3 Top VPN providers and which VPN to use

Khalid Alnajjar Security Leave a Comment

There are enormous reasons why you should use a VPN, including, but not limited to, protecting your privacy by hiding your browsing history from your ISP or local network, permitting access to some geo-blocked content (e.g. playing Pokémon Go before its officially released in your country), bypassing your ISP’s internet censorship, and many more. However, there is a tremendous number of VPN providers available …

How to connect iOS 10+ to Linux

Khalid Alnajjar iOS, Linux Leave a Comment

Apple have weakened the encryption of iOS. This update has caused many issues for Apple users, especially security related issues. Additionally, users with Linux OS were no longer able to connect and mount their iOS devices. In this blog post, I will focus on solving the later issue, i.e. connecting Apple devices with iOS 10+ to any Linux distribution. The solution will be an easy …

How to Connect Android 7 to Linux using USB

Khalid Alnajjar Android, Linux Leave a Comment

Recently, I have decided to shift entirely from using iPhone to Android, especially after my Xperia Z5 Premium received Nougat update. This is because I have had couple issues with my iPhone lately. Including but not limited to i) connecting iOS 10+ to Linux, ii) Apple decided to use weaker encryption on mobile, iii) VOIP applications treated as phone applications, …

How to Create an Outstanding Scientific Website

Khalid Alnajjar WordPress Leave a Comment

As a scientific researcher and blogger, I sometimes need to cite papers in my blog posts. Maybe list out my publications too. Managing citations and publications with text editors is extremely annoying and messy, not only for the publisher but also for the readers. Hence, the need to utilize some tools that facilitate scientific blogging. Additionally, applying for a scientific …

How to Play Pokemon Go in Winter

Khalid Alnajjar Games Leave a Comment

Pokémon Go is making many special deals for every occasion, e.g. Halloween, Thanksgiving and more recently Christmas and New Year. In addition to Pokémon Go events, 2nd generation Pokemon are added to the game, and here are the Pokémon you should be catching right now that have a 2nd-generation evolution. Despite all the interesting Pokemon updates, in many countries it …

9 Essential GNOME Shell Extensions for Every User

Khalid Alnajjar Linux Leave a Comment

Since I started using Debian as my primary OS, I felt how using Linux facilitated many of my digital activities. And yes, shifting from Windows to Linux wasn’t easy at first. However, after few weeks I began to get the hang of using and customizing it to suit my needs -from utilizing the command terminal to changing the look of my desktop environment-. In this article I will …

Insert 200+ million rows into MongoDB in minutes

Khalid Alnajjar Big Data Leave a Comment

How to import 200+ million rows into MongoDB in minutes MongoDB is a great document-oriented no-sql database. The interest in using MongoDB is increasing as it allows storing documents of dynamic schemas in a json-like format. Also, MongoDB is good for handling big data while providing high availability and high insertion rates. This post will focus on how to import and insert huge data rapidly into MongoDB. The …

Access your Raspberry Pi Globally Using Tor

Khalid Alnajjar Raspberry Pi, Security Leave a Comment

Few days back, I needed to access my raspberry pi remotely from anywhere. I have achieved this by using a hidden SSH Tor service. Tor Project, The Onion Router, is a free software that provides anonymous communications over the internet. This method is not limited to raspberry pi, and it can be applied on any computer you can install Tor on. Kindly note, this …

How to send encrypted emails using Enigmail

Khalid Alnajjar Security Leave a Comment

Have you ever wanted to send sensitive information by email securely? Regularly, emails are sent in plain-text, which allows hackers and anyone with an unauthorized access to your email to read your emails easily. Hence, encrypting your sensitive emails adds an additional secure layer to prevent such intrusions. So, how to encrypt your emails? There are multiple ways to achieve that but I will be explaining the …