penguinist's Member Page

» penguinist has posted 96 stories.

  penguinist's newswire posting history
  1. World's first hack using DNA
  2. Hackers breach dozens of voting machines brought to conference
  3. A look at OpenSUSE based Gecko Linux
  4. I made my own wearable computer with a Raspberry Pi, and it was almost too easy
  5. CIA has hacking tools, says Wikileaks
  6. Encryption leaves authorities 'not in a good place': Former US intelligence chief
  7. The Dark Web is the place to go to find bugs before public disclosure
  8. 2018 Toyota Camry to feature Linux-based infotainment system in the US
  9. 'Accidental hero' halts ransomware attack and warns: this is not over
  10. NSA-created cyber tool spawns global attacks — and victims include Russia
  11. Raspberry Pi Surges To 3rd Best Selling Computer Of All Time Surpassing The Commodore 64
  12. Installing Fedora on the Raspberry Pi 3
  13. F.C.C., in Potential Sign of the Future, Halts New Data Security Rules
  14. Video calls for Signal now in public beta
  15. EFF calling for more encryption
  16. Lenovo Yoga Book 2-in-1 PC With Chrome OS Coming In 2017
  17. Here’s The Evidence Russia Hacked The Democratic National Committee
  18. FBI Gains New Hacking Powers
  19. Deutsche Telekom Says Cyber Attack Hits 900,000 Customers
  20. Build Your Own Computer
  21. Want to Know if the Election was Hacked? Look at the Ballots
  22. Microsoft Warns Bash on Windows Users About Linux File Changes
  23. Google’s neural networks invent their own encryption
  24. Argo Project Developing OS Technology for Exascale
  25. Smallest. Transistor. Ever.
  26. Taking down the internet: possible but how probable?
  27. Blockchain Summit Day Two: End-Of-Conference Highlights From Shanghai
  28. How To Get “Hollywood Hacker Feel” In Your Linux Command Line?
  29. The Feds Will Soon Be Able to Legally Hack Almost Anyone
  30. Long-Secret Stingray Manuals Detail How Police Can Spy on Phones
  31. White House appoints first Federal Chief Information Security Officer
  32. More Than 40% Of Attacks Abuse SSL Encryption
  33. Skype for Windows Phone walked behind shed, shot heard
  34. Fuchsia is Google's latest operating system
  35. Android bug fear in 900 million phones
  36. Protect yourself from cyberattacks
  37. PLC-Blaster Worm Targets Industrial Control Systems
  38. Never Trust a Found USB Drive, Black Hat Demo Shows Why
  39. Top 6 Desktop Linux Blunders
  40. Raspberry Pi Zero Becomes Mighty Miniature Minecraft Machine
  41. Study: Encryption use increase largest in 11 years
  42. Which browser is best for battery life: We test Edge vs. Chrome vs. Opera vs. Firefox
  43. The Internet Without Connection, Free Endless OS For Emerging Markets
  44. Updating code can mean fewer security headaches
  45. House Poised to Advance Privacy and Defend Encryption…If Allowed to Vote
  46. Everything We Know About How the FBI Hacks People
  47. How to empty your bank's vault with a few clicks and lines of code
  48. It's trivially easy to identify you based on records of your calls and texts
  49. Enterprises Bullish On 100 GbE, Cloud, And SDN
  50. Security researcher arrested for disclosing US election website vulnerabilities
  51. How to Backup or Clone a Partition in Linux
  52. Linus On Linux - Two Videos
  53. How to Conduct Internal Penetration Testing
  