English Posts

First of all install dislocker, for doing that install aptitude and then

$sudo aptitude search dislocker

once you find dislocker install it, with:

$sudo apt-get install dislocker

once you have it installed, then you should run something similar to this:

$sudo fdisk -l

to discover your disk, and then

$sudo dislocker -u[YOUR_PASSWORD_GOES_HERE] /dev/sdb1 /mnt/hdext
$sudo mount /mnt/hdext/dislocker-file /mnt/hd

“Cloud Computing, the long-held dream of computing as a utility, has the potential to transform a large part of the IT industry, making software even more attractive as a service and shaping the way IT hardware is designed and purchased” (Armbrust et al., 2010).


Cloud computing concept didn’t come to the light to swallow all the data-center market in the world, but this concept better defined in this discussion, allows companies to do things that earlier before was something harder to do, such as deploying a pilot project would take several weeks or months on creating an infrastructure and making the availability and the elasticity of supporting the grown of the desired application without the need of implementing something in an expensive reality.


The idea of cloud computing is to make it possible to offer services such as software on a very established new way of business, which is called SaaS – Software as a Service, PaaS – Platform as a Service and IaaS – Infrastructure as a Service, which also has its own specific way of charging its users based on the usage as introduced by (Armbrust et al., 2010).


For that ones who are deploying its first early versions of their startup project (an iPhone or Android app, for instance), the cloud computing enables the power of reducing the cost of enabling a minimal data-center and the way it grows bigger it also allows the elasticity of supporting millions of users, and enabling the possibility of the startup idea to not be failed and the service-fee based can be more close to the reality of the business in case (People Driven Solutions, 2017).

 But it is not only startup companies who are moving the cloud, as it can be seen, that almost all of the Fortune 500 companies have experiences with the cloud computing model.


With the popularization of the concept of cloud computing, many service providers were born such as Amazon AWS, Microsoft Azure and Google Cloud Platform. Today, the presence of Amazon AWS is dominant, with a market share of 40% it is the biggest player on the market, followed by Microsoft Azure and Google Cloud Platform as the biggest ones, as stated by The Fortune in the Article entitled “Amazon Still Leads Cloud Rankings, But Competition Is Coming On Strong”, which is based and compiled in articles from Gartner, research institutes and companies CEO’s (Darrow, 2017). 


The decision of moving to the cloud need to be based on the analysis of every service deployed, analyzed the impacts in terms of security, availability, latency and even costs. In my viewpoint cloud is not only a reality in supporting the businesses in achieving their goals today, but a trend that will continue to change dramatically the IT industry based on its innovative way of providing services which before were not accessible for many companies, such as providing an application in a data-center which allows better performance in terms of latency (enabling a data-center in São Paulo and improving the service availability in Latin America, for instance).


Armbrust, et al., 2010. A view of cloud computing, [Magazine] New York: Communications of the ACM. Available at: http://dl.acm.org/citation.cfm?id=1721672 (Accessed 24 September 2017).

People Driven Solutions, 2017. How Cloud Computing Enables Our Startup’s Success [Online] Available at: http://peopledriven.co/cloud-computing-enables-startups-success/ (Accessed 24 September 2017).

Darrow, 2017. Amazon Still Leads Cloud Rankings, But Competition Is Coming On Strong. [Online] Available at: http://fortune.com/2017/06/15/gartner-cloud-rankings/ (Accessed 24 September 2017).


With the introduction of biometric studies into the computer science, the first devices and methodologies started to grow in such manner we can see fingerprints scanners in airports, voting machines in democratic countries and even in ATM’s (very common in Brazil). There are different methods to identify an information system user, including fingerprints and facial recognition, for instance.


One of the most popular methods of identifying an information systems user is by the facial recognition. As a user I have already used this technology to be identified by companies which required my facial recognition to emit educational certificates, I was requested to be identified by Coursera as stated by Vrankulj (2013) and Duolingo (n.d), and both companies applied the technology to identify me as the real student, what allowed the institution to emit the certificate with assurance that I was the student who was in class and doing the required tests.

This technology in the past was in the hands of a few companies, but today with my experience of developing such kind of systems, the facial recognition can be easily implemented using the OpenCV (Open Source Computer Vision) library OpenCV(n.d), which is available on an open source license, and with a few efforts can be achieved a fully functional facial recognition solution.


