All posts by admin

Celeb; Want to be a social celebrity?

Get_Famous

Cheat Code # 1

In the era of our digital age, few things hold as much significance for the crowds as social currency. Nowadays, influential personalities on social media possess a cultural capital that can rival, if not surpass, the fame of traditional movie stars and pop icons from the past. Step into the realm of these postmodern luminaries with Netflix’s latest K-drama, “Celebrity,” where you can see a journey into their world—a world that showcases not only the status and prestige of these self-marketing Gurus but also sheds light on the shallow and superficial aspects of influencer culture.

Following Follower

Cheat Code # 2

The series’ main character is Seo A-ri (played by Park Gyu-young), a once-privileged young woman who now leads a modest life as a door-to-door saleswoman for affordable cosmetics. She finds contentment in her simple offline existence until a fateful encounter with her high school friend Oh Min-hye (portrayed by Jun Hyo-seong), who has become a renowned influencer, alters the course of her life.

Likes

Cheat Code # 3

Through Min-hye, A-ri catches a fleeting glimpse of the wealthy lifestyle enjoyed by internet celebrities – lavish parties, wasteful goods, luxurious residences, and the admiration of countless strangers. This newfound exposure to the world of social media fame and fortune sets A-ri on a captivating journey of self-discovery and temptation, as she wrestles with the attraction of this glamorous but seemingly superficial universe.

Let’s Connect

Cheat Code # 4

Beyond the attraction of wealth and fame, A-ri finds herself entangled in the less glamorous and ugly aspects of being a public figure. Witnessing her former classmate and her group of mean girl influencers embroiled in a petty online feud, she’s taken aback by the disloyalty and shallowness lurking beneath their seemingly friendly façades. Despite being repelled by this artificiality, A-ri’s mother, burdened by their working-class status after her husband’s business failure, urges her to seize the opportunity and improve their circumstances. Succumbing to her mother’s pressure, A-ri reluctantly creates her first Instagram account, setting in motion an unexpected and rapid ascent to becoming one of South Korea’s most prominent influencers.

Life is unfair

Cheat Code # 5

Spill the tea

Cheat Code #6

The majority of the series unfolds through intriguing flashbacks, chronicling A-ri’s journey from riches to rags and back to riches as she skilfully leverages the connections she forged with Min-hye to enhance her online presence. However, “Celebrity” takes a captivating twist with the use of a clever framing device—a no-holds-barred confessional livestream set in the present day. In this stream, A-ri fearlessly exposes the narcissism of her peers while promising her viewers a “cheat code” to emulate their influencer lifestyle. What makes this even more riveting is the early revelation that, in the present day, A-ri is believed to be dead!

The world they live in

Cheat # 7

As A-ri appears alive and well during the live stream, her followers and fellow influencers are left in utter shock and disbelief. The mystery deepens when she teasingly hints at disclosing the identity of the person responsible for her presumed “murder.” This shocking revelation sends ripples through the digital world, leaving everyone hanging on to every word of her intriguing and enigmatic confessional. With each passing moment, the series delves deeper into a web of secrets, lies, and unexpected turns, leaving the audience enthralled and eager to uncover the truth behind A-ri’s astonishing present-day existence.

The world we live in

Cheat Code # 8

Despite its intriguing premise, “Celebrity” suffers from a significant drawback as it takes an excessively long time to drive home its rather obvious messages. While the social commentary on classism and capitalism holds validity, much of the criticism it presents lacks surprise or novelty. Moreover, the characters in the series are portrayed in a shallow and one-dimensional manner, even when the plot explores their insecurities.

Turn the table

Cheat Code # 9

Nevertheless, “Celebrity” remains binge-worthy due to its eye-opening exposé of contemporary fame and its skillful incorporation of a gripping whodunnit element. The strength of the series lies in the outstanding performances of its talented young actors, which help hold the narrative together despite its shortcomings. In the end, viewers may find themselves engrossed in the show’s exploration of the dark side of modern celebrity culture, despite its occasional missteps and lack of narrative conciseness.

Like you and Me

Cheat Code # 10

K-drama and K-Pop

The history of Korean drama, often referred to as K-drama, dates back to the early 1960s. Over the decades, it has evolved significantly and become an influential part of the Korean entertainment industry and a cultural export worldwide.

