Encrypted Messages

The best way to ensure that your messages won’t be read by unwanted persons is to use encryption. There may be many reasons why you are not using encryption. These three springs to mind: I have no information worth encrypting Only criminals hide information, and I am no criminal I lack the knowledge to use encryption I lack the tools to use encryption The number one on this list is the most difficult to crack.
Read more

NIST SP 1800-29, Case Study

The National Institute of Standards Technology (NIST) is an agency of the United States Department of Commerce. They publish guidelines on how to implement technology and help you second-guess situations that can compromise your data. In their publication, NIST SP 1800-29, they give advice on how to detect, respond to, and recover from data breaches. It is a daunting task going thru all the documents, which is why the NIST Cybersecurity Framework (CSF) 2.
Read more

Why Privacy matters

The right of privacy is a human right endorsed by the United Nations. Sloppy business practices originating from the mind-set of Silicon Valley has for many years ignored this right. They choose to maximize profits at the cost of your safety. In their mind issuing a privacy statement on their homepage that claims they intend to respect this right is enough to calm down any critique of this practice. By them doing this you may draw the conclusion that their claims are sincere.
Read more

Mullvad and Obscura VPN

The VPN Company Mullvad has presented an interesting solution to hide your credentials from your VPN provider. Mullvad has advocated for anonymous accounts for a long time and it’s possible to buy access via anonymous accounts by paying with cash or using crypto currency. This doesn’t require you to give them your billing information or other account information. When customers shares billing information to their VPN supplier, the company acts as a man-in-the-middle and can see both your personal information, connecting IP information and browsing history.
Read more

Oracle syntax

User trashcan List trashcan items: SELECT OBJECT_NAME, ORIGINAL_NAME, TYPE FROM USER_RECYCLEBIN; Restore table from trashcan: FLASHBACK TABLE A TO BEFORE DROP; Flashback complete Clear trashcan: PURGE USER_RECYCLEBIN; Create synonym CREATE SYNONYM <SYNONYM_NAME> FOR <SCHEMA>.<TABLE>;
Read more