Posts

Showing posts from April, 2021
 Arch Linux VS Pop_OS When comparing Arch Linux vs Pop!_OS, the Slant community recommends Arch Linux for most people. In the question“What are the best Linux distributions for desktops?” Arch Linux is ranked 1st while Pop!_OS is ranked 29th. The most important reason people chose Arch Linux is: " Arch's goal of simplicity means there's usually one preferred way to get things done - through organized and well documented configuration files. This focus, combined with the community's recognition that configuration files can be intimidating, has resulted in excellent documentation that's accessible to newcomers, and very instructive about how Linux actually works. The documentation is often so thorough that, when searching for solutions to problems while using other distributions, such as with video card drivers, oftentimes you'll find the most effective solution in the [Arch Linux wiki](https://wiki.archlinux.org/) or on the forums." Pros of Arch L
  Access to computers - and anything which might teach you something about the way the world works - should be unlimited and total. Always yield to the Hands-On Imperative!   Basic  concept , it works most of the time with the "All information should be free". The ethical side says that i should use it to improve my knowledge on how the world works, but the dark side says:" lets cook some bombs and blow something up just for fun".  If i will learn the basics of physics , math or how to make bombs it all is just information and knowledge, it depends how people will implement it. I believe that that concept must be implemented evrywhere.   All information should be free. No-no and no ! If all information would be available to the public, some companies could not grow so big, some secrets just have to be obfuscated. If all information were available for free and not copyrighted/patented the level of competition on the marked will be lower than it actually is. Mistru
 WiFi or Welcome hackers! Vulnerable networks Most of the local Internet/Telephone/TV service providers offer a router and other media devices to customers. The security of the network is beared on the shoulders of the consumer. In most cases the consumer does not even know how to change the name of the wireless access point. How it works? Routers that act as wireless access points work mostly in 2.4 GHz range and are protected with a key. The key encryption is usually WPA,WPA-PSK , sometimes WEP. At the first glance it may seem that everything is fine and the network is protected with good key  aprox. 8 symbols, consisting of letters (mostly uppercase) and numbers.   About a hour and a half At the first glance it may seems very robust and safe, but the problems only begin from here. False confidence of security is provided by the wireless access point key and "why me? i am not important" mindset. WEP key encryption is rare due to lack of protection. WEP encrypted key does n