<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Virtual Wiz</title>
    <description>The latest articles on DEV Community by Virtual Wiz (@virtualwiz).</description>
    <link>https://dev.to/virtualwiz</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F909720%2Fab32d021-ebf0-4302-8ce8-32fb8e845326.png</url>
      <title>DEV Community: Virtual Wiz</title>
      <link>https://dev.to/virtualwiz</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/virtualwiz"/>
    <language>en</language>
    <item>
      <title>Dictionary Web App</title>
      <dc:creator>Virtual Wiz</dc:creator>
      <pubDate>Sun, 02 Oct 2022 10:51:25 +0000</pubDate>
      <link>https://dev.to/virtualwiz/dictionary-web-app-116k</link>
      <guid>https://dev.to/virtualwiz/dictionary-web-app-116k</guid>
      <description>&lt;p&gt;Hi everyone,&lt;br&gt;
I'm writing my first programming related article on dev.to and it's about the Dictionary Web App I have been build.&lt;/p&gt;

&lt;h3&gt;
  
  
  Check Out Here:
&lt;/h3&gt;

&lt;p&gt;&lt;a href="//virtualwiz1.github.io/js-projects/dictionaryapp"&gt;Dictionary App&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://res.cloudinary.com/practicaldev/image/fetch/s--T84u4Xxy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6t4880ki9d8yoxzwkv5u.png" class="article-body-image-wrapper"&gt;&lt;img src="https://res.cloudinary.com/practicaldev/image/fetch/s--T84u4Xxy--/c_limit%2Cf_auto%2Cfl_progressive%2Cq_auto%2Cw_880/https://dev-to-uploads.s3.amazonaws.com/uploads/articles/6t4880ki9d8yoxzwkv5u.png" alt="Dictionary demo" width="880" height="589"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Its a fairly simple App with not much code. I have used &lt;a href="//dictionaryapi.dev"&gt;Dictionary Api&lt;/a&gt; to handle fetch request for words that has been searched.&lt;/p&gt;




&lt;h3&gt;
  
  
  Features:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;Can listen to Pronunciation and Phonetics&lt;/li&gt;
&lt;li&gt;Can identify PartOfSpeech&lt;/li&gt;
&lt;li&gt;Simple UI&lt;/li&gt;
&lt;li&gt;Minimalistic design&lt;/li&gt;
&lt;li&gt;Fast Response&lt;/li&gt;
&lt;li&gt;Uses API to fetch data&lt;/li&gt;
&lt;/ul&gt;




&lt;h3&gt;
  
  
  Resources I have used:
&lt;/h3&gt;

&lt;ul&gt;
&lt;li&gt;HTML&lt;/li&gt;
&lt;li&gt;CSS&lt;/li&gt;
&lt;li&gt;JavaScript&lt;/li&gt;
&lt;li&gt;&lt;a href="//dictionaryapi.dev"&gt;Dictionary API&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;




&lt;p&gt;Feedbacks Appreciated!&lt;/p&gt;

</description>
      <category>dictionary</category>
      <category>javascript</category>
      <category>webdev</category>
      <category>api</category>
    </item>
    <item>
      <title>What is CIA in Cyber-Security? | CIA triad</title>
      <dc:creator>Virtual Wiz</dc:creator>
      <pubDate>Mon, 05 Sep 2022 04:23:45 +0000</pubDate>
      <link>https://dev.to/virtualwiz/what-is-cia-in-cyber-security-cia-triad-oin</link>
      <guid>https://dev.to/virtualwiz/what-is-cia-in-cyber-security-cia-triad-oin</guid>
      <description>&lt;h2&gt;
  
  
  Confidentiality
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Confidentiality&lt;/strong&gt; is basically the &lt;strong&gt;efforts made&lt;/strong&gt; by an &lt;strong&gt;organization&lt;/strong&gt; to keep their &lt;strong&gt;data private or secure&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To achieve confidentiality, company &lt;strong&gt;data and infomation access&lt;/strong&gt; should be controlled i.e &lt;strong&gt;preventing unauthorized access or sharing of data be it intentional or accidental&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;For example,&lt;/p&gt;

&lt;p&gt;those who work with an organization’s &lt;strong&gt;finances&lt;/strong&gt; should be able to &lt;strong&gt;access&lt;/strong&gt; the &lt;strong&gt;spreadsheets, bank accounts, and other information related to the flow of money&lt;/strong&gt;. However, the vast majority of other employees and perhaps even certain executives may not be granted access. To ensure these policies are followed, stringent restrictions have to be in place to limit who can see what.&lt;/p&gt;




&lt;h2&gt;
  
  
  Integrity
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Integrity&lt;/strong&gt; means to make sure the &lt;strong&gt;stored data is trustworthy and free from tampering&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;To maintain integrity, &lt;strong&gt;stored data&lt;/strong&gt; should be &lt;strong&gt;authentic, accurate and reliable&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;For example,&lt;/p&gt;

&lt;p&gt;if your &lt;strong&gt;company provides information about senior managers&lt;/strong&gt; on your website, this information needs to have integrity. If it is inaccurate, those visiting the website for information may feel your organization is not trustworthy. Someone with a vested interest in damaging the reputation of your organization may try to hack your website and alter the descriptions, photographs, or titles of the executives to hurt their reputation or that of the company as a whole.&lt;/p&gt;




&lt;h2&gt;
  
