profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Zero-to-Hero Full-Stack DApp Development in 10 MinutesZero-to-Hero Full-Stack DApp Development in 10 MinutesA guide for beginners to crypto marketing.A guide for beginners to crypto marketing.Testnet: The Complete GuideTestnet: The Complete GuideGitHub repositories to learn Web3 developmentGitHub repositories to learn Web3 developmentGuide to Cosmos EcosystemGuide to Cosmos EcosystemHow to wrap fungible tokens into NFT (aka minting Gift Cards) using Solidity?How to wrap fungible tokens into NFT (aka minting Gift Cards) using Solidity?Another Airdrop! How to get the Valas Airdrop using Geist.Finance!Another Airdrop! How to get the Valas Airdrop using Geist.Finance!Diving deeper into Cellframe: Python SDK & Plugins pt. 1Diving deeper into Cellframe: Python SDK & Plugins pt. 1How to Choose the Right Crypto Tax Software, Part 1: Review Exchange CoverageHow to Choose the Right Crypto Tax Software, Part 1: Review Exchange CoverageUnderstanding Solidity by exampleUnderstanding Solidity by example

Sorting Two Lists Together According to The Order of One List in PythonSorting Two Lists Together According to The Order of One List in PythonWe may use two lists to store the values of two properties of a list of elements in Python. Under such data structure arrangement, when we need to sort the properties from one list, we may want to also make sure the other list will be also re-ordered following the same order as the first Read more The post Sorting Two Lists Together According to The Order of One List in Python is from SysTutorials. Synchronizing Thunderbird Calendar with Apple iCloud CalendarSynchronizing Thunderbird Calendar with Apple iCloud CalendarThunderbird is a nice email client and calendar management software. iCloud calendar is the native calendar cloud service in Apple devices such as iPhone. So far there is no native support from Thunderbird to support iCloud calendar, excepting reading the read-only public iCloud calendars which has privacy concerns as long as lacks of editing functionalities. Read more The post Synchronizing Thunderbird Calendar with Apple iCloud Calendar is from SysTutorials. SPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How toSPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How toEmail sender fraud is an annoying problem. Malicious email senders send spam emails with email senders that are under non-authorized domain names. This may affect the reputation of the domains used by the fraud sender. On another hand, lots emails will be rejected and reverted back, which causes lots additional work to the domain administrators. Read more The post SPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How to is from SysTutorials. Running Ephemeral Docker Containers – Automatically Remove a Docker Container After Running ItRunning Ephemeral Docker Containers – Automatically Remove a Docker Container After Running ItDocker is a convenient tool to quick create containers from different Linux images. If we use the common way to start a docker container like docker run image bash, after the the process exists, the container is still stored there. That is, the docker container persists after it has exited. Sometimes, we would like to Read more The post Running Ephemeral Docker Containers – Automatically Remove a Docker Container After Running It is from SysTutorials. Configuring Fonts for Thunderbird snap to Display Fonts NicelyConfiguring Fonts for Thunderbird snap to Display Fonts Nicelysnap is a software app bundle with dependencies included so that it can works in different Linux distributions. However, as most other software, snap has compatiblity issues. An app in the snap format is not 100% the same and compatible with the native version. One of the problem I find is that Thunderbird from snap Read more The post Configuring Fonts for Thunderbird snap to Display Fonts Nicely is from SysTutorials. Starting Page Number from the Second Page in MS WordStarting Page Number from the Second Page in MS WordFor document, we may use the first page as the title page. Then the page number 1 should start from the second page. In this post, we will look at how to make MS Word count the page number from the second page. That is, making word treat the second page as page number 1. Read more The post Starting Page Number from the Second Page in MS Word is from SysTutorials. GNONE 3 Screenshot Keyboard ShortcutsGNONE 3 Screenshot Keyboard ShortcutsGNONE 3 provides screenshot tools and utils and also provides keyboard shortcuts which are convenient and quick to use. With the GNOME 3 screenshot keyboard shortcuts, users can make screenshots without having to open the Screenshot app. In general, there are 2 major categories of screenshot shortcuts: those to save the screenshot as a file, Read