Posts

Showing posts from May, 2020

What is Geographic Information Systems (GIS)

Image
Geographic Information Systems (GIS) Stands for "Geographic Information Systems." GIS tools are used to gather and analyze data about the surface of the earth. The data can be used to create charts, maps, and 3D models of the earth's surface. This includes hills, mountains, trees, buildings, streets, rivers, and pretty much anything else. Sounds fun, but how is it used? Well, organizations such as the police and fire department can use the data to develop emergency routes. The government can use the data to measure the growth and expansion of cities or the depletion of forests. Most importantly, however, GIS can assist with special effects by simulating landscapes and terrain in action movies. GIS files created with ArcGIS software use the  .e00  file extension.

Top 5 Text Editors Programmers Use!

Image
Top 5 Text Editors Programmers Use: 1. Atom Atom is a free and open-source text and source code editor for macOS, Linux, and Microsoft Windows with support for plug-ins written in Node.js, and embedded Git Control, developed by GitHub. Atom is a desktop application built using web technologies. 2. Sublime Text Sublime Text is a shareware cross-platform source code editor with a Python application programming interface. It natively supports many programming languages and markup languages, and functions can be added by users with plugins, typically community-built and maintained under free-software licenses 3. gedit gedit is the default text editor of the GNOME desktop environment and part of the GNOME Core Applications. Designed as a general-purpose text editor, gedit emphasizes simplicity and ease of use, with a clean and simple GUI, according to the philosophy of the GNOME project 4. Vim Vim is a clone, with additions, of Bill Joy's vi text editor program for Unix. Vim's autho...

Top 3 Forensic Tools

Image
TOP 3 COMPUTER FORESIC TOOLS 1.  ProDiscover Forensic 2.  The Sleuth Kit (+Autopsy) (personal fav) 3.   CAINE (Computer Aided Investigative Environment) For More Information Google Is Your Friend.

Over 4000 Android Apps Expose Users' Data via Misconfigured Firebase Databases

Image
More than 4,000 Android apps that use Google's cloud-hosted Firebase databases are 'unknowingly' leaking sensitive information on their users, including their email addresses, usernames, passwords, phone numbers, full names, chat messages and location data. The investigation, led by Bob Diachenko from Security Discovery in partnership with Comparitech, is the result of an analysis of 15,735 Android apps, which comprise about 18 percent of all apps on Google Play store. "4.8 percent of mobile apps using Google Firebase to store user data are not properly secured, allowing anyone to access databases containing users' personal information, access tokens, and other data without a password or any other authentication,"  Comparitech  said Acquired by Google in 2014,  Firebase  is a popular mobile application development platform that offers a variety of tools to help third-party app developers build apps, securely store app data and files, fix issues, and even engag...

Rot13 Cipher

Image
Rot13 Ciper Basic Crypto The ROT13 cipher is a substitution cipher with a specific key where the letters of the alphabet are offset 13 places. I.e. all 'A's are replaced with 'N's, all 'B's are replaced with 'O's, and so on. It can also be thought of as a Caesar cipher with a shift of 13. The ROT13 cipher is essentially a substitution cipher with a fixed key, if you know the cipher is ROT13, then no additional information is needed to decrypt the message. The substitution key is: ABCDEFGHIJKLMNOPQRSTUVWXYZ NOPQRSTUVWXYZABCDEFGHIJKLM Example The Word Pirzada is written as Cvemnqn