Accessibility And Inclusivity

I’m interested in learning about human experiences, and I recently started a tutorial delving into the accessibility standards of UI design. This got me thinking: what is it like to have a disability and work in the field of software engineering, and what can I do to be more inclusive? Disclaimer: I’m not physically disabled,Continue reading “Accessibility And Inclusivity”

Ransomware II: this time, it’s personal

The last post was about the origins of ransomware, from their first implementation; distributed by snail-mail on floppy disks, to city-wide attacks in Atlanta. In this part, I’ll explain a little bit more in depth, how some of these schemes are implemented, and write about what you can do to protect your network and files,Continue reading “Ransomware II: this time, it’s personal”

The History of Ransomware is Bananas

From power grid seizures to internet-enabled chastity belts, organizations are being targeted for ransom. A ransomware attack is when someone is able to get exclusive control of files on a computer or network, and holds them hostage until their demands are met. Where did it come from, and what are some ways that it’s beenContinue reading “The History of Ransomware is Bananas”