profile card
Rohan Pinto
#Father, #Identity_Aficionado, #InfoSec_Professional
Ξ #CTO #Founder @1Kosmos
Mississauga, Ontario, CANADA

A “cryptography geek,” Rohan has been the go-to security and identity management maven for three decades. He has founded several businesses that take advantage of advancements in blockchain and identity management — and are responsible for many in their own right — and continue to show the world the incredible potential of well-implemented cryptographic systems.

Zero-to-Hero Full-Stack DApp Development in 10 MinutesZero-to-Hero Full-Stack DApp Development in 10 MinutesA guide for beginners to crypto marketing.A guide for beginners to crypto marketing.Testnet: The Complete GuideTestnet: The Complete GuideGitHub repositories to learn Web3 developmentGitHub repositories to learn Web3 developmentGuide to Cosmos EcosystemGuide to Cosmos EcosystemHow to wrap fungible tokens into NFT (aka minting Gift Cards) using Solidity?How to wrap fungible tokens into NFT (aka minting Gift Cards) using Solidity?Another Airdrop! How to get the Valas Airdrop using Geist.Finance!Another Airdrop! How to get the Valas Airdrop using Geist.Finance!Diving deeper into Cellframe: Python SDK & Plugins pt. 1Diving deeper into Cellframe: Python SDK & Plugins pt. 1How to Choose the Right Crypto Tax Software, Part 1: Review Exchange CoverageHow to Choose the Right Crypto Tax Software, Part 1: Review Exchange CoverageUnderstanding Solidity by exampleUnderstanding Solidity by example

Sorting Two Lists Together According to The Order of One List in PythonSorting Two Lists Together According to The Order of One List in PythonWe may use two lists to store the values of two properties of a list of elements in Python. Under such data structure arrangement, when we need to sort the properties from one list, we may want to also make sure the other list will be also re-ordered following the same order as the first Read more The post Sorting Two Lists Together According to The Order of One List in Python is from SysTutorials. Synchronizing Thunderbird Calendar with Apple iCloud CalendarSynchronizing Thunderbird Calendar with Apple iCloud CalendarThunderbird is a nice email client and calendar management software. iCloud calendar is the native calendar cloud service in Apple devices such as iPhone. So far there is no native support from Thunderbird to support iCloud calendar, excepting reading the read-only public iCloud calendars which has privacy concerns as long as lacks of editing functionalities. Read more The post Synchronizing Thunderbird Calendar with Apple iCloud Calendar is from SysTutorials. SPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How toSPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How toEmail sender fraud is an annoying problem. Malicious email senders send spam emails with email senders that are under non-authorized domain names. This may affect the reputation of the domains used by the fraud sender. On another hand, lots emails will be rejected and reverted back, which causes lots additional work to the domain administrators. Read more The post SPF, DKIM and DMARC to Stop Email Sender Fraud: Intro and How to is from SysTutorials. Running Ephemeral Docker Containers – Automatically Remove a Docker Container After Running ItRunning Ephemeral Docker Containers – Automatically Remove a Docker Container After Running ItDocker is a convenient tool to quick create containers from different Linux images. If we use the common way to start a docker container like docker run image bash, after the the process exists, the container is still stored there. That is, the docker container persists after it has exited. Sometimes, we would like to Read more The post Running Ephemeral Docker Containers – Automatically Remove a Docker Container After Running It is from SysTutorials. Configuring Fonts for Thunderbird snap to Display Fonts NicelyConfiguring Fonts for Thunderbird snap to Display Fonts Nicelysnap is a software app bundle with dependencies included so that it can works in different Linux distributions. However, as most other software, snap has compatiblity issues. An app in the snap format is not 100% the same and compatible with the native version. One of the problem I find is that Thunderbird from snap Read more The post Configuring Fonts for Thunderbird snap to Display Fonts Nicely is from SysTutorials. Starting Page Number from the Second Page in MS WordStarting Page Number from the Second Page in MS WordFor document, we may use the first page as the title page. Then the page number 1 should start from the second page. In this post, we will look at how to make MS Word count the page number from the second page. That is, making word treat the second page as page number 1. Read more The post Starting Page Number from the Second Page in MS Word is from SysTutorials. GNONE 3 Screenshot Keyboard ShortcutsGNONE 3 Screenshot Keyboard ShortcutsGNONE 3 provides screenshot tools and utils and also provides keyboard shortcuts which are convenient and quick to use. With the GNOME 3 screenshot keyboard shortcuts, users can make screenshots without having to open