more The post GNONE 3 Screenshot Keyboard Shortcuts is from SysTutorials. Linux Kernel 4.19.178 ReleaseLinux Kernel 4.19.178 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 4.19.178 Release. Linux 4.19.178 Release contains 248 changes, patches or new features. In total, there are 239,909 lines of Linux source code changed/added in Linux 4.19.178 release compared to Linux 4.19 release. To view the source code of Linux 4.19.178 kernel release online, Read more The post Linux Kernel 4.19.178 Release is from SysTutorials. Linux Kernel 4.14.223 ReleaseLinux Kernel 4.14.223 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 4.14.223 Release. Linux 4.14.223 Release contains 176 changes, patches or new features. In total, there are 277,921 lines of Linux source code changed/added in Linux 4.14.223 release compared to Linux 4.14 release. To view the source code of Linux 4.14.223 kernel release online, Read more The post Linux Kernel 4.14.223 Release is from SysTutorials. Linux Kernel 5.4.102 ReleaseLinux Kernel 5.4.102 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 5.4.102 Release. Linux 5.4.102 Release contains 338 changes, patches or new features. In total, there are 160,715 lines of Linux source code changed/added in Linux 5.4.102 release compared to Linux 5.4 release. To view the source code of Linux 5.4.102 kernel release online, Read more The post Linux Kernel 5.4.102 Release is from SysTutorials. Linux Kernel 4.9.60 ReleaseLinux Kernel 4.9.60 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 4.9.60 Release. Linux 4.9.60 Release contains 24 changes, patches or new features. In total, there are 64,224 lines of Linux source code changed/added in Linux 4.9.60 release compared to Linux 4.9 release. To view the source code of Linux 4.9.60 kernel release online, Read more The post Linux Kernel 4.9.60 Release is from SysTutorials. Linux Kernel: xt quota: report initial quota value instead of current value to userspaceLinux Kernel: xt_quota: report initial quota value instead of current value to userspaceThis change “xt_quota: report initial quota value instead of current value to userspace” (commit 49daf6a) in Linux kernel is authored by Changli Gao <xiaosuo [at] gmail.com> on Fri Jul 23 14:07:47 2010 +0200. Description of “xt_quota: report initial quota value instead of current value to userspace” The change “xt_quota: report initial quota value instead of Read more The post Linux Kernel: xt_quota: report initial quota value instead of current value to userspace is from SysTutorials. Reading JSON from URL in RReading JSON from URL in RR is good at analyzing data. Many data are provided as JSON from RESTful APIs with an URL. R natively support many data format. For JSON, we can use some libraries. For reading JSON from URL, we can use the “jsonlite” package. In this example, we use an example of fetching BTC prices of last Read more The post Reading JSON from URL in R is from SysTutorials. Reading Excel xls/xlsx Files in RReading Excel xls/xlsx Files in RMany useful data are stored in Excel xls or xlsx format files. R is good at doing analysis on top of data. We would then need to import the data to R by reading the xls/xlsx files to be R data frames. In this post, we check how to import data from Excel files to Read more The post Reading Excel xls/xlsx Files in R is from SysTutorials. 3 Ways of .odt to .txt File Conversion in Command Line in Linux3 Ways of .odt to .txt File Conversion in Command Line in LinuxThe Open Document .odt files can contain rich formats for the content. However, some times a plain text file is more handy. We may convert .odt files to plain text files for such needs. In this post, we discuss 3 ways of how to convert .odt files to .text files in command line in Linux. Read more The post 3 Ways of .odt to .txt File Conversion in Command Line in Linux is from SysTutorials. .docx/.doc to .odt File Conversion in Command Line in Linux.docx/.doc to .odt File Conversion in Command Line in LinuxWord .docx and .doc files are common for documents commonly generated by MS Word software. We would like to convert them to the more open ODF Open Document .odt files for various cases. This can be done by GUI software tools. If we have a set of many .docx/.doc files, it will be handy if Read more The post .docx/.doc to .odt File Conversion in Command Line in Linux is from SysTutorials. Configuring Eclipse to Show Git Revision Information Similar to Git Blame in EditorConfiguring Eclipse to Show Git Revision Information Similar to Git Blame in EditorEclipse can work well with Git. We discussed Configuring Eclipse to Highlight Changed Lines Compared to Git Commit before. Eclipse can also show the revision information for lines of code (from git blame) which is useful to understand why some lines are added in the context of previous revisions including the lines of code. Eclipse Read more The post Configuring Eclipse to Show Git Revision Information Similar to Git Blame in Editor is from SysTutorials. 