penguinist's Member Page

» penguinist has posted 92 stories.

  penguinist's newswire posting history
  1. CIA has hacking tools, says Wikileaks
  2. Encryption leaves authorities 'not in a good place': Former US intelligence chief
  3. The Dark Web is the place to go to find bugs before public disclosure
  4. 2018 Toyota Camry to feature Linux-based infotainment system in the US
  5. 'Accidental hero' halts ransomware attack and warns: this is not over
  6. NSA-created cyber tool spawns global attacks — and victims include Russia
  7. Raspberry Pi Surges To 3rd Best Selling Computer Of All Time Surpassing The Commodore 64
  8. Installing Fedora on the Raspberry Pi 3
  9. F.C.C., in Potential Sign of the Future, Halts New Data Security Rules
  10. Video calls for Signal now in public beta
  11. EFF calling for more encryption
  12. Lenovo Yoga Book 2-in-1 PC With Chrome OS Coming In 2017
  13. Here’s The Evidence Russia Hacked The Democratic National Committee
  14. FBI Gains New Hacking Powers
  15. Deutsche Telekom Says Cyber Attack Hits 900,000 Customers
  16. Build Your Own Computer
  17. Want to Know if the Election was Hacked? Look at the Ballots
  18. Microsoft Warns Bash on Windows Users About Linux File Changes
  19. Google’s neural networks invent their own encryption
  20. Argo Project Developing OS Technology for Exascale
  21. Smallest. Transistor. Ever.
  22. Taking down the internet: possible but how probable?
  23. Blockchain Summit Day Two: End-Of-Conference Highlights From Shanghai
  24. How To Get “Hollywood Hacker Feel” In Your Linux Command Line?
  25. The Feds Will Soon Be Able to Legally Hack Almost Anyone
  26. Long-Secret Stingray Manuals Detail How Police Can Spy on Phones
  27. White House appoints first Federal Chief Information Security Officer
  28. More Than 40% Of Attacks Abuse SSL Encryption
  29. Skype for Windows Phone walked behind shed, shot heard
  30. Fuchsia is Google's latest operating system
  31. Android bug fear in 900 million phones
  32. Protect yourself from cyberattacks
  33. PLC-Blaster Worm Targets Industrial Control Systems
  34. Never Trust a Found USB Drive, Black Hat Demo Shows Why
  35. Top 6 Desktop Linux Blunders
  36. Raspberry Pi Zero Becomes Mighty Miniature Minecraft Machine
  37. Study: Encryption use increase largest in 11 years
  38. Which browser is best for battery life: We test Edge vs. Chrome vs. Opera vs. Firefox
  39. The Internet Without Connection, Free Endless OS For Emerging Markets
  40. Updating code can mean fewer security headaches
  41. House Poised to Advance Privacy and Defend Encryption…If Allowed to Vote
  42. Everything We Know About How the FBI Hacks People
  43. How to empty your bank's vault with a few clicks and lines of code
  44. It's trivially easy to identify you based on records of your calls and texts
  45. Enterprises Bullish On 100 GbE, Cloud, And SDN
  46. Security researcher arrested for disclosing US election website vulnerabilities
  47. How to Backup or Clone a Partition in Linux
  48. Linus On Linux - Two Videos
  49. How to Conduct Internal Penetration Testing
  50. NIST readies 'post-quantum' crypto competition
  51. A DIY guide to the Aquaris M10 Ubuntu Edition tablet
  52. Changing your password regularly is a terrible idea, and here's why
  53. House Passes Bill to Sabotage Net Neutrality
  54. How Canadian Police Intercept and Read Encrypted BlackBerry Messages
  55. Congress's New Encryption Bill Just Leaked, And It's As Bad As Experts Imagined
  56. The Best Things in Life are Free
  57. Torvalds prepared to spend next 25 years helping Linux conquer the desktop
  58. A Government Error Just Revealed Snowden Was the Target in the Lavabit Case
  59. Inside the Starburst-sized box that could save the Internet
  60. Secure Messaging Scorecard
  61. US government pushed tech firms to hand over source code
  62. How to foil a bank heist
  63. How the FBI will lose its iPhone fight, thanks to 'West Coast Law'
  64. Best Smart TV OS: Android TV vs Firefox TV vs Tizen vs WebOS
  65. Mozilla Jumps On IoT Bandwagon
  66. Latest attack against TLS shows the pitfalls of intentionally weakening encryption
  67. RSA president slams crypto backdoors as useful only against petty criminals
  68. Odroid-C2 Released
  69. Raspberry Pi 3 With WiFi And Bluetooth
  70. Meizu PRO 5 Ubuntu Edition available for pre-order now
  71. Ubuntu Phone to Add Fingerprint Unlocking
  72. CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow
  73. Mandated encryption backdoors? Such a bad idea, says cybersecurity agency
  74. New Raspberry Pi 2 Rival supports 4K Video
  75. Meaning of Convergence, Exploit Excludes Linux
  76. Crypto flaw was so glaring it may be intentional eavesdropping backdoor
  77. Google lays bare security flaws in anti-malware product with 250 million users
  78. NSA Hacker Chief Explains How to Keep Him Out of Your System
  79. Why did Linux Foundation cut independent board seats?
  80. Announcing Rust 1.6
  81. Analysis and Exploitation of a Linux Kernel Vulnerability (CVE-2016-0728)
  82. A Bitcoin Believer’s Crisis of Faith
  83. It's Elementary My Dear, Watson!
  84. US Intelligence director’s personal e-mail, phone hacked
  85. My Linux wish list for 2016 is just one item long
  86. Toyota Takes Tech From Ford
  87. Desperately seeking Satoshi Nakamoto
  88. ROS, the Robot Operating System, Is Growing Faster Than Ever, Celebrates 8 Years
  89. Adobe updates Flash for Linux
  90. Better Than a Quad-Head Display: My Adventures with "4K" 2160p and Linux
  91. Gems from Southeast LinuxFest
  92. Fedora 18 is go for release