Blockchain

Networking Privacy Security

You won’t believe how UNSAFE your home router is!

Your router is the gateway between your devices and the internet at large. If it’s compromised, it’s like leaving the front door to your home network wide open, allowing malicious actors to enter. Unfortunately the routers most of us use are VERY insecure, with all kinds of known vulnerabilities. In this video Naomi Brockwell goes […]

Read More
Quantum Computing

DARQ Highlight of The Week – 4th Week of October 2022

October DARQ Highlights of the Week are covering a series of highlights some of the security challenges concerning Emerging Disrupting Technologies” taking Quantum Technologies as an example ” Today’s Highlight is about the “Potential Quantum Computing Implications on the National Security” Quantum Computing has become one of the nation’s states’ national security challenges, as it […]

Read More
Blockchain Cryptocurrency

Blockchain & Cryptocurrency Course for 2022

This video on the “BlockChain and Cryptocurrency Full Course for 2022” video will help you understand blockchain and its fundamentals clearly and elaborately. Also, this tutorial helps you to understand what cryptocurrency is, how paper money came into existence, the future of cryptocurrency, the features of cryptocurrency, how cryptocurrency works, what makes cryptocurrencies special, and […]

Read More
Containers Red Hat

Kubernetes and OpenShift: What’s the Difference?

Containerization is becoming the new norm for developing and deploying applications in a more efficient and accelerated manner. Kubernetes and OpenShift are two of the main container management platforms in the market for managing containers across the infrastructure. Check out this lightboarding video with Sai Vennam from IBM Cloud as he takes a deep dive […]

Read More
Linux

Is Linux Right For You?

After joining Red Hat, I decided to “give up Windows for Lent.” The experiment was a success in the sense that I feel confident about my ability to remain productive should my issues with Windows 11 be resolved. In the meantime, I have reverted my main work driver back to Windows. Like it or not, […]

Read More
Security

10 HACKING tools you MUST know about!

You already know not to take candy from strangers, but it may be time to add cables to the list of things not to accept from strangers. Naomi just got back from DefCon where I explored all kinds of hacking tools that are disguised as everyday items you might regularly use. The takeaways: Don’t borrow […]

Read More
Privacy

The MOST private MAP apps!

The big G Maps is by far the most downloaded navigation app in the US and for good reason. Invading your privacy and surveilling you helps them provide better services. Their entire business model revolves around collecting huge amounts of information about you and selling it to advertisers. What are some more private alternatives? Naomi […]

Read More
Privacy Security

Privacy Travel Tips: How To Keep Your Data Private If Your Phone Is Seized

Traveling with digital devices can be risky — sometimes phones or laptops are seized as you’re going through security, they can be scanned, and a whole bunch of personal data taken from them. This includes your private photos, passwords to email accounts, and even your 2FA seeds. For anyone who wants to maximize privacy, here […]

Read More
Blockchain

Learn Blockchain, Solidity, and Full Stack Web3 Development with JavaScript Free 32 Hour Course

This course will give you a full introduction into all of the core concepts related to blockchain, smart contracts, Solidity, ERC20s, full-stack Web3 dapps, decentralized finance (DeFi), JavaScript, TypeScript, Chainlink, Ethereum, upgradable smart contracts, DAOs, the graph, moralis, aave, IPFS, and more. Follow along with the videos and you’ll be a blockchain wizard in no […]

Read More
Privacy

They’re not SELLING your data. It’s MUCH worse…

Noami Brockwell explains the bold claim on a certain search engine’s website. It says on the Big G’s website: ‘We do not sell your personal information to anyone’” The truth is, they ARE SHARING your personal and sensitive information, and being compensated handsomely in return. But what’s ACTUALLY going on in this exchange is far […]

Read More