Here’s a brief overview of the key periods and milestones in the history of Korean drama:

Early Stages (1960s-1970s):
Korean television broadcasting began in the early 1960s, and the first serialized dramas started airing during this period. These early dramas were primarily influenced by traditional Korean storytelling and featured historical and melodramatic themes. The most well-known early drama is “The Kitchen Maid” (Gungnip eomeoni), which aired in 1961.

Expansion and Popularity (1980s-1990s):
In the 1980s and 1990s, the Korean drama industry experienced significant growth and expansion. The introduction of color TV and improved production techniques contributed to higher-quality productions. Dramas like “Love and Ambition” (Saranggwa ambi) and “What Is Love” (Sarang eun mwohago sipnikka) became popular both domestically and internationally, especially in Asian countries.

Hallyu Wave and Global Recognition (2000s-2010s):
The 2000s marked a turning point for Korean dramas with the rise of the Hallyu Wave, also known as the Korean Wave. The popularity of dramas like “Winter Sonata” (Gyeoul yeonga) and “Full House” helped spread Korean pop culture to neighboring Asian countries and beyond. The internet and digital streaming platforms played a significant role in making Korean dramas more accessible to international audiences.

Diversification of Genres and Formats:
As Korean dramas gained global attention, the industry diversified its offerings to cater to various audiences. Historical dramas (sageuk), romantic comedies, thrillers, fantasy, and crime dramas became prevalent. Additionally, shorter formats like mini-dramas and web dramas gained popularity due to their accessibility on online platforms.

High-Profile Success and Recognition:
K-dramas began receiving critical acclaim and recognition at international award ceremonies. Several Korean actors and actresses gained widespread fame and became recognized globally. Iconic dramas like “Descendants of the Sun,” “Goblin,” “The Heirs,” “My Love from the Star,” and “Crash Landing on You” have contributed to the continuing popularity of Korean dramas worldwide.

Streaming Services and Global Reach:
The advent of streaming services like Netflix, Viki, and Viu has further expanded the global reach of Korean dramas. These platforms allow viewers from different countries to access a vast library of K-dramas with subtitles, making it easier for non-Korean speakers to enjoy the shows.

Ongoing Evolution:
As of my last update in September 2021, the Korean drama industry continues to thrive with new productions and innovations. The industry continues to adapt to changing audience preferences and technology, with more diverse storytelling and international collaborations.

In summary, the history of Korean drama is a tale of growth, innovation, and global influence. It has transcended cultural boundaries and become an essential part of the Korean Wave, contributing significantly to South Korea’s soft power on the global stage.

What is Email Signing?

Email signing, also known as email authentication or digital signing, is a process used to verify the authenticity and integrity of an email message. It is a way to ensure that an email comes from the claimed sender and has not been tampered with during transmission. Email signing uses cryptographic techniques to add a digital signature to the email message.

Here’s how email signing typically works:

Digital Signature Generation: The sender’s email client or server uses a private key to generate a unique digital signature for the email message. The private key is a piece of cryptographic information known only to the sender and is used to create the signature.

Public Key Publication: The sender’s public key is usually stored in a digital certificate, which may be provided by a Certificate Authority (CA) or self-signed. This public key is used by the recipient to verify the digital signature.

Appending the Signature: The digital signature, along with some metadata about the signing process, is appended to the email message.

Sending the Signed Email: The signed email is sent to the recipient.

Verification by Recipient: When the recipient’s email client or server receives the signed email, it uses the sender’s public key (retrieved from the digital certificate) to verify the authenticity of the digital signature. If the signature matches the content of the email and the sender’s public key, it indicates that the email has not been altered in transit and is genuinely from the claimed sender.

Email signing is primarily achieved using cryptographic algorithms, such as asymmetric encryption (RSA or ECC), and digital certificates (like X.509). Common email signing standards include DKIM (DomainKeys Identified Mail) and S/MIME (Secure/Multipurpose Internet Mail Extensions).

By using email signing, organizations, and individuals can protect against email spoofing and man-in-the-middle attacks. It helps recipients identify genuine communications from trusted senders and avoid falling victim to phishing scams.

