic devices

Изображение
Good and bad designs of ergonomic devices Ergonomics has recently gained great popularity and every day we meet with different ergonomic devices that make our lives easier and sometimes, on the contrary, complicate it and create problems. In this blog post, will be elaborated examples of good and bad ergonomics design, in IT and in everyday life.   Examples of Ergonomic IT Devices Good design: Wireless headphones   The most important advantage of wireless headphones is the absence of wires, which means providing convenience during operation. If there are no wires, then they do not get confused, do not cling to clothes, do not tear. Other than that, wireless headphones have their own storage, can be controlled using touch sensors, and usually have better sound quality.   Bad design: Robot vacuum cleaner   On the one hand, it may seem that a robot vacuum cleaner should not be a bad IT ergonomic device because it has a huge number of advantages, but at the same time, this device has a lar