  
  Availability
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Availability&lt;/strong&gt; simply means that the &lt;strong&gt;data or information stored&lt;/strong&gt; should be &lt;strong&gt;available to authorized user whenever they need it&lt;/strong&gt;.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Even if data is kept confidential and its integrity maintained, it is often useless unless it is available to those in the organization and the customers they serve.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;This means that &lt;strong&gt;systems, networks, and applications must be functioning as they should and when they should&lt;/strong&gt;. Also, &lt;strong&gt;individuals with access&lt;/strong&gt; to specific information &lt;strong&gt;must be able to consume it when they need to, and getting to the data should not take an inordinate amount of time.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;For example,&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;there is a power outage and there is no disaster recovery system in place to help users regain access to critical systems, availability will be compromised.&lt;/strong&gt; Also, a natural disaster like a flood or even a severe snowstorm may prevent users from getting to the office, which can interrupt the availability of their workstations and other devices that provide business-critical information or applications. Availability can also be compromised through deliberate acts of sabotage, such as the use of denial-of-service (DoS) attacks or ransomware.&lt;/p&gt;




</description>
      <category>cybersecurity</category>
      <category>confidentiality</category>
      <category>integrity</category>
      <category>availability</category>
    </item>
    <item>
      <title>Hacking with Android | Termux</title>
      <dc:creator>Virtual Wiz</dc:creator>
      <pubDate>Tue, 16 Aug 2022 13:06:17 +0000</pubDate>
      <link>https://dev.to/virtualwiz/hacking-with-android-termux-2ld6</link>
      <guid>https://dev.to/virtualwiz/hacking-with-android-termux-2ld6</guid>
      <description>&lt;h2&gt;
  
  
  Termux
&lt;/h2&gt;

&lt;p&gt;Termux is a terminal emulator application for Android as well as a Linux environment that runs on Android without the need for rooting or special settings. Additional applications/packages are also available and can be installed using the APT package manager.&lt;/p&gt;

&lt;p&gt;What distinguishes Termux from other terminal emulators is that Termux has set up such a way that the environment on Termux is the same as the Debian standard Linux environment.&lt;/p&gt;

&lt;p&gt;Termux is neither a virtual machine nor any other kind of emulated or simulated environment. All provided packages are cross-compiled with Android NDK and only have compatibility patches to get them working on Android. The operating system does not provide full access to its file systems, so Termux cannot install package files into standard directories such as /bin, /etc, /usr or /var. Instead, all files are installed into the private application directory located at&lt;/p&gt;

&lt;p&gt;&lt;code&gt;/data/data/com.termux/files/usr&lt;/code&gt;&lt;br&gt;
We call that directory “prefix” and usually refer to it as “$PREFIX”, which is also an exported environment variable in the Termux shell. Note that this directory cannot be changed or moved to an SD-Card because:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;&lt;p&gt;The file system must have support for unix permissions and special files such as symlinks or sockets.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The prefix path is hardcoded into all binaries.&lt;br&gt;
In addition to prefix, users can store files in the home directory (or “$HOME”) available at&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;code&gt;/data/data/com.termux/files/home&lt;/code&gt;&lt;br&gt;
Enough about Termux…now lets go over how to install it…&lt;/p&gt;




&lt;h2&gt;
  
  
  Getting Termux
&lt;/h2&gt;

&lt;p&gt;Its fairly simple to install termux…just head over to google playstore and download it…&lt;/p&gt;

&lt;p&gt;but since the playstore version no longer recieves updates….its better to get the app from github or f-droid …&lt;/p&gt;

&lt;p&gt;&lt;a href="https://github.com/termux/termux-app"&gt;Github&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://f-droid.org/en/packages/com.termux/"&gt;F-Droid&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;after you download the apk all you have to do is install it…VIOLA! you got termux…&lt;/p&gt;




&lt;h2&gt;
  
  
  What to do first?
&lt;/h2&gt;

&lt;p&gt;The termux application is an emulator only so we need to change what we need.&lt;/p&gt;

&lt;p&gt;After installation, run the app…you should provide storage permission (NOTE: its not essential)&lt;/p&gt;

&lt;p&gt;Termux does not access your storage but if you need to move or copy any files from your sd card to termux you should type the below command.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;termux-setup-storage&lt;/code&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  Termux Commands
&lt;/h2&gt;

&lt;p&gt;Simlar to Linux,&lt;/p&gt;

&lt;p&gt;To access any specific directory use the &lt;code&gt;cd&lt;/code&gt; command. For example, &lt;code&gt;cd &amp;lt;directory-name&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;&lt;code&gt;ls&lt;/code&gt; command will help you to see the subdirectory on your termux.&lt;/p&gt;

&lt;p&gt;To access your internal sd card you have to type &lt;code&gt;cd /sdcard &amp;amp;&amp;amp; ls&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;To access your external sd card you have to type &lt;code&gt;cd /sdcard0/ &amp;amp;&amp;amp; ls&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If you need to delete any directory or files you have to use this command &lt;code&gt;rm -rf &amp;lt;filename&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;To create any directory on your termux type &lt;code&gt;mkdir &amp;lt;directory-name&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If you need to copy any files from one place to another place you have to type &lt;code&gt;cp -r &amp;lt;filename&amp;gt; &amp;lt;path&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;If you need to move means the same command but a little bit of change &lt;code&gt;mv -r &amp;lt;filename&amp;gt; &amp;lt;path&amp;gt;&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;Find your IP address or any other network details means you just type the following command on your terminal.&lt;/p&gt;

&lt;p&gt;&lt;code&gt;ifconfig&lt;/code&gt;&lt;/p&gt;

&lt;p&gt;To install any package &lt;code&gt;pkg install &amp;lt;package-name&amp;gt;&lt;/code&gt;&lt;/p&gt;




&lt;p&gt;Now that you have your hacking environment setup…explore it more and use it for good…&lt;/p&gt;

&lt;p&gt;HAPPY HACKING.&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