the Screenshot app. In general, there are 2 major categories of screenshot shortcuts: those to save the screenshot as a file, Read more The post GNONE 3 Screenshot Keyboard Shortcuts is from SysTutorials. Linux Kernel 4.19.178 ReleaseLinux Kernel 4.19.178 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 4.19.178 Release. Linux 4.19.178 Release contains 248 changes, patches or new features. In total, there are 239,909 lines of Linux source code changed/added in Linux 4.19.178 release compared to Linux 4.19 release. To view the source code of Linux 4.19.178 kernel release online, Read more The post Linux Kernel 4.19.178 Release is from SysTutorials. Linux Kernel 4.14.223 ReleaseLinux Kernel 4.14.223 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 4.14.223 Release. Linux 4.14.223 Release contains 176 changes, patches or new features. In total, there are 277,921 lines of Linux source code changed/added in Linux 4.14.223 release compared to Linux 4.14 release. To view the source code of Linux 4.14.223 kernel release online, Read more The post Linux Kernel 4.14.223 Release is from SysTutorials. Linux Kernel 5.4.102 ReleaseLinux Kernel 5.4.102 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 5.4.102 Release. Linux 5.4.102 Release contains 338 changes, patches or new features. In total, there are 160,715 lines of Linux source code changed/added in Linux 5.4.102 release compared to Linux 5.4 release. To view the source code of Linux 5.4.102 kernel release online, Read more The post Linux Kernel 5.4.102 Release is from SysTutorials. Linux Kernel 4.9.60 ReleaseLinux Kernel 4.9.60 ReleaseThis post summarizes Linux Kernel new features, bugfixes and changes in Linux 4.9.60 Release. Linux 4.9.60 Release contains 24 changes, patches or new features. In total, there are 64,224 lines of Linux source code changed/added in Linux 4.9.60 release compared to Linux 4.9 release. To view the source code of Linux 4.9.60 kernel release online, Read more The post Linux Kernel 4.9.60 Release is from SysTutorials. Linux Kernel: xt quota: report initial quota value instead of current value to userspaceLinux Kernel: xt_quota: report initial quota value instead of current value to userspaceThis change “xt_quota: report initial quota value instead of current value to userspace” (commit 49daf6a) in Linux kernel is authored by Changli Gao <xiaosuo [at] gmail.com> on Fri Jul 23 14:07:47 2010 +0200. Description of “xt_quota: report initial quota value instead of current value to userspace” The change “xt_quota: report initial quota value instead of Read more The post Linux Kernel: xt_quota: report initial quota value instead of current value to userspace is from SysTutorials. Reading JSON from URL in RReading JSON from URL in RR is good at analyzing data. Many data are provided as JSON from RESTful APIs with an URL. R natively support many data format. For JSON, we can use some libraries. For reading JSON from URL, we can use the “jsonlite” package. In this example, we use an example of fetching BTC prices of last Read more The post Reading JSON from URL in R is from SysTutorials. Reading Excel xls/xlsx Files in RReading Excel xls/xlsx Files in RMany useful data are stored in Excel xls or xlsx format files. R is good at doing analysis on top of data. We would then need to import the data to R by reading the xls/xlsx files to be R data frames. In this post, we check how to import data from Excel files to Read more The post Reading Excel xls/xlsx Files in R is from SysTutorials. 3 Ways of .odt to .txt File Conversion in Command Line in Linux3 Ways of .odt to .txt File Conversion in Command Line in LinuxThe Open Document .odt files can contain rich formats for the content. However, some times a plain text file is more handy. We may convert .odt files to plain text files for such needs. In this post, we discuss 3 ways of how to convert .odt files to .text files in command line in Linux. Read more The post 3 Ways of .odt to .txt File Conversion in Command Line in Linux is from SysTutorials. .docx/.doc to .odt File Conversion in Command Line in Linux.docx/.doc to .odt File Conversion in Command Line in LinuxWord .docx and .doc files are common for documents commonly generated by MS Word software. We would like to convert them to the more open ODF Open Document .odt files for various cases. This can be done by GUI software tools. If we have a set of many .docx/.doc files, it will be handy if Read more The post .docx/.doc to .odt File Conversion in Command Line in Linux is from SysTutorials. Configuring Eclipse to Show Git Revision Information Similar to Git Blame in EditorConfiguring Eclipse to Show Git Revision Information Similar to Git Blame in EditorEclipse can work well with Git. We discussed Configuring Eclipse to Highlight Changed Lines Compared to Git Commit before. Eclipse can also show the revision information for lines of code (from git blame) which is useful to understand why some lines are added in the context of previous revisions including the lines of code. Eclipse Read more The post Configuring Eclipse to Show Git Revision Information Similar to Git Blame in Editor is from SysTutorials. 