Archives de
Catégorie : Culture Générale

SQL Index and co.

SQL Index and co.

In research progress in development, we need to have a good structure of our DataBase. Today I will show you the importance of a great organisation in your Data! His name is “index”. First of all, what are the basics of this idea? Based on: … What that: Structured Query Language (SQL). What for? Permit a communication with the database. How? Allow to write scripts. Ok, now we can begin : First of all: How to use index? To fully understand…

Lire la suite Lire la suite

Choosing the best programming language for developping a mobile app

Choosing the best programming language for developping a mobile app

Choosing a programming language for building a mobile app can be confusing for a beginner. This is why I decided, both for my personal culture, as for that of my classmates, to carry out a review of the different programming languages for mobiles and thus answer to the question… Which one should you use? Your choice of a given language that you are going to use for application development depends mainly on the operating system you are going to work…

Lire la suite Lire la suite

Qu’est-ce que la conception de projet?

Qu’est-ce que la conception de projet?

Une conception de projet est la première phase du cycle d’un projet. Au commencement, un projet se développe comme une idée ou une vision. Cependant, les étapes pour le rendre réalisable sont assez difficiles. Une idée ne peut devenir réalité qu’une fois décomposée en différent éléments organisés et exploitables dans une chronologie. La conception de projet est centrée sur les problèmes et les solutions. Elle consiste à identifier un problème, soit actuel soit dans un futur proche, et d’y trouver des…

Lire la suite Lire la suite

« Mudge » a.k.a Peiter Zatko

« Mudge » a.k.a Peiter Zatko

Peiter Zatko is famous in the field of cybersecurity. Since Novermber 16, 2020 he is responsible for Twitter security.But the story starts in 1995 when he was only 25 years old, he published his first books to explain how to hack Windows.He penetrated the best protected systems of the time, for fun, but also to desmonstrate that they were not secure enough. He is a whistleblower ! In 1998, he was auditioned in the Senate and explained to senators that…

Lire la suite Lire la suite

The Hack Of Twitter

The Hack Of Twitter

On July 15, 2020, nearly 150 certified twitter accounts of personalities, such as Elon Musk, Bill Gates, Jeff Bezos, Barack Obama or Joe Biden, but also companies like Apple and Uber, were hacked and used for a massive bitcoin scam. Indeed, their accounts all had a message appearing on their profile. Messages posted by hackers encourage users to send bitcoins to specific addresses and claimed that these amounts would be doubled. It’s unclear exactly what impact this attack had on…

Lire la suite Lire la suite

Cybersecurity

Cybersecurity

Cybersecurity is an area that brings together laws, policies, devices, concepts and mechanisms of security, applied to the digital world and used for the protection of people and computer equipment of states and organizations. Cybersecurity, a field that is still growing, is very much related to the process of control and communication between people and machines. Today I’ll describe the 10 most common cyber attack types: Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks Man-in-the-middle (MitM) attack Phishing and spear phishing…

Lire la suite Lire la suite

Google

Google

History Google was founded in 1995 by two stanford university students larry page and sergey strand, aged 24 and 23, respectively, these two students almost disagreed on everything but eventually developed their search engine. On September 15, 1997 the domain name google.com, was registered, and on September 4, 1998 google inc is created… In the garage of a friend. Now Google is one of the largest companies in the market and is part of the « big four » that is Google…

Lire la suite Lire la suite