In our increasingly connected world, the convenience of public charging stations has become a lifeline for smartphone users on the go. However, amidst the convenience lies a lurking threat known as “juice jacking,” a cybersecurity vulnerability that can compromise your personal data and leave you vulnerable to identity theft and other cybercrimes. Juice jacking occurs […]
Digital Forensics
Introduction to Intellectual Property Rights (IPR)
What is Intellectual Property (IP)? In today’s world, knowledge and ideas have become increasingly important parts of trade as most of the value of modern products such as medicines or technology lies in the amount of invention, innovation, research, design and testing involved. Intellectual property (IP) refers to the creations of the human mind from […]
Pretty Good Privacy or PGP
Emails on their own, are vulnerable and thus, sending an email in plain text, without any protection can be risky, specially if it contains sensitive information. PGP is a software package that adds security to your emails. To better understand the working of PGP, you can also check out the article on the basics of […]
Mac OS File system
HFSPlus, also known as Mac OS Extended, replaced the Hierarchical File System (HFS) as the primary file system of Apple computers with Mac OS 8.1 in 1998. However, HFS+ itself was also replaced with the Apple File System (APFS), released with macOS High Sierra in 2017. HFS Plus HFS Plus is a specification of how […]
Number System and Base Conversions
Humans are used to working with decimal numbers, but computers uses machine language which is in binary, meaning that there are only 0s and 1s. Each 0 or 1 is called a bit, and bits are organized into groups of 8 called bytes. In the context of computers, we can define other types of number […]
Linux File system
Linux is a Unix-like operating system which was implemented first as an extension to the Minix operating system. However, the restrictions in the design of the Minix filesystem were too limiting and a new filesystem, called the Extended File System or ext, was implemented in April 1992. In 1993, it was superseded by both the […]