A video I uploaded for my dear friend Cory Doctorow, from the Moth Story-telling competition.
Tag: learn
Hacker Video – All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …
TLS: How It Protects Your Data Online
In today’s interconnected world, ensuring the security of data during online communication is essential. Transport Layer Security (TLS) is a foundational protocol that helps protect the privacy and integrity of data exchanged over the internet. This article will briefly explain what TLS is, how it works, and why it is critical for safe online communication. Read More …
DHCP and Its Role in Network Functionality
The Dynamic Host Configuration Protocol (DHCP) is an essential component of modern networking, ensuring that devices can seamlessly connect and communicate within a network. This article explores what DHCP is, why it is critical for networks to function efficiently, and how to configure basic DHCP settings on a home router. What is DHCP? DHCP stands Read More …
CPU :: The Brain of Your Computer
If a computer were a human body, the Central Processing Unit, or CPU, would be its brain. The CPU is one of the most critical components in any computer, responsible for carrying out instructions and ensuring everything works together smoothly. Let’s explore what the CPU is, what it does, and how it functions in a Read More …
RAM: The Heart of a Computer’s Memory
RAM, which stands for Random Access Memory, is a computer’s workspace—a temporary storage area where the computer processes and uses information. Let’s dive into what RAM is and why it’s essential for a computer to function. What is RAM? RAM, or Random Access Memory, is a type of computer memory that temporarily holds data and Read More …
Studio Notes – A Rhythm Guitar Pulse
Sometimes you want to feel a pulse of the track, but maybe the drums and bass are just not enough. If you have a strumming Rhythm guitar you can use your automation to make it pump to emphasize the beat. The pumping Rhythm guitar trick first of all select the Rhythm guitar track that you Read More …
What is an Electronic Press Kit or EPK
In the old days, physical press kits were paper-based and mailed old skool. Today, music artists can use digital media for promotion. This is known as an electronic press kit, or EPK. What is an EPK? An Electronic Press Kit is a digital resume for all audiences that is the promotional materials, giving everyone an Read More …
Quick Note :: Attribute Based Access
We then end up with two main classifications of access control: Role-Based Access Control (RBAC). Define the role for the access to data, eg Policy = Subject (AND/OR) Role –> Permissions. Attribute-Based Access Control (ABCL). Define attributes eg Policy = User (role, nationality) AND/OR Resource (department, owner) AND/OR Action AND/OR Context (time, IP, location) -> Read More …