As mentioned in the topic above, one of the most effective ways of ensuring the identification of an internet user is by facial recognition biometry. On my viewpoint, this technology is becoming so trusted that the Australian border and immigration control has efforts on replacing the use of passports with facial recognition as stated by The Guardian (2017).

There are more studies on the way, which impacts the facial recognition technology with the use of alternative methods that goes beyond the technology we have today, with 3-d scanning to be implemented by Apple in the iPhone 8 as stated by The Fortune (2017), what in my viewpoint are efforts to minimize the possibility of the facial recognition system to be cracked (think about using a picture of someone instead of the real person at the moment of the recognition, what can be a controversy on the effectiveness of such technology).


If you think that by implementing a fingerprint scanner in an ATM, reduces a high possibility of fraud in the banking system since the bank card is not allowed to be used by another person. Not even considering all the ghost users that the banking system may possibly identify by the use of such technology.

In spite of bringing costs to the system, we live in a society today where all social classes may be possibly corrupted. Corruption in inserted in all kinds of social classes and people, especially thinking about the banking system, which is the source of the money transactions and may be the easiest way of detect corruption by the implementation of such technologies.

If you consider that to implement such a system there is a cost, the users which do not practice corrupt activities may have the impact of paying the price of that one who practices it, however when you think about society as a whole, most of the non corrupt users can be positively affected by the reduction of the frauds, since they can also be a victim.


Vrankulj (2013) Coursera looks to verify online student identity with photo, keystroke dynamics [ONLINE] Available at: http://www.biometricupdate.com/201301/coursera-looks-to-verify-online-student-identity-with-photo-keystroke-dynamics. (Accessed 17 September 2017).

Duolingo (n.d) Introducing Duolingo Language Certificates [ONLINE] Available at: https://www.duolingo.com/comment/834824/Introducing-Duolingo-Language-Certificates-Beta. (Accessed 17 September 2017).

OpenCV (n.d) Face Recognition with OpenCV [ONLINE] Available at: http://docs.opencv.org/2.4/modules/contrib/doc/facerec/facerec_tutorial.html. (Accessed 17 September 2017).

The Guardian (2017) Facial recognition to replace passports in security overhaul at Australian airports [ONLINE] Available at: https://www.theguardian.com/australia-news/2017/jan/22/facial-recognition-to-replace-passports-in-security-overhaul-at-australian-airports. (Accessed 17 September 2017).

Fortune (2017) Apple Is Reportedly Testing 3D Facial Scans to Unlock iPhones [ONLINE] Available at: http://fortune.com/2017/07/03/apple-3d-face-scans-unlock-iphones/. (Accessed 17 September 2017).


Today we have methods to make it possible to audit systems, which can be used for good or for the worse, and it is something that can be achieved through external or third-party systems, or it can be implemented with some methodology and techniques which allows the investigation and analysis of events which occurred while the operation of information systems Piattini (1999, pp. 3-5).


Some years ago, I worked as a consultant for the “Tribunal Regional do Trabalho” (freely translated to Regional Labor Court), which was responsible for the labor-related process in the states of Parana and Santa Catarina. As the systems where all important, the need of auditing was something important since it had to log who was the user who was imputing information in the system, for instance. This was something common with the type of framework which we were using at that time, which was also based on the concept of auditing, and making it available for its subsystems Alvim (2017).


The auditing can be achieved on customized software by developing its functionalities and adding security proceedings like logging the user and using logical exclusion, for instance. I will give the example of record auditing on relational databases.

Once you have a table, you may have two additional columns to that, username and date and hour. By having this two additional columns and making your software input the user logged in and the hour and date of the event, you have the desired auditing which will allow the proceedings of investigations on your software.

There is also a resource which can help a lot on the investigation, which is the database logging. Some commercial and open source SGDB’s support this feature, however there are some alternatives like Huang & Liu (2009) presents in their paper entitled “A Logging Scheme for Database Audit”, which is based on intercepting the database communication, parsing and processing the database protocol and making it auditable for further investigation procedures.


Today, with the penetration of the information systems in all the spheres of the governmental and private market, the systems auditing became a very important subject, with many ways of implementing it, as seen in the Huang & Liu (2009) article, which uses alternative resources to implement security and auditing in a very creative and original manner.


