Posts by Scott

How Fax Machines Refused To Die And Why Some Industries Still Rely On Them

This article explores why fax machines have survived long after most people expected them to disappear. It explains how legal acceptance, security perceptions, interoperability, cost, and deeply ingrained workflows have kept fax relevant in industries like healthcare, law, and government. The piece shows that fax persists not because of resistance to change, but because it continues to solve specific problems that modern technologies have not fully replaced.

The Most Impactful Computer Crimes In Digital History

This article explores the evolution of the most significant computer crimes in history, showing how cyber attacks grew from early experimental worms into highly organised operations capable of causing global financial, industrial, and political damage. It examines landmark incidents that reshaped cybersecurity by exposing weaknesses in software, human behaviour, and critical infrastructure, and explains how these events transformed cybercrime into a powerful force with real world consequences.

Hacker Who Leaked GTA 6 Sentenced to Life in Psychiatric Hospital

This article examines the series of hacks carried out by Arion Kurtaj leading up to and including the Grand Theft Auto VI leak, explaining how the attacks were executed, what data was exposed, and why they had such serious consequences. It also explores the legal and cybersecurity implications of the case, including why Kurtaj received an indefinite psychiatric hospital sentence, and what the incident reveals about modern cybercrime, corporate security weaknesses, and the blurred line between technical skill, intent, and accountability.

Why GPS Failure Would Break More Than Navigation

This article explains how GPS has become a hidden foundation for modern systems beyond navigation, including time synchronisation, communications, finance, transportation, and critical infrastructure. It explores the cascading consequences of GPS failure, why so many industries depend on it, and why alternatives and safeguards are increasingly important for resilience.

What Zero Day Vulnerabilities Really Are And Why They Matter

This article explains what zero-day vulnerabilities are, why they are dangerous, and how they are discovered and addressed. It explores how companies and developers work to reduce risk, the role of bug bounty programs, and why ethical hackers play an important part in improving security. The piece also highlights how vulnerabilities can sometimes drive positive change when responsibly disclosed and addressed.

Who Pays When Autonomous Vehicles Collide

This article explores how insurance liability and excess payments are handled when multiple autonomous vehicles are involved in a collision. It explains how fault is assessed between vehicle owners, manufacturers, software providers, and insurers, and examines the current state of legislation governing autonomous driving incidents. The piece also looks at how these frameworks are evolving as self-driving technology becomes more widespread.

Why Virtual And Augmented Reality Have Not Become Mainstream At Work

This article explores the technical, practical, and human factors that have slowed the adoption of virtual and augmented reality in everyday work environments. It explains how hardware limitations, software maturity, cost, comfort, workflow integration, and cultural readiness all play a role in keeping VR and AR from becoming standard workplace tools. The piece also examines where these technologies do show promise and what would need to change for them to move from experimental to truly mainstream.

How Much of the Ocean Remains Undiscovered

Despite centuries of exploration, the vast majority of the ocean remains largely unknown. This article explores how little of the seabed has been mapped, how many marine species are still undiscovered, and why extreme depth, pressure, darkness, and cost continue to limit exploration. It also examines the thousands of shipwrecks and aircraft believed to rest unseen on the ocean floor, and how currents, weather, and temperature shape what we are able to discover.

Understanding Stuxnet and the Birth of Cyber Warfare

This article explores the Stuxnet worm as the first known cyber weapon to cause real-world physical damage, detailing how it was designed, delivered, and deployed to sabotage Iran’s nuclear enrichment program. It explains the technical sophistication of the attack, including its use of multiple zero-day vulnerabilities, stolen digital certificates, and precise targeting of industrial control systems. The piece also examines why the attack was carried out for strategic rather than financial gain, who is believed to have been behind it, and how it reshaped global thinking around cyber warfare, critical infrastructure security, and the long-term consequences of state-sponsored cyber operations.

From Command Lines to Clickable Desktops

This article reflects on the transition from text-based command line computing to the visually rich desktop environments we use today. It explores how early computers relied on typed commands, how graphical interfaces made technology more approachable for everyday users, and how this shift changed the way people learned, worked, and interacted with computers.

Why Unpatched Internet Devices Are a Growing Security Risk

This article explains how internet connected devices become increasingly vulnerable when they are not kept up to date with the latest software or firmware. It outlines common risks such as exploitation of known vulnerabilities, loss of data, service disruption, and devices being used in large scale attacks without the owner’s knowledge. The article also discusses how likely these issues are to occur over time and emphasizes the importance of regular updates as a practical way to reduce exposure to real world threats.

How Long Fossil Fuels Can Power the Modern World

This article explores how much coal, oil, and natural gas the world currently uses each year and how long known reserves are likely to last at current consumption rates. It explains what will happen as fossil fuels become harder and more expensive to extract, how prices and energy habits are expected to change over time, and how societies are preparing for this transition. The article also looks ahead at large scale replacement energy sources and the importance of ongoing research and development to ensure a stable and sustainable energy future.

How We Stored and Viewed Photographs Over Time

A nostalgic look at how photographs have been captured, stored, and viewed across generations, tracing the journey from early physical processes to modern digital technologies and exploring how each shift reshaped the way we preserve and experience memories.

Understanding QRP in Amateur Radio

This article explains what QRP is in amateur radio, focusing on low-power operation and why it appeals to so many operators. It explores the history, technical challenges, portability, and philosophy behind QRP, highlighting how skill, efficiency, and thoughtful operation can achieve impressive communication with minimal power.

A Practical Guide to Living Off Grid and Bugging Out

This article provides a comprehensive, practical guide to living off-grid and bugging out for short or extended periods. It walks through the mindset, planning, skills, and resources required to safely disconnect from modern infrastructure and survive in the wilderness. From water, food, shelter, and security to mental resilience, legality, and exit strategies, it offers a realistic A–Z approach focused on self-reliance, sustainability, and informed decision-making rather than romanticised survival.

When Phone Numbers Lived in Our Heads

A reflective look at the shift from memorising phone numbers to relying on digital contact lists, exploring how convenience quietly replaced memory, and what that change reveals about connection, attention, and the subtle things we’ve left behind as technology took over.

The Forgotten Digital Music Format Called MiniDisc

This article revisits the MiniDisc era, explaining how the format worked, how people recorded and listened to music with it, and why it became a beloved but niche technology. It reflects on the cost, exclusivity, and unique experience that made MiniDisc memorable for those who were lucky enough to use it.

Proper Password Hygiene in the Modern Digital World

This article explains why strong password habits are essential today, covering best practices like long unique passwords, multi factor authentication, and protection against common attack methods. It outlines how attackers operate and why small changes in password complexity can dramatically improve security, while emphasizing practical steps individuals can take to stay safe both online and in everyday life.

Solid State Batteries And The Future Of Electric Vehicles

This article explores solid state battery technology and its potential to transform electric vehicles by improving safety, energy density, charging speed, and longevity. It explains how solid state batteries differ from current lithium ion designs, why they are difficult to manufacture at scale, and what breakthroughs are still needed. The piece also looks at the impact this technology could have on vehicle range, cost, and the broader transition to electric transportation.

How Unix And Linux Power The Modern World

This article explores how Unix and Linux quietly power much of the modern world, from internet infrastructure and cloud platforms to smartphones and critical industries. It highlights their reliability, scalability, and openness, and explains why even companies like Microsoft now rely heavily on Unix-like systems to support global technology.