Brute force attacks

I have been running into the term “brute-force attacks” quite a lot during my journey into cybersecurity. Brute-force attacks are used when you want to crack someone’s password to obtain unauthorized access. I understand what they do but I never invested a lot of time in getting a full grasp of how brute-force attacks work. 

(more…)

0 Comments

The Power of Power Apps

During one of the webinars I was following about Business Intelligence, the name “Power Apps” appeared. It was only mentioned very briefly but it piqued my interest because I never heard about Power Apps before. I decided to do some research myself to get a grasp of the basics. Personally, my first “hunch” was that Power Apps was closely tied to the creation of automatic solutions in the administrative/financial environment of an enterprise. So let’s see if my assumption was correct.

(more…)

0 Comments

Bitcoin Taproot Soft Fork Upgrade: DeFi competition for Ethereum and other blockchains?

The latest Bitcoin update was the Segregated Witness (SegWit) soft fork update in 2017. This eventually ended in a split in the Bitcoin community and to an undesirable hard fork that created Bitcoin Cash.

In November 2021 Bitcoin will undergo a significant soft fork upgrade. In contrast to the SegWit update, this update has the full support of the Bitcoin community and the risk of an unexpected hard fork like the one in 2017 is negligible. 

(more…)

0 Comments

Using KeePass Part 1 -setting up a password database

I have been postponing the installation of a decent password manager on my computer for quite a while now. The main reason is that I didn’t really see it as a key priority and installing the one I selected, KeePass can be a bit of a hassle to set up. I think it’s more about procrastination than “priorities” in the end so I decided to stop all the presses related to other stuff and to set up

(more…)

0 Comments

The CPU – Part 2

In my previous post about CPUs, I explained the basics of their functionality. Because of all the technological progress, we make (AI, laptops, tablets, mobile phones), the CPU requirements are ever-increasing. Luckily both Moore’s Law and the creative tinkering of the CPU architects made it possible to keep up with the never-stopping technology speed train. 

In this post, I will discuss the different CPU enhancements throughout the years that were being tinkered by the CPU architects so that the CPU was able to keep up with technology.

(more…)

0 Comments

Relational Databases

In a previous post, I referred to relational databases. I talked about how WordPress is using MySQL and that MySQL is a relational database management system but I didn’t have a clear picture about what a relational database management system is. With this post, I want to do a deep dive into the world of relational database management systems to get a better understanding of this cornerstone in technological advancement. Yes, in my opinion, it is a cornerstone: without it, we would not be where we are now and we would not be able to take the next big steps in technological developments of the web.

(more…)

0 Comments