Skip to content

The Good, The Bad and The Ugly Of OpenClaw

It is certain that OpenClaw(formerly Moltbot, Clawdbot) has some merits to it, but is there a way to use it while also keeping your data safe? This is the question I think about every time it is mentioned. Let’s first go over what OpenClaw is and then discuss its upsides and downsides.

OpenClaw (formerly Clawdbot, Moltbot, and Molty) is a free and open-source autonomous artificial intelligence agent that can execute tasks via large language models (LLMs), using messaging platforms as its main user interface.

In layman’s terms, “it’s an LLM that can control your computer.” It can run scripts, execute commands on terminal, access and edit your files, read them, organize them etc. It sounds fantastic and sounds like it was out of a sci-fi movie. Let’s briefly discuss what it can do for us and how it can make our life easier.

Read More »The Good, The Bad and The Ugly Of OpenClaw

Understanding Log4Shell -A Log4J Zero-Day Exploit

I am sure If you’re interested enough to read this blog, you are familiar with the zero-day exploit discovered recently in the log4j library which allows remote code execution. I believe we can agree that it is the most dangerous type of vulnerability. In this post, we’ll examine which applications are vulnerable, how this exploit works (with a demo application), and what actions you can take to protect yourself.

Read More »Understanding Log4Shell -A Log4J Zero-Day Exploit

Lexorank — Managing Sorted Tables With Ease

Sorting data efficiently has always been a challenging task in computer science but there is also another challenge you will encounter after you tackle the sorting. Keeping your data sorted while updating it.

Imagine having a CONTENT table that stores thousands of contents and you allow content management users to manipulate the order of the contents. For example, a cms user might move content from the 5002nd row to the 13th row. To provide this feature, there are a couple of options you can choose from.

Read More »Lexorank — Managing Sorted Tables With Ease

Basic Hystrix Circuit Breaker Implementation

Circuit Breakers are one of the best tools in our toolbox to use while creating a backend structure with dependent modules. In this post, I will try to set up a basic Hystrix Circuit Breaker example and demonstrate some different configurations.

For demonstrating this concept I’ve created two Spring Boot applications called producer and consumer. The producer returns an integer counter and increases the value after each request but when the counter is between 5 and 20 it will wait for 5000 ms before returning the counter.

Read More »Basic Hystrix Circuit Breaker Implementation

Run Android Apps In Sandbox For Privacy [With Island]

While Whatsappocalypse continues to grow at a rapid pace I’ve decided to take it to the next level and help you pay attention to a different aspect of mobile privacy. Many apps we’re using are collecting information about our devices and what’s in them. This might sound less creepy than WhatsApp spying on your chat but I can assure you it is not in the slightest way less important. I am talking about location, installed applications, device name, device model, etc. It might not feel very important but how would you feel if someone grabs your phone and views a list of installed applications, photos, downloaded files, and whatnot. But there is an option like Run Android Apps In Sandbox!

Read More »Run Android Apps In Sandbox For Privacy [With Island]