2 Ways of Modifying macOS Keyboard’s Right Option to Control for Mac Pro2 Ways of Modifying macOS Keyboard’s Right Option to Control for Mac ProFor heavy Terminal/Shell/command line users, the Control key is a very frequently used key. However, in Mac Pro keyboard, there is only a single left Control key for some models. This cause quite some inconvenience. In this post, we will go through how to configure/remap the keys to “create” a right Control key. Remap keys Read more The post 2 Ways of Modifying macOS Keyboard’s Right Option to Control for Mac Pro is from SysTutorials. Converting Hex to ASCII Using xxdConverting Hex to ASCII Using xxdStrings are commonly encoded as hexadecimal (hex) strings for various purposes. Hence, it is also common to convert hex strings to its original strings such as an ASCII string. Hex to ASCII string conversion can be done programmatically in many languages. In command line, we can use xxd to convert hex to ASCII string. This Read more The post Converting Hex to ASCII Using xxd is from SysTutorials. Release Notes For Linux v2.0Release Notes For Linux v2.0This is the release notes for linux release v2.0 (source code: linux-2.0.tar.gz) with format adjusted by removing/replacing tabs/spaces/new lines/formatting marks. This notes document can give us an understanding of the early development of the Linux kernel. The original ASCII formatted version is at the end of this post. Intro This document contains a list of Read more The post Release Notes For Linux v2.0 is from SysTutorials.

Blockchain as a Tool — HyperledgerBlockchain as a Tool — HyperledgerBenchmark blockchain using Hyperledger CaliperBenchmark blockchain using Hyperledger CaliperHyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using PrometheusGetting started with - Hyperledger BesuGetting started with - Hyperledger BesuHyperledger Besu — Getting Started: Part 2Hyperledger Besu — Getting Started: Part 2

Cryptoeconomics: Social & Cultural ImplicationsCryptoeconomics: Social & Cultural ImplicationsSince the origin of Bitcoin was born on the internet under a pseudonym, which is environed with mysteries till today, the cryptoculture is…Continue reading on Coinmonks »Cryptoeconomics — Game WrappingCryptoeconomics — Game WrappingCryptoeconomics: Self-Sovereign IdentityCryptoeconomics: Self-Sovereign IdentityCryptoeconomics: Technological ChallengesCryptoeconomics: Technological ChallengesDeploy Solidity Contract using GoLang — Go-Simple-Storage-FCCDeploy Solidity Contract using GoLang — Go-Simple-Storage-FCCHow to take part in the ETH L2 ®evolution with MATICX&Options.How to take part in the ETH L2 ®evolution with MATICX&Options.A Quick Update on Ethereum PoS vs PoWA Quick Update on Ethereum PoS vs PoWLearn Solidity lesson 19. Timestamp.Learn Solidity lesson 19. Timestamp.Learn Solidity lesson 17. The structure of a smart contract.Learn Solidity lesson 17. The structure of a smart contract.Why You Shouldn’t Become A Web3 Developer & What To Do InsteadWhy You Shouldn’t Become A Web3 Developer & What To Do InsteadA much more possible pathContinue reading on Coinmonks »

Is Trusting Big Cloud with Your DR Strategy a Recipe for Disaster?Is Trusting Big Cloud with Your DR Strategy a Recipe for Disaster?As part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Adam Stern of Infinitely Virtual breaks down why you should diversify your disaster recovery strategy and not put all your eggs in one Big Cloud basket. In the cloud, no one can hear you scream […] The post Is Trusting Big Cloud with Your DR Strategy a Recipe for Disaster? appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Identity Management and Information Security News for the Week of August 5; Updates from DoControl, Axis, Exabeam, and MoreIdentity Management and Information Security News for the Week of August 5; Updates from DoControl, Axis, Exabeam, and MoreThe editors at Solutions Review have curated this list of the most noteworthy identity management and information security news items for the week of August 5th. This curated list features identity and information security vendors such as DoControl, Axis, Exabeam, and more. Keeping tabs on all the most relevant identity management and information security news […] The post Identity Management and Information Security News for the Week of August 5; Updates from DoControl, Axis, Exabeam, and More appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The 3 Major Players in Security Service Edge in 2022The 3 Major Players in Security Service Edge in 2022The editors at Solutions Review examine the Leaders quadrant in the 2022 Gartner Magic Quadrant for Security Service Edge. These are