Is Rust the low-level-ish

Is Rust the low-level-ish

Rust is the great hope for a safe low-level programming language. This is often expressed in the motto “fearless concurrency”, but who is to say that it really is better. Perhaps it’s just as bad in different ways. New research by Zeming Yu, Linhai Song, Yiying Zhang at Pennsylvania State University and Purdue University aims to find out if Rust’s approach to concurrency really does protect the programmer from making the sort of mistake so common in C-like languages. Rust is a language that all the cool kids are talking about, if not using. If you have missed its back story, it was invented in 2006 by Gradon Hoare, is championed…

Continue reading... Is Rust the low-level-ish
5 ways to back up your data securely

5 ways to back up your data securely

Photos, documents, saved video games, and old emails: We accumulate a lot of data throughout our lives. And just like our parents’ attic, our digital bags are getting fuller and fuller. Luckily, there are multiple options to store data, and it’s getting cheaper and cheaper never to throw anything away. Where should we keep our data though, and how do we protect it? What threats are we worried about the most? 1. Make sure your data is encrypted Your operating system should by default encrypt all data on your hard drive without you worrying about how to handle this process. You can check your drives encryption status in BitLocker (Windows) or…

Continue reading... 5 ways to back up your data securely
Celltel, RAC, CEIEC pen MOU for Smart Cities project

Celltel, RAC, CEIEC pen MOU for Smart Cities project

Celltel Networks, Roberta Annan Consulting (RAC) and Chinese government’s international cooperation company, CEIEC have signed a memorandum of understanding (MOU) to collaborate in the execution of a US$300 million Smart Cities Project in Ghana under the brand name ArisCel. Under the memorandum of understanding, Ghanaian organisation, Celltel Networks is the concept developer, Roberta Annan Consulting is onboard as transaction advisors for CEIEC, while CEIEC is a joint consortium of expert companies to deliver on the project. The three companies will soon be entering into a comprehensive agreement with the other partners of the project, which will be funded by a consortium of private investment banks and vendors. The Ghana Smart Cities…

Continue reading... Celltel, RAC, CEIEC pen MOU for Smart Cities project
How to properly dispose off your hard drives

How to properly dispose off your hard drives

Data is valuable. Your pictures, legal documents, chat logs, and even saved video games are all things you wouldn’t want to be public. Today, people generally go to great lengths to protect data, but devices age and don’t last forever. When we need to replace them, we often don’t think about what happens to the data that is still on the drive, and how people might be able to access it. Most computers have a hard disk drive, or HDD, which are disks coated with a magnetic metal layer. They rotate similar to a CD or vinyl record and read by a sensor at the tip of an arm. HDDs are…

Continue reading... How to properly dispose off your hard drives
Firefox Lite: Need to know

Firefox Lite: Need to know

Firefox Lite requires less than 3.5 MB, which is the smallest among major browsers, and it provides users with the shortest app download time. Moreover, one of Firefox Lite’s standout features is its Turbo Mode, which blocks third-party content such as ads on web pages. By doing this, less data is consumed and websites load faster. In addition to being lightweight and fast, users can also save a whole screen to read offline with a single tap on the toolbar. The website link is automatically saved too, so users can return whenever they want. Based on internal data, it is estimated that more than 440+ GB of online/mobile content was saved…

Continue reading... Firefox Lite: Need to know
Protect you against botnets

Protect you against botnets

Botnets are large networks of hijacked devices (robots) that can be remotely controlled by their creator. Mainly run for profit by criminal organizations, botnets can, for example, be used to mine cryptocurrencies like Monero, or use bandwidth to slow down websites as a denial of service attack. Who is at risk from botnets? The primary victims of botnets are outdated computers humming away in forgotten corners of business parks and schools, as well as poorly secured Internet of Things (IoT) devices. When a computer no longer receives updates but is still connected to the internet, it becomes vulnerable as more and more unpatched security vulnerabilities are discovered. These vulnerabilities might allow somebody…

Continue reading... Protect you against botnets