2 Ways of Modifying macOS Keyboard’s Right Option to Control for Mac Pro2 Ways of Modifying macOS Keyboard’s Right Option to Control for Mac ProFor heavy Terminal/Shell/command line users, the Control key is a very frequently used key. However, in Mac Pro keyboard, there is only a single left Control key for some models. This cause quite some inconvenience. In this post, we will go through how to configure/remap the keys to “create” a right Control key. Remap keys Read more The post 2 Ways of Modifying macOS Keyboard’s Right Option to Control for Mac Pro is from SysTutorials. Converting Hex to ASCII Using xxdConverting Hex to ASCII Using xxdStrings are commonly encoded as hexadecimal (hex) strings for various purposes. Hence, it is also common to convert hex strings to its original strings such as an ASCII string. Hex to ASCII string conversion can be done programmatically in many languages. In command line, we can use xxd to convert hex to ASCII string. This Read more The post Converting Hex to ASCII Using xxd is from SysTutorials. Release Notes For Linux v2.0Release Notes For Linux v2.0This is the release notes for linux release v2.0 (source code: linux-2.0.tar.gz) with format adjusted by removing/replacing tabs/spaces/new lines/formatting marks. This notes document can give us an understanding of the early development of the Linux kernel. The original ASCII formatted version is at the end of this post. Intro This document contains a list of Read more The post Release Notes For Linux v2.0 is from SysTutorials.

Deciphering The Magic Behind CIC ChainDeciphering The Magic Behind CIC ChainBlockchain as a Tool — HyperledgerBlockchain as a Tool — HyperledgerBenchmark blockchain using Hyperledger CaliperBenchmark blockchain using Hyperledger CaliperHyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric: How is it Different from Other Blockchains?Hyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric performance benchmarking using Hyperledger CaliperHyperledger Fabric v2.X Monitoring Using PrometheusHyperledger Fabric v2.X Monitoring Using PrometheusGetting started with - Hyperledger BesuGetting started with - Hyperledger Besu

OWNR Wallet Airdrop is live!OWNR Wallet Airdrop is live!Build Your Empire In SilenceBuild Your Empire In SilenceThe five steps to amassing a fortuneContinue reading on Coinmonks »How Could Regulation of Crypto Change Its Value and Role?How Could Regulation of Crypto Change Its Value and Role?Earlier this week, we talked about Michael Saylor’s take on the impact of Ethereum’s transition to proof-of-stake verification, a massive…Continue reading on Coinmonks »Who Owns Ethereum Now? The Dark Side of Proof-of-Stake ProtocolsWho Owns Ethereum Now? The Dark Side of Proof-of-Stake ProtocolsWith the attention on energy usage reduction, what will become of decentralization?Continue reading on Coinmonks »Top Signs That You Might Have A Crypto AddictionTop Signs That You Might Have A Crypto AddictionAll Been Crypto — Week 25 Sep 2022All Been Crypto — Week 25 Sep 2022ETH Merge Successful, Blockchain terms you need to knowETH Merge Successful, Blockchain terms you need to knowThe Ethereum Merge -misconceptions about the MergeThe Ethereum Merge -misconceptions about the MergeThe Merge: What does Ethereum’s switch from PoW to PoS mean for the environment?The Merge: What does Ethereum’s switch from PoW to PoS mean for the environment?Top 3 Cryptos With Massive Potential to Buy in 2022Top 3 Cryptos With Massive Potential to Buy in 2022CardanoContinue reading on Coinmonks »

Identity Management and Information Security News for the Week of September 23; Updates from Sentra, Strata Identity, Racktop Systems, and MoreIdentity Management and Information Security News for the Week of September 23; Updates from Sentra, Strata Identity, Racktop Systems, and MoreThe editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of September 23. This curated list features identity management and information security vendors such as Sentra, Strata Identity, Racktop Systems, and more. Keeping tabs on all the most relevant identity management and information […] The post Identity Management and Information Security News for the Week of September 23; Updates from Sentra, Strata Identity, Racktop Systems, and More appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. 5 Priorities for a Modern IT Security Team5 Priorities for a Modern IT Security TeamAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Christopher Prewitt of Inversion6 takes us through the five pillars every IT security team should have to hold up their castle in the cloud. Like a medieval castle, protecting our IT assets used to be […] The post 5 Priorities for a Modern IT Security Team appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Identity Management and Information Security News for the Week of September 9; Updates from CyberRes, Open Raven, Splunk, and MoreIdentity Management and Information Security News for the Week of September 9; Updates from CyberRes, Open Raven, Splunk, and MoreThe editors at Solutions Review have curated this list of the most noteworthy identity management and