the major players in security service edge, according to analyst house Gartner, Inc. Gartner defines Security Service Edge (SSE) as a platform that secures access to the web, cloud services, and private applications. Capabilities […] The post The 3 Major Players in Security Service Edge in 2022 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Identity Management and Information Security News for the Week of July 22; Updates from ForgeRock, DynaTrace, IP Fusion, and MoreIdentity Management and Information Security News for the Week of July 22; Updates from ForgeRock, DynaTrace, IP Fusion, and MoreThe editors at Solutions Review have curated this list of the most noteworthy identity management and information security news items for the week of July 22. This curated list features identity and information security vendors such as ForgeRock, Dynatrace, IP Infusion, and more. Keeping tabs on all the most relevant identity management and information security […] The post Identity Management and Information Security News for the Week of July 22; Updates from ForgeRock, DynaTrace, IP Fusion, and More appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Don’t Let Outdated Connected Devices Open the Door to RansomwareDon’t Let Outdated Connected Devices Open the Door to RansomwareAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Chris Westphal, the Cybersecurity Evangelist and Head of Product Marketing at Ordr, explains the risks involved in outdated connected devices and how to avoid or resolve them. The number of connected devices connecting to your network—personal […] The post Don’t Let Outdated Connected Devices Open the Door to Ransomware appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Key Takeaways: 2022 Gartner Magic Quadrant for Security Service EdgeKey Takeaways: 2022 Gartner Magic Quadrant for Security Service EdgeThe editors at Solutions Review highlight the key takeaways from the inaugural Gartner Magic Quadrant for Security Service Edge and provide an analysis of the report. New to 2022, Analyst house Gartner, Inc. released the inaugural edition of its Magic Quadrant for Security Service Edge. Gartner defines Security Service Edge (SSE) as a platform that […] The post Key Takeaways: 2022 Gartner Magic Quadrant for Security Service Edge appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. What to Expect at the Cyber Security & Cloud Congress North America on October 5 and 6What to Expect at the Cyber Security & Cloud Congress North America on October 5 and 6Cyber Security & Cloud Congress North America will cover two days of top-level content and thought leadership discussions looking at the Cyber Security & Cloud ecosystem. Solutions Review talks about what to expect and how to sign up. Who is TechEx Media? TechEx Media provides integrated marketing solutions incorporating three large-scale exhibitions and a suite […] The post What to Expect at the Cyber Security & Cloud Congress North America on October 5 and 6 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Basic Steps Intellectual Property-Driven Entities Need to Take for a Cyber-Secure FutureThe Basic Steps Intellectual Property-Driven Entities Need to Take for a Cyber-Secure FutureAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—Corey White, the CEO and co-founder of Cyvatar, shares insights on the steps companies in IP-focused sectors should take to ensure a cyber-secure future for themselves and their business. Growing businesses are attractive targets for cyber-criminals—that’s […] The post The Basic Steps Intellectual Property-Driven Entities Need to Take for a Cyber-Secure Future appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 3 Keys to Preventing Ransomware and Lateral Movement Threats3 Keys to Preventing Ransomware and Lateral Movement ThreatsAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Chad Skipper, the Global Security Technologist at VMware, shares insights on preventing ransomware and lateral movement threats. The proliferation of ransomware is sobering. In 2016, on average, a business fell victim to a ransomware attack every […] The post 3 Keys to Preventing Ransomware and Lateral Movement Threats appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 10 of the Best SIEM Systems for Enterprise Security10 of the Best SIEM Systems for Enterprise SecurityThe editors at Solutions Review have compiled the following list to spotlight some of the best SIEM systems for enterprise security to help companies across industries find the solutions for their needs. Security Information and Event Management can help bridge gaps in security monitoring, threat hunting, and incident response for businesses struggling to fill their […] The post 10 of the Best SIEM Systems for Enterprise Security appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.