Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search
Banner Mobile
Enterprise BusinessLog 970x120 1

Category: Culture

The History of the Unix Operating System (Part 2)

Author: Carlo DenzaOriginal Publication Date: 07/10/2021Translator: Tara Lie Star Trek IV – The Voyage Home, directed by Leonard Nimoy (USA, 1986, Paramount Pictures): “The starship ‘U.S.S. Enterprise NCC-1701’ and its crew, led by Admiral James Tiberius Kirk, tasked with the exploration of new worlds and researching new civilisations, is forced to embark on a risky journey back in time. The objective: return to Earth, to 20th-century California, to solve complex energy and environmental issues. The mission entrusted to the crew by Starfllet is to recover and transport two of the last whale specimens to the 23rd century, to try to save their

The Founding Fathers of the Hacker Community

Author: Massimiliano BrolliOriginal Publication Date: 19/03/2021Translator: Tara Lie Hacker culture was brought to life thanks to computer scientist Richard Greenblatt and mathematician Bill Gosper at the Massachusetts Institute of Technology (MIT). It all started at MIT’s famous Tech Model Railroad Club (TMRC), which we discussed in a previous article. Today, I would like to talk about programmer and computer scientist Richard Greenblatt, born on Christmas day 1944 in Portland, Oregon. Greenblatt was an expert chess player, and from nine years old he would take apart old radios and televisions to figure out how they worked internally. He would also build amplifiers, modulators, oscilloscopes and

Data Brokers: How Law Enforcement Rely on Inaccurate Data to Supplement Investigations

Author: Jesse McGraw, alias Ghost ExodusPublication date: 11/06/2022 Government public record databases apparently help law enforcement officials save lives, prevent further crimes from being committed by perpetrators, and also provide a detailed information platform that can stitch together obscure tidbits of data that can help them hunt down and capture fugitives and individuals fleeing from an arrest warrant. Access to these public record systems is set to help legal professionals solve cases faster by reducing the number of people it would ordinarily take to resolve the cases, as well as the time and expenses associated with lengthy investigations. It’s not uncommon to