Piattini, M (1999) Auditing Information Systems. London: Idea Group Publishing.

Paulo A. (2017) Java EE 6 Open Source com jCompany Developer Suite [online] Available at: http://www.powerlogic.com.br/powerlogic/ecp/comunidade.do?app=portal&pg=540&idConteudo=1263 (Accessed 17 September 2017).

Huang Q & Lianzhong L (2009) ‘A Logging Scheme for Database Audit’, IEEE Conference Publications, 2, pp-390-393.


As an example of copyright infringement, since the MPEG layer 3 compression algorithm was made available on the internet in the ’90s (Davis, 1995), the ease of getting a CD device, ripping it and making this available for millions of users through the internet, allowing users to make the use of the artistic and intellectual material without paying any cent to the producer of such IPO has surged and only increased having even allowing the users of the peer-to-peer networks to have the delighted usage of millions of materials, by just having to download it instantly on the peer-to-peer networks.


In the late ’90s, a peculiar file sharing program called Napster came to the light on the internet, allowing millions of copyrighted music to be downloaded for free, and encouraging the ripping and sharing of copyrighted material through this very curious platform. At that time, the impact of this software has incredibly huge what triggered one of the most famous cases in the law court which ruled against Napster and the platform disappeared after that.

After Napster, the internet users seeing how this file sharing model used to bring some kind of facility on accessing (in this case for instance music), had been supporting this kind of application and many derivative or inspired applications came to the light in the early 2000s.

One of the most decent solutions to the case of music file sharing and such derivatives, came when Apple released the first iPod platform (Macworld, 2011) in conjunction with the iTunes service, which until today exists and is one of the most reliable and formal ways of distributing music and royalties, without damaging the music industry.


Today, we have some music streaming services such as Spotify and Deezer; Netflix for accessing movies and TV shows; Amazon has its book platform based on Kindle and there are some other platforms which encourage the correct usage of copyrighted material. At certain reflection they all are effective, however, there are barriers which may include the Music Recording Companies, the Offices related to the IPO related issues. I think most of the platforms we have today are effective business models, in spite of believing the prices may surge the way it becomes more effective in terms of the quantity of the exploration of such markets and products.


My model of distributing royalties for such owners of IPO that are shared on the internet through streaming and peer-to-peer file sharing is based on the Audio Home Recording Act of 1992, which is part of the United States Copyright Law (MIT, n.d), what this law simply does is a regulatory way of making the producer of blank media producers in paying for the copyright owners which are affected by the use of such technology, and is in my viewpoint a very established way of protecting copyrights, however when you think about streaming, you cannot have the same control over what is reproduced and what is consumed by the internet users (not even considering peer-to-peer).

Based on such law, I personally believe the Internet Service Providers (ISP) should be encouraged and regulated by the law, based on the principle that the streaming exists and it is massive, and the peer-to-peer continues to transfer an unimaginable quantity of copyrighted material without paying any cent for all that ones who owns it.

By charging the ISP a certain percentage of its yield, based on the principle that the internet industry also makes trillions in charging users for the transfer of data, especially if you think about the mobile technology, which in my opinion is one of the most expensive ways of transferring data today.

I do believe most of the users would not be affected, and if so would be in the internet prices, anyways it would be a very simple and effective way of increasing the royalty collection/levy and making it available for the IPO owners and the regulators of copyrights.


Davis, P. (1995) A tutorial on MPEG/Audio Compression. IEE [Online] 60-74. Available at: https://www.ee.columbia.edu/~dpwe/e6820/papers/Pan95-mpega.pdf (Accessed 10 September 2017).

Washington University School of Law (2013) Case Study: A&M Records, Inc. v. Napster, Inc. [ONLINE] Available at: https://onlinelaw.wustl.edu/blog/case-study-am-records-inc-v-napster-inc/. (Accessed 10 September 2017).

Macworld (2011) The iPod: How Apple’s legendary portable music player came to be [ONLINE] Available at: https://www.macworld.com/article/1163181/consumer-electronics/the-birth-of-the-ipod.html. (Accessed 10 September 2017).