Oppenheimer

The Atomic Boam maker

“Whatever the enemy may be planning, American science will be equal to the challenge.”  —Franklin Delano Roosevelt, June 29, 1943

J. Robert Oppenheimer, born on April 22, 1904, and died on February 18, 1967, was an American theoretical physicist and one of the key figures in the development of the atomic bomb during World War II. He is often referred to as the “father of the atomic bomb” for his significant contributions to the Manhattan Project.

Oppenheimer was born in New York City and showed early academic promise in science and mathematics. He attended Harvard University and later earned his Ph.D. in theoretical physics at the University of Göttingen in Germany.

During World War II, Oppenheimer led the Los Alamos Laboratory in New Mexico, where scientists and engineers worked on the development of the atomic bomb. The successful testing of the first atomic bomb took place on July 16, 1945, in the Trinity test. This event marked a significant turning point in history, leading to the use of atomic bombs on Hiroshima and Nagasaki in Japan, hastening the end of World War II.

Despite his pivotal role in the development of nuclear weapons, Oppenheimer also advocated for civilian control of atomic energy and opposed the development of the hydrogen bomb during the early stages of the Cold War. His stance on these matters led to a controversial security clearance hearing in 1954, during which he faced accusations of being a security risk due to his left-wing political affiliations in the past. As a result, his security clearance was revoked, and he was effectively barred from further government work related to nuclear weapons.

After his troubled period, Oppenheimer focused on teaching and research, and he made significant contributions to theoretical physics and astrophysics. He received many honors and awards throughout his lifetime, recognizing both his scientific achievements and his leadership during the Manhattan Project. Oppenheimer’s life and work continue to be subjects of great historical and scientific interest.

CyberSecurity

The most terrifying thing is anyone can be targeted by cybercriminals.

Whether you are just an individual or a company or an organization. No matter what your size is! Here are some cybersecurity basics and putting them in practice will help us protect our business and the risk of a cyber-attack.

Let’s protect our files and devices;

Keep your software up to date whenever new updates are available.

Secure your files by backing up important data offline, on an external hard drive, or in the cloud. Also, ensure the safety of physical paper files.

For enhanced security, password-protect all laptops, tablets, and smartphones. Avoid leaving these devices unattended in public areas.

How we can protect our wireless network?

We can secure our router by doing those primanry steps;

  • By changing the default name and password.
  • Turn off remote management.
  • Log out as the administrator once the route is set up.

Make Smart Security your business as usual

Require strong passwords
  • At least 12 characters.
  • A mix of numbers, symbols, and capital lowercase letters.
  • Never reuse passwords.
  • Don’t share them on the phone, in texts, or by email.
  • Limit the number of unsuccessful log-in attempts to limit password-guessing attacks.
Train all staff

Encourage a secure culture by regularly training employees on security practices. Keep employees informed about new risks and vulnerabilities as they arise. If employees fail to attend these updates, consider restricting their access to the network.

The NIST Cybersecurity Framework

The National Institute of Standards and Technology (NIST) at the U.S. Department of Commerce recommends a framework that helps businesses of all sizes better understand manage, and reduce their cybersecurity risk and protect their network.

There are 5 areas NIST cybersecurity framework suggests. Those are;

Identify

Identify starts with making a list of all equipment, software, and data being used, including laptops, smartphones, tablets, and point-of-sales devices.

Create and share a company cybersecurity polity that covers;

Roles and responsibilities for employees, vendors, and anyone else with access to sensitive data.

Steps to take to protect against an attack and limit the damage if one occurs.

Protect

  • Control who logs on to your network and uses
    your computers and other devices.
  • Use security software to protect data.
  • Encrypt sensitive data, at rest and in transit.
  • Conduct regular backups of data.
  • Update security software regularly, automating
    those updates if possible.
  • Have formal policies for safely disposing of
    electronic files and old devices.
  • Train everyone who uses your computers,
    devices, and network about cybersecurity.
    You can help employees understand their
    personal risk in addition to their crucial role
    in the workplace.

Recover

Repair and restore the equipment and parts of your network that were affected.

Keep employees and customers informed of your response and recovery activities.