Posts

Practical applications for I.T professionals looking to implement Symmetric Cryptography in Windows/Linux

Introduction Hello everyone, I FINALLY have a "somewhat" new topic to discuss in this weeks entry. I noticed a lot of professors who attempt to teach Network Security to their students either in a Computer Science or I.T setting do a very poor job of actually teaching the concepts and instead focus on a lot of "jargony" high-level Number Theory, that is truly not necessary if you plan on implementing cryptographic algorithms! This might be fine for an advanced subject of Cryptography in general, but often leads students confused and quite frankly puts most of them to sleep. Today instead I am going to be focusing in on "tools" one could potentially use in order to implement Network Security on computers in a way that makes sense in their school projects or in their day to day I.T job. I am briefly going to cover an number of of pieces of software that can be used for hard-disk encryption. Without further ado, we can begin to break everything down and le...

A collection of recursive algorithm techniques in C that can be applied to real-world applications

Introduction Hello avid blog readers! After months of enjoying the summer and basking in the warm weather, I am finally back with an entry for the month of September. Today I am going to look at something that is a little more on the technical side and something that mostly only software developers would care about. If you aren't interested in the inner workings of recursive algorithms and how one can implement them in C, feel free to skip this entry. I will be back with another one for the month of October, that might be more accustomed to the usual entries and topics that I am discussing in this blog. Let's begin and start with the basics (Note: This blog entry assumes you have never taken a Computing I or II course before in college and have no prior knowledge writing algorithms in C. It DOES ASSUME you are familiar with the C programming language though) What is recursion? Recursion according to a simple definition in [1] is a circular definition. When something is d...

Encoding Opus files in Linux with opusenc for your own collection and HTML 5

Introduction Hello everyone! I am finally back to writing a new blog entry, after taking a very long month off. I hope all of my U.S readers had a great Fourth of July and are enjoying the summer. Today, I am going to be discussing and showing you how to encode with the the new IETF working audio codec called "Opus". Briefly, Opus is a combination of Xiph.org "CELT" codec and Skype's "SILK" codec combined into one project. It's a low-latency audio codec that was designed with "scalability" in mind and does things "fundamentally" different, even though it should sound the same if not better in different situations for speech and music. The project was finally completed this past winter and standardized and will be used in the new WebRTC project (for video conferencing), Skype (for video calls), and other companies that wish to use it. Google is NOW (as of July 2013) incorporating it, into the next generation codebase of WebM, wh...

Three "must listen" to Thin Lizzy albums from the 70's you should hear in your lifetime if you are fan of "Vintage Rock"

Introduction Hello, everyone. I am back this week after taking a long month off. In this month's entry, I am going to be switching gears back to the topic of music. No one can and should underestimate the value that music has on society and it's cultural significance. Today, I am briefly going to be looking at three of what I would argue are three of Thin Lizzy's "best" albums from the late 1970's and the significant impact they have had on Rock N' Roll over the last fourty or so years. I am going to rate them and then try to convince you the listener, why you should listen to them or at least "consider" listening to these albums if you are a fan of Vintage Rock. Like always, it will be up to you determine whether or not they have any intrinsic value. Now that I have got that out of the way, I can begin to describe my favorite Thin Lizzy albums from the 1970's: Three of my top favorite Thin Lizzy albums Bad Reputation (1977) - Phil Lyno...

Why I am proud to be a Bostonian and why you should visit sometime!

Introduction I first want to apologize for my month long absence, if you are a monthly reader to my blog. Many events has transpired over the last month or so. I was finally able to complete two out of three courses that I started back in January. One of them was collectively referred to as "Legal Aspects of Cyberspace". I took this course in a effort to increase my "legal knowledge" for this blog, and so that I could consult with an expert or someone with a J.D in aspect of the legal field, be it Intellectual Property all the way up to Criminal law! Having this knowledge helps me to help you the reader, better understand legal concepts and how exactly the law works on a case by case basis. In any event, I was happy to complete that course successfully with an A. The other reason I have not had time to update is simply, because my city has come under a domestic terrorist attack as of late. Unless you live under a rock you can see from every "news" media o...

My top five "must play" video games of 2013

Introduction This week I am back with a new entry for all of my readers. This entry is going to be abbreviated, simply because I do not have a lot of time to go into lengthy technical post regarding tech stuff. Next week's entry or the week after next, I will try to find some technical stuff that I believe you "may" find interesting. Today, I am going to discuss my top five "must play" video games of 2013! If you are avid gamer or even if you are not, you may have these same games on your list. Many of the "most anticipated" games of 2013 are coming out this month (in February) or next month in March. Here are the list of games that made my top five list, with some commentary describing what the game is about and why you may want to "consider" picking yourself up a copy or buying it on the net. Like always, you may agree or concur with my particular "tastes". If there are other games that you feel deserve to be on the list or you ...

What the U.S vs. Fricosu (2011) case "might" mean for future law and Cloud Computing cases regarding encryption!

Introduction Hello readers! I have been working on school stuff and finally at the end of the week do I now have time to update "The Labyrinth" and discuss "important" developments that you need to know in the field of Law and Technology!. It also helps greatly, that I am taking a "computer law" course this semester as a free elective for my major, along with two other courses in an effort to obtain my Bachelors degree in December, but enough about that. Let me give you a "brief" overview, regarding what I am going to be discussing today. In this week's entry, I am briefly going to summarize the U.S vs. Frisocu (2011) case and how it "may" related to future law cases involving encryption and encryption in the "cloud" i.e the developments we are seeing play out with the Kim Dot Com "strategy" (Note: I am not going to comment on whether or not "Mega" website is "ethical" or not. You should go ...