Posts

GTK4 Terminal App ‘Black Box’ Gets a Big Ol’ Update

Image
 When I wrote about the first release on omgubuntu last year I surmised that, in a sea of VTEs, this app is made buoyant by delivering most of the core features one would expect, plus several you might not!The latest release builds out in both areas. Flashier touches gain buffs (e.g., context-aware header bar coloring), while the array of more common and/or utilitarian features (like process completion notifications for unfocused tabs) is expanded. Black Box 0.14.0 changes at-a-glance: New default Adwaita and Adwaita Dark color schemes Style picker in main menu Customize working directory of new tabs Tab/window close confirmations if active process running Option to disable terminal bell Option to use bright colors for bold text See desktop notifications for process completion ‘Open’ and ‘copy link’ options added to the right-click menu Rename tabs (<3) Performance improvements Additionally, the preferences/settings panel is made more orderly by grouping certain configuration to...

Why insurance is a must for cyber security now

Image
July 01,2023    Attack Types I get around five attempted fraud messages daily across my email, WhatsApp and text messages. That is five attempted attacks of phishing and spoofing, every day. Some examples include PDF files with an acknowledgement of financial transfer, a prospective foreign national reaching out to offer business and an unclaimed voucher attached to my credit card. The digital journey is now an arena of potholes, which one must navigate extremely cautiously. Given the ubiquitousness of the attacks and the increasing sophistication, it is only a matter of time that I step into a puddle. This is exactly what happened with two people I know.  Business News /  Money  /  Personal Finance /  Why insurance is a must for cyber security  Fraud attempts through phishing and spoofing, especially involving digital platforms, are becoming increasingly common and sophisticated, leading to financial losses for individuals. Victims often find lit...

NETWORKING WITH BALLOONS

N/S  Starlink has been making tremendous progress towards providing world-wide access to broadband Internet access, but there are a number of downsides to satellite-based internet such as the cluttering of low-Earth orbit, high expense, and moodiness of CEO. There are some alternatives if standard Internet access isn’t available, and one of the more ambitious is providing Internet access by balloon. Project Loon is perhaps the most famous of these (although now defunct), but it’s also possible to skip the middleman and build your own high-altitude balloon capable of connection speeds of 500 Kbps. [Stephen] has been working on this project for a few months and while it doesn’t support a full Internet connection, the downlink on the high altitude balloon is fast enough to send high-resolution images in near-real-time. This is thanks to a Raspberry Pi Zero on board the balloon that is paired with an STM32 board which handles the radio communication on a RF4463 transceiver module. The ...

SSC MTS Common Questions

Image
  i. The Administrative Tribunal is related to which article? * ans:- Article 323 ii. What is the parliament of japan known as? ans:- Diet iii. who was the chairman of the state reorganization commission? ans:- syed Fazal Ali iv. when did india become a fully democratic republic? ans:- 26 January 1950 v. who among the following holding office till president presad? ans:- Governor vi. Vice president ---  ans:- No MP vii. who held the office of vice president of india for two full term terms? ans:- S. Radhakrishnan viii. The President of India is an integral part of ----- ans:- Perliament ix. According to indian constitution, which of the following is a statutory body / institution ? ans:- Finance commission (280 Article) x. Who was the first anarchist president of india? ans:- Dr. A.P.J Abdul kalam
Image
  CYBER SECURITY Guardians of the Network: Exploring the World of Intrusion Detection and Prevention System In today’s increasingly digital world, the need for robust cybersecurity measures has never been greater. With the rise of cyber threats such as ransomware, malware, and social engineering attacks, organizations are constantly on the lookout for ways to protect their valuable assets and sensitive data. One such solution is the Intrusion Detection and Prevention System (IDPS). An IDPS is a security solution that helps organizations detect and prevent potential cyber attacks before they can do harm. By monitoring network traffic and identifying suspicious activity, an IDPS can provide organizations with the peace of mind they need to focus on their core operations. But as cyber threats continue to evolve and become more sophisticated, the capabilities of IDPS solutions will need to keep pace. In this article, we will explore the future of IDPS and how it will need to adapt to r...

A New ransomware encrypts <<"Cactus">>

Image
New Ransomware Strain 'CACTUS' Exploits VPN Flaws to Infiltrate Networks. A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large commercial entities.” The Cactus ransomware operation has been active since at least March and is looking for big payouts from its victims. While the new threat actor adopted the usual tactics seen in ransomware attacks - file encryption and data theft - it added its own touch to avoid detection. Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws in VPN appliances to obtain initial access to targeted networks."Once inside the network, CACTUS actors attempt to enumerate local and network user accounts in addition to reachable endpoints before creating new user accounts and leveraging custom scripts to automate the deployment and detonation of the ransomware encryptor via scheduled tasks,...