Internet Basics – Hypertext, HTTP, URL and URI

In my journey to get a better understanding of how current web-based technology works, I run into a lot of technical terms. A lot of terms are abbreviations and known to me but if I start thinking about these terms (for instance HTTP) I have no idea what it precisely does and why it’s used. To get a better understanding of all this terminology and its use, I decided to write down these terms now and then and explain them in one of my posts. The first items I would like to dive into are the key concepts of the web: Hypertext, HTTP(S) and URI/URL/URN.

(more…)

0 Comments

Protecting your privacy and your data on public WiFi against attackers

Everybody loves free (digital) services. But as many people know, these so-called free services have a catch most of the time and are not completely free. Unfortunately, not everybody is a good samaritan. The devil is in the details and these details are in complicated Terms and Conditions that nobody reads. Additionally, free services can lack proper security measures. A good example is the free WiFi service. In this post, I will provide tips on how to protect your privacy and your data against attackers on public WiFi.

(more…)

0 Comments

Building a blog – Part 2

In the first part about building a blog, I discussed the first steps you have to take before starting to build the blog itself: acquiring a domain name and a host. In this part, I will continue to show you my journey and explorations in the world of building a website. For myself, it was important to at least get a bit of understanding of how everything works and mainly to answer my question: “what kind of technology is behind the fact that building a website is so easy nowadays?”. You don’t have to be a wizkid anymore with insane programming skills to build a great website and I wanted to know why.

(more…)

0 Comments

The T-Mobile Data Breach and Phone Scamming

A few days ago, news stories appeared about a huge data breach that occurred at T-Mobile. The first reports of last Sunday stated that someone on the dark web was claiming to have the data of 100 million US subscribers/ex-subscribers from T-Mobile servers and was selling a portion of it on an underground forum for 6 bitcoin which is over 220K€. The information that was stolen didn’t only include names, phone numbers and physical addresses but also social security numbers, driver’s license information and IMEI numbers (a unique phone device number you can see as a sort of phone’s social security number).

(more…)

0 Comments

Why outdated information systems lead to a deteriorated competitive position

My specialization has always been accounting and controlling. However, I never invested any time in looking at the added value that automation/information systems can bring to the financial/accounting departments of a company. The reason for this is mainly the accelerated process of the advancement in technology in the past ten years that caught a lot of companies (including myself) unaware: we have been sleeping, myself included!

(more…)

0 Comments

Building a Blog – Part 1

One of the journeys into the world of technology was setting up this Blog. A friend of mine advised me to use WordPress to create my site. WordPress is a dynamic HTML program. This means you don’t have to do coding (programming) to create a site. Because I wanted to set everything up and running all at once, I decided to do this during my summer holidays. In the past (about 10 years ago) I had a webshop in Magento (also a dynamic HTML service), but my skills are quite rusty so I knew I had to take the time to set everything up.

(more…)

0 Comments

Social Engineering – Doorstep Crime

In June 2021, I received a letter from the Notary, informing me about the execution of the will of my great aunt (the sister of my grandmother). She passed away at the beginning of 2021 at the respective age of 90 years. Because both my grandmother and my mother are not alive anymore, my brother and sister and I were next in line as heirs to her will together with a long list of other family members.

The will indicated that my aunt wanted to provide a significant part of her remaining funds to the National Heart Foundation and the National Rheumatoid Arthritis Fund. This fixed amount was set in stone and fully pledged to both foundations. The funds were on her savings account which she never touched. So far so good. 

(more…)

0 Comments