MIT. (n.d) What about the Audio Home Recording Act? [ONLINE] Available at: http://trillian.mit.edu/~jc/ideas/AudioHomeRecordingAct.html. (Accessed 10 September 2017).


In spite of the electronic devices such as cameras, fingerprints and identity cards, for instance being used by the police in the past in regards to criminal situations, today is very and very more often that this devices are developed by the industry to help companies on achieving their goals, being possibly regarding policies of the company or even to help the company to operate in a good health helping it to succeed in the business world.

With the usage of electronic monitoring the company is able to check how much time the employee spend at work, how productive they are, the usage of applications and when they do better at work and when they do less (HubStaff, 2017).


Today I am working as a consultant for a small size company where there are no policies being formalized, but there are rules the employees know they have to follow.


In the company I work today. we have a very little  monitoring system which is called Squid. This tools is not only used for monitoring for also for caching internet results which were already accessed in the past (Squid, 2017).


Cameras are everywhere in the company, not only to supervise the professionals, but in my country it is very common to have assaults in all kind of companies, so this is common that the company equip every room with cameras as a security device to serve as footage in case something happens.


In the company I work for there is the usage of fingerprints to unlock doors, in order to provide access in some rooms only for allowed persons. For instance, in the development room is accessed only by the development related people (Advance Systems, 2017).


I personally think since the company have its concerns in regards to the good performance of its operations and the need of being successfully achieving the customer deals or negotiations, monitoring is valid in the terms which will allow the company to operate the way it needs to do. I personally believe the security devices are ways to secure the company to allow that its operations happens without surprise or even lead to the bankrupt of the company.


Squid, 2017. Squid: Optimising Web Delivery. [Online] Available at: http://www.squid-cache.org. [Accessed 02 September 2017].

Hubstaff. 2017. What is Employee Monitoring?. [ONLINE] Available at: https://hubstaff.com/employee_monitoring. [Accessed 3 September 2017].

Advance Systems. 2017. Track Employee Hours Using Biometric Fingerprint Scanner. [ONLINE] Available at: https://advancesystemsinc.com/track-employee-hours-using-biometric-fingerprint-scanner/. [Accessed 3 September 2017].

In usage almost 99% of the companies computers, the Windows operating system have huge evidence of its fragility in the protection of malware and spyware, which are easily installed and replicated through many machines in the work environment (Chris Hoffman, 2016).

As a security solution blocking methods including blocking websites, and monitoring the computer activity can be effective in the manner the company evicts to be the spy or even to suffer hacker attacks. I do personally believe most of the blocking are not methods to disallow the usage of the internet, but for sure to improve the security of such companies.

In order to provide access to blocking and internet security some type of products are available such as:

  • Squid – a tool which can be used to block or to improve the internet availability through cache (Squid, 2017);
  • Task monitoring software;
  • Keyloggers;


  • Blocking downloading websites, torrents, porn websites may allow computers to have more security, and evict the heavy workload of replacing and reinstalling the operating system very often;
  • Blocking some retard culture websites may reduce the loss of interest of the employee in the work it is meant to do;


  • Depending on the quantity and what kind of website is blocked by the company, the employee may feel the company doesn’t have trust in his ethical and moral behavior;
  • Many resources are spent to produce this kind of security in companies, employees should be contracted to work on that, software needs to be acquired to that;

Based on my experience and cultural factors, the possibility of measuring the employee productivity having reports and feedback based on every ones productivity doesn’t seem to work well, since the gap in the IT professionals and the difficult to contract professionals may give these professionals somehow a sense of comfort, based on the principle of “if we leave, who is going to do the work”. But of course, this is a cultural aspect that happens in my country since it is difficult to contract IT professionals (Novais, A. 2012).


Chris Hoffman, 2016. Why Windows Has More Viruses than Mac and Linux. [Online] Available at: https://www.howtogeek.com/141944/htg-explains-why-windows-has-the-most-viruses. [Accessed 02 September 2017].

Squid, 2017. Squid: Optimising Web Delivery. [Online] Available at: http://www.squid-cache.org. [Accessed 02 September 2017].

Novais A.. 2012. Professional Shortage in Brazil. [ONLINE] Available at: http://thebrazilbusiness.com/article/professional-shortage-in-brazil. [Accessed 3 September 2017].