top of page
markus-spiske-L2cxSuKWbpo-unsplash_edited.jpg
WFH Setup
keyboard2.jpg
source-code-programming_edited.jpg
coderwatch2.jpg
programer3.jpg
gray_hat3.jpg
Keep-Calm-And-Code-On-Coffee-Mug-Cup1.jp
Python-3.jpg
Gray-Hat-2.jpg
computer_coder_mug2.jpg
programmer4.jpg
cyberattack2.jpg
coder2.png

Gray_Hat_927

Internet and Security Blogs

Welcome to Gray_Hat_927, my very own passion project filled with unique and engaging content. Explore my site and perhaps Gray_Hat_927 will ignite your own passions as well.

Home: Welcome

INITIAL THOUGHTS

  "EVERYWHERE, THERE IS THIS SYSTEMATIC CONFUSION BETWEEN CIVILIZATION AND SOCIETY. CIVILIZATION REQUIERES THAT ALL LIVE UNDER THE RULE OF LAW. WHERE THE MONEY-POWER ELITES OF A SOCIETY LIVE ABOVE THE LAW, THERE IS NO CIVILIZATION."

   We currently live in a very interesting time. Information security and the legal system are being slammed together in a way that is straining the resources of both systems. The information security world uses terms like bits, packets and bandwidth and the legal community uses words like jurisdiction, liability and statutory interpretation. In the past, these two very different sectors has their own focus, goals and procedures and did not collide with one another.              But, as computers have become the new tools for doing business and for committing traditional and new crimes, the two worlds have had to independently approach and then interact in a new space--a space now sometimes referred to as cyberlaw.

     The U.S. invented the Internet basically with tax payer's money. We developed all the system of switching packets concept or information.

    Internet: The Internet is just a bunch of protocols that clever people put up together and it makes possible the exchange of information all over the world.

    IN A PERFECT PROGRAMABLE WORLD ALL OUR DEVICES WILL ACT LIKE ONE, they all be able to communicate, talk to each other. Adjust themselves base on each other readings.

    ETHICAL HACKING AND THE LEGAL SYSTEM

Home: Text
Search

Understanding Liquid Lens Technology

To understand Liquid Lens technology, first you need to know how traditional camera system works. The traditional camera System, are...

MACHINE LEARNING

The term machine learning was coined in 1959 by Arthur Samuel, an American IBMer and pioneer in the field of computer gaming and...

Today YouTube is 16 years old

YouTube is the most popular sharing videos platform. It was registered on February 14 2005, by Steve Chen, Chad Hurley and Jawed Karim,...

Eye Tracking Technology

Eye tracking is a sensor technology that makes it possible for a computer or other device to know where a person is looking. An eye...

3D Printing vs CNC Machining

They difference between 3D printing and CNC machining is that 3D printing is a form of additive manufacturing, while CNC machining is...

Facial Recognition

Essentially, the process of face recognition is performed in two steps. The first involves feature extraction and selection and the...

PHISHING & SPEAR PHISHING ATTACK

Phishing involves a hacking technique that is the digital equivalent of “casting a net.” Specifically, phishing means sending emails that...

Most common passwords in 2019

The National Cyber Security Centre (NCSC) compiled its own list of the 20 most common passwords in 2019, from 100 million passwords...

Halloween Thoughts

"Monsters are real and ghost are real too. They live inside us and sometimes, they win" Stephen King. There are nights when the wolves...

TOR vs VPN

We have to understand first how VPN and TOR works before anything else. TOR Is free and open-source software for enabling anonymous...

What we know about Ryuk Ransomware

Similar to Samas and BitPaymer, Ryuk is specifically used to target enterprise environments. Code comparison between versions of Ryuk and...

SIMJACKER

Cybersecurity researchers today revealed the existence of a new and previously undetected critical vulnerability in SIM cards that could...

Home: Blog2
bottom of page