Recently I read a front-page Medium post claiming that Trump will happily skip out of office if he’s not elected President in the next (2021) or next (2025) election and I wanted to write a counter-argument to his post. You can find that post by clicking here.
Doctor Wish starts out his post claiming
“Every election year, the same nutty paranoia flies around the internet. Conspiracy theorists push the idea that the president of the United States will refuse to leave office, overthrow democracy, and become a dictator.”
This claim is utterly false and just plain propaganda — I can’t…
For those of you who don’t know, or haven’t made any searches about anything on the Internet in the past year or two, you probably haven’t heard of Medium?
So… You’re probably wondering what is this Medium platform you keep hearing about? And if you should be writing for it, as opposed to your personal blog?
Well, for a more formal description of Medium by WikiPedia, they depict the platform as an “online publishing platform”. Which I guess only partially describes the full-extent of what Medium has to offer.
If I were to explain Medium in my own terms, informally…
A lot of tech oriented blogs out there on the internet are constantly advising that everyone should always be using Linux and that there are no buts’ about it.
These blogs usually go on to spew something like(I totally don’t do that in this post): Linux can offer this or that feature, it’s secure, and it shows that you’re .
But when should you actually be using Linux as opposed to Windows to maximize your productivity with the operating system?
Similar to Windows, Linux or rather GNU/Linux is an operating system that enables people to effectively command their computers without…
Due to recent skyrockets in data privacy interests, thanks to scandals from Facebook and the release of tracking techniques used by Google, the users of the internet have become increasingly privacy conscientious when it comes who is allowed and not allowed to have their hands on their personal data.
Recent news headlines in the tech sector have depicted large tech companies as evil agencies that track every move and click its users make. Which I have no doubt is true to the fullest extent.
Now these are companies that you and I use everyday, which include: Google, Facebook, Amazon, Huawei…
In this post, you will hopefully create a very simple Linux kernel module that outputs some traditional messages like “Hello, World!” and “Goodbye, World!”.
I’ll try to focus on explaining the details of every line of code, as opposed to writing a complex module without much explanation.
Like most coding projects, there are some prerequisite tools that you need to install before developing. Luckily for this project, there aren’t that many, but you’ll still need to have access to the following:
To get started, we’ll need to first
#include some header files to get…
Privacy and VPNs are both synonymous to 2019. But, you know what else is synonymous to 2019? Tracking the crap out of everyone’s online presence.
To explain how a VPN works in Laymen’s terms, a VPN basically just protects you from any external source (hackers, the Government, etc…) trying to spy on what you’re doing, while you browse the web and perform your daily tasks.
It basically creates a tunnel for your data to safely travel through while you browse the web, as opposed to browsing the web not connected to the web.
Which would allow hackers, ISPs, governments, and…
If you’ve ever heard of the SSH replacement Dropbear, chances are you’re going to want to install it.
Oh, and if you’re just looking to install Dropbear without any aforementioned, then just skip to the bottom of this post.
The default SSH software on almost all Linux distributions is OpenSSH, and while there is nothing directly wrong with OpenSSH, some environments aren’t built for it.
For example: Let’s say you have an embedded system with very very limited resources, and you just can’t afford to allow OpenSSH to take up a few MB of your precious RAM.
Plus, OpenSSH wasn’t…
Something as trivial as sharing access to your VPN with a relative or acquaintance may appear to be a nice gesture (which it is, don’t get me wrong). But, in reality, you may be jeopardizing the sustainability of your VPN service.
Disclaimer: This post is based off the premise of hosting your own VPN service and sharing access to it with your friends. That being said, it wouldn’t be far-fetched to expand this premise to encapsulate sharing access to big-name VPN services such as ExpressVPN.
Let’s take a step back for a moment to talk about the underlying details of…
Who doesn’t like a nice tasty raspberry-pi? Okay, maybe we’re not talking about an actual raspberry-pi here, but we’re still going to be talking about tasty raspberry-pi alternatives.
Disclaimer: All links within this post are Amazon affiliate links, meaning that for no additional cost to you, I may earn a commission on your purchase.
Well, a Raspberry-pi is actually rather simple to explain, as it has a rather simple device concept. To put a raspberry pi in laymen’s terms, it’s basically just a really small affordable computer that is comprised of a single computing board.
As of the time of…
The latest and greatest pieces of software have all sorts of intricate components that are written by thousands upon thousands of developers, which can bring the project size to millions upon millions of lines of code.
So how are developers supposed to manage a behemoth-size project?
Well, this is exactly where source control comes into play.
If I were to put “Source Control” into Laymen’s terms, I’d describe it as a means of tracking and distributing changes to a project.
A professor also once told me that source control is simply a means of taking snapshots of a project at…
A regular old person, interested in computer-related stuff!