Skip to main content

Posts

Showing posts from January, 2021

The perfect laptop,

 All of last week, I was in search of a perfect laptop. A laptop which is ideal for IT students and especially for cyber security and ethical hacking majors. What are the essential feature of a perfect laptop then, yes for IT students. Even though , I really haven't figured it out exactly, I have come up with all the important factors to consider before investing on a laptop. And here I have the beginners list: A. Paying attention to the processor is the key. Processor relating to the CPU of the laptop is considered the brain. The powerful the processor is , the more task the laptop can perform with ease. But, here is the caveat - powerful processor also tends to use more power which should imply the battery life. Laptop which gives relatively longer battery life is advantageous in many fronts to an IT student. Therefore, choose a laptop with good processor but it does not have to be a laptop with ultra powerful processor. As of this writing, Intel Core I5 and equivalence is the le

Need much work, today Linux is it- 4

 Friends, Last week I really tried to spend at least two hours studying per one hour class. It certainly helps. I was sort few hours however. In any event, what I come to notice is to be able to really understand the concepts clearly we need to spend lot more hours researching about the topic than only few hours. I am positive that all the researching time spent on to really understand a topic from foundational level would pay off in future. One day I spent couple of hours just to understand what Linux is.  First let us understand operating system - operating system is a software which allows us to actually navigate the computer and do our work. The only operating system I was aware of before was Windows. I knew windows but didn't know it was an O.S - this could be the case for many people who are not computer terms literate despite the fact that they use computer in daily basis in some way. In essence, operating system is also a program - a program that facilitates user. What I am

Baby steps - 3

  Friends,  I foresee it would be a messy journey if I would document everything I am learning in my class. Because, my program is sub-divided into many modules - my blogpost could be a mix of all the subjects I would be learning, and I assume it would create confusion. Instead of me replicating whatever I am learning in class, I am thinking of summarizing in simple words, easier to remember without bothering too much on which module it belongs to. The plan is that for now, but I am sure we will have a sense of clarity as days goes by . So, lets begin. Learning computing or cybersecurity entails one to clearly understand all the aspects pertaining to computers. So, guess what - we got to understand first, the history of computers. All the generations of computers - the first, second, third, fourth and fifth. There are some major differences and progression along the way. The first generation computer which started in 1946 (1946-1959) used Vacuum tubes. The second (1959-1965) used trans