Capitalization

Let us now talk about something that just messes with every Windows user’s head when making the switch to Linux: Capitalization. So basically, you have uppercase and lowercase letters. In the Windows operating system, it doesn’t care whether you put in an uppercase or a lowercase letter. If you have a folder named “Home” in … Read more

The Linux Shell

let us now talk about the shell of the Linux operating system. So what is a shell? The shell of an operating system is the screen that you use to interact with the operating system. If you’re thinking about Microsoft Windows, the Windows shell is that graphical user interface where we have the little mouse … Read more

Intel gets green light to continue working with Huawei

Intel has received licenses from US authorities to continue shipping certain products to Huawei, according to a report by Reuters.  In May 2019, US President Donald Trump added Shenzhen-based Huawei Technologies to the US ‘Entity List’, effectively preventing US companies from working with Huawei unless they received a license to do so from the government. Trump … Read more

Germany tightens 5G network security, may informally exclude Huawei

The German government is reportedly planning stricter oversight of telecommunications network vendors. This will make it harder for Shenzhen-based Huawei to hold its place in the German market, whilst stopping short of an outright ban.  Government sources told media that an agreement had been reached to extend scrutiny of the governance and technology of 5G … Read more

A Brief History of UNIX and C

The first UNIX implementation was developed in 1969 (the same year that Linus Torvalds was born) by Ken Thompson at Bell Laboratories, a division of the tele- phone corporation, AT&T. It was written in assembler for a Digital PDP-7 mini- computer. The name UNIX was a pun on MULTICS (Multiplexed Information and Computing Service), the … Read more

Bootstrap icon bar with CSS

bootstrap iconbar

Bootstrap icon bar with CSS Example:       <!DOCTYPE html> <html> <meta name=”viewport” content=”width=device-width, initial-scale=1″> <link rel=”stylesheet” href=”https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css”> <style> body {margin:0} .icon-bar { width: 90px; background-color: #555; } .icon-bar a { display: block; text-align: center; padding: 16px; transition: all 0.3s ease; color: white; font-size: 36px; } .icon-bar a:hover { background-color: #000; } .active { … Read more

bootstrap : Responsive Navbar with Links of Same Width

Responsive Navbar with Links of Same Width

bootstrap : Responsive Navbar with Links of Same Width Example: Responsive Navbar with Links of Same Width Try to resize the browser window to see the responsive effect. Home Search Contact Login Here is the code <!DOCTYPE html> <html> <meta name=”viewport” content=”width=device-width, initial-scale=1″> <link rel=”stylesheet” href=”https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css”> <style> * {box-sizing: border-box} body {font-family: Arial, Helvetica, sans-serif;} … Read more

Automation, timing and speed, new dimensions of security

One of the spinoffs of the pandemic is the surge in digital services. The security landscape has transited to a new level, thanks to the speed at which digital transactions take place.  Around 95-99 per cent of operations are automated. “Customers need not visit ‘on site.’ Physical documents are on the decline. Matters related to … Read more

AI-ready nations in danger of entrenching inequality

A report from Oxford Insights and the International Development Research Centre (IDRC) has assessed countries on the basis of their AI readiness and responsibility and found that some are at risk of furthering inequality and marginalisation. The ‘Government AI Readiness Index’ in the report ranked the US at number one and the UK at number two … Read more

Evading Firewalls

IP Address Spoofing One effective way an attacker can evade a firewall is to appear as something else, such as a trusted host. Using spoofing to modify address information, the attacker can make the source of an attack appear to come from someplace else rather than the malicious party. Source Routing Using this technique, the … Read more