Skip to main content

Some skills background of mine

In this post I will describe briefly my IT background and skill set. 

As I mentioned earlier, I started from basics. Exactly, Basic programming language for Commodore C64. It is not confirmed, but very likely cave man used it to print their drawings on their cave walls. Let's forget about it.

Around the age of 12 when I had desktop computer already, I started to learn HTML and CSS shortly after. I learnt very quickly but o be honest, at that time nobody expected too advanced and too good looking websites. If it was readable, it was pretty all right. No needed to worry that you will browse via your 80-inches TV or smart watch, if it looked good on my screen, it looked good everywhere else. No one could hack plain HTML, so no security measurements at all. Good old times.

When I was about 16 I started to create websites for money. At this point it was already more complex: XHTML, CSS level 2 and JavaScript. I already knew foundations of PHP and MySQL databases. Now my websites could actually do something, not only serve with static information. In high school I learnd also a bit of Pascal (what for?!) and C++

During my first Uni I learnt Java, and I created a quite simple game (and invented brilliant pathfinding alghoritm, then found out it was already invented by Dijkstra 50 years before). At the time of the second University, I took opportunity to focus on hardware and electronics, including building simple 4-bit CPU from basic parts. All the time also improving my web dev skills. 

As I don't like being helped too much, I'm using basic code editors. Easy access to project files and presenting code in easy to read way and colors is all I need, so for majority of time the only editor I use for work is Atom. Beside that, obviously, all popular web browsers, FTP clients and MySQL console/phpMyAdmin. 

In my spare time I also improved my knowledge by completing multiple accredited courses about cybersecurity and data protection both on operative and executive level. I'm trying to stay up to date with OWASP (Open Web Application Security Project) findings and solutions and using their software to play and pen-test my own projects.

I'm looking forward to gain more knowledge at DMU. I will happily refresh such basic skills as using Office software and different operating systems, to - hopefully - advanced cybersecurity applications that will allow me to understand better process of cracking security measurements, and therefore building my own way better than at present. And maybe, maybe at some point in my collection of certificates there will be CISSP one too.

Comments

Popular posts from this blog

Computer Ethics

The invention of computers was undeniably significant milestone for civilisation. Creation of that extensively versatile and multipurpose device was an advancement that commenced a new age - Information Age - in a history of humankind. However with new possibilities, new threats follows: cyber crime, cyber terrorism or cyber war. Computer ethics consists of rules, practices and areas that should be taken into consideration while designing, implementing and using information and communication technologies. It was a predecessor to ICT related legislation and expands current legal obligations for every individual involved.  The first of computer ethics commandments says: "Thou shalt not use a computer to harm other people".   Often ethic codes are assigned to activities that have potential to be unethical, and within computer sciences the first thought is majorly hacking. In general, hacking refers to activities leading to acquire access to systems or data without permission...