information security news for the week of September 9. This curated list features identity management and information security vendors such as CyberRes, Open Raven, Splunk, and more. Keeping tabs on all the most relevant identity management and information security news […] The post Identity Management and Information Security News for the Week of September 9; Updates from CyberRes, Open Raven, Splunk, and More appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Best 23 Data Security Platforms to Consider in 2022The Best 23 Data Security Platforms to Consider in 2022As data security emerges as the next field to tackle in InfoSec, the editors at Solutions Review examine the vendors and stand-alone platforms already ahead of the competition. These are the best data security platforms to consider in 2022. Data security, according to IBM, is the practice of protecting digital information from unauthorized access, corruption, […] The post The Best 23 Data Security Platforms to Consider in 2022 appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Identity Management and Information Security News for the Week of September 2; Updates from Blumira, Dashlane, LastPass, and MoreIdentity Management and Information Security News for the Week of September 2; Updates from Blumira, Dashlane, LastPass, and MoreThe editors at Solutions Review have curated this list of the most noteworthy identity management and information security news items for the week of September 2. This curated list features identity and information security vendors such as Blumira, Dashlane, LastPass, and more. Keeping tabs on all the most relevant identity management and information security news […] The post Identity Management and Information Security News for the Week of September 2; Updates from Blumira, Dashlane, LastPass, and More appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. How to Build a Security Operations Center (SOC) on a BudgetHow to Build a Security Operations Center (SOC) on a BudgetAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Matthew Warner of Blumira takes you through the ins and outs of security operations centers, and how to build one on a budget. A security operations center (SOC) is expensive. From the technology utilized to […] The post How to Build a Security Operations Center (SOC) on a Budget appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Why Multi-Cloud Doesn’t Mean Clear Skies Ahead for Security TeamsWhy Multi-Cloud Doesn’t Mean Clear Skies Ahead for Security TeamsAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Steve Riley of Netskope soars into cloud security, and lays out why multi-cloud doesn’t mean clear skies ahead for security teams. Every company today is a multi-cloud company. Once, that meant something as simple as […] The post Why Multi-Cloud Doesn’t Mean Clear Skies Ahead for Security Teams appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Inoculate Your Company Against Security Data Gaps to Develop Cyber ImmunityInoculate Your Company Against Security Data Gaps to Develop Cyber ImmunityAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories— Arti Raman of Titaniam breaks down critical points of discussion on data security, and why your company needs to develop a strategy for cyber immunity. Protecting sensitive customer data, or personally identifiable information (PII), is […] The post Inoculate Your Company Against Security Data Gaps to Develop Cyber Immunity appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. Identity Management and Information Security News for the Week of August 19; Updates from Cerby, SailPoint, Transmit Security, and MoreIdentity Management and Information Security News for the Week of August 19; Updates from Cerby, SailPoint, Transmit Security, and MoreThe editors at Solutions Review have curated this list of the most noteworthy identity management and information security news items for the week of August 19. This curated list features identity and information security vendors such as Cerby, SailPoint, Transmit Security, and more. Keeping tabs on all the most relevant identity management and information security […] The post Identity Management and Information Security News for the Week of August 19; Updates from Cerby, SailPoint, Transmit Security, and More appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors. The Costa Rica Ransomware Attacks: The Implications of Cyberattacks on Critical InfrastructureThe Costa Rica Ransomware Attacks: The Implications of Cyberattacks on Critical InfrastructureAs part of Solutions Review’s Premium Content Series—a collection of contributed columns written by industry experts in maturing software categories—JP Perez-Etchegoyen, the CTO of Onapsis, offers insights into the implications that recent cyber-attacks in Costa Rica might have on critical infrastructure security strategies.  It’s been several months since Costa Rica officially declared a state of […] The post The Costa Rica Ransomware Attacks: The Implications of Cyberattacks on Critical Infrastructure appeared first on Best Information Security SIEM Tools, Software, Solutions & Vendors.