Human AI Hybrid Cyber Defence

AI is trained on human-created data, and even if it advances significantly in the tech space, it cannot create bulletproof systems for a few key reasons: 1. AI Inherits Human Limitations AI models are trained on existing human knowledge, which includes flawed designs, biases, and security gaps. If past systems had vulnerabilities, AI might unknowingly replicate or even amplify them. 2. Complexity & Unpredictability of Software Modern software is extremely complex, with countless dependencies, interactions, and edge cases....

February 8, 2025 · 2 min

How Can Path to Success Be Success

The Question How can the path to success be success? This thought struck me recently, and the answer unfolded in a way I hadn’t expected. Here’s my realization: When you’re working on something, there’s a natural tendency to feel happy when things go right. But think about it—that joy stems from the fact that, deep down, you already had the knowledge to succeed at that task. The moment something “works,” it’s not the act of doing that brings you success; it’s the process of knowing that led you there....

January 19, 2025 · 3 min

Difference Between SSH and GPG Keys

Difference Between SSH Key Pair and GPG Key Pair 1. SSH Key Pair Purpose: SSH (Secure Shell) key pairs are primarily used for secure authentication and encrypted communication with remote systems (e.g., logging into a server or transferring files securely). Components: Private Key: Stays on your local system; never shared. Public Key: Shared with the remote server. Protocol: Built on the SSH protocol. Common Algorithms: RSA, ECDSA, ED25519. Use Cases: Logging into remote servers without passwords....

January 17, 2025 · 2 min

Setup a Static IP Using NetworkManager

To set up a static IP for your Linux system using NetworkManager, follow these steps: 1. Identify Your Network Interface Run the following command to find the name of your active network interface: nmcli device Look for the interface in the “DEVICE” column that’s connected. 2. Edit the Connection Use the following command to modify your network connection: `nmcli connection edit <connection_name>` Replace <connection_name> with the name of your active connection (you can find this in the “CONNECTION” column from the nmcli device output)....

January 17, 2025 · 1 min

What Do All the File Types in C Mean

In C programming, different file types (.c, .o, .a, .so, etc.) serve specific purposes throughout the software development lifecycle. Here’s a breakdown of each: 1. .c Files Purpose: These are source code files written in the C programming language. Contents: Contain human-readable C code (functions, definitions, etc.). Usage: These files are compiled into object files (.o) by a compiler like gcc. Example: #include <stdio.h> void hello() { printf("Hello, World!\n"); } 2....

January 13, 2025 · 2 min

Two Ways to Get Dynamic Arrays in C

Code 1: Variable Length Array (VLA) int n; scanf("%d", &n); int arr[n]; Features: Array Allocation: The array is declared on the stack. Stack memory is limited in size, so VLAs are unsuitable for very large arrays. Automatic Deallocation: The array is automatically deallocated when it goes out of scope (at the end of the function). You don’t need to free the memory manually. Portability: VLAs are part of the C99 standard and optional in C11....

January 10, 2025 · 2 min

Two's Complement Demystified

Imagine you’re playing with blocks and we’re talking about how computers count numbers, especially when they need to count both positive and negative numbers. What is Two’s Complement? Two’s complement is like a clever way that helps computers handle both positive and negative numbers using only 1s and 0s (binary). Computers don’t understand “negative signs” like we write on paper (e.g., -5). Instead, they use two’s complement to show negatives....

January 4, 2025 · 9 min

Who Owns the DNS

What is DNS Domain Name System - translates human-readable domain names (like www.example.com) into the numerical IP addresses (like 192.0.2.1) that computers use to communicate. How does it work How owns this Infrastructure The global Domain Name System (DNS) is a decentralized system with different types of servers managed by multiple organizations and entities. Let’s break it down: 1. Root Servers (Controlled by ICANN and Partners) Root servers are the top of the DNS hierarchy....

January 2, 2025 · 3 min

How to Cybersecurity

Mastering Cybersecurity: A Holistic Approach to Learning & Overcoming Overwhelm Estimated Read Time: 8-10 minutes The journey to mastering cybersecurity can be intimidating, especially with the sheer volume of knowledge to absorb. Many beginners find themselves overwhelmed, constantly battling self-doubt, and unsure of where to start. If this resonates with you, you’re not alone. This guide is designed to help you navigate this challenging yet rewarding field. We’ll explore a holistic approach that balances theory and hands-on practice, techniques for effective note-taking, and strategies to stay focused without feeling overwhelmed....

November 17, 2024 · 6 min

Master NoteTaking

Mastering Note-Taking and Linking in Obsidian: A Complete Guide Introduction In a previous one of my Blog, I highlighted Issues with Note-Taking. A proper guide of how I do was wanting. So here it is: Taking effective notes can be challenging, especially when it comes to organizing and linking information for long-term learning. Over time, I’ve realized that traditional note-taking methods often fall short, leaving us with a false sense of understanding....

November 16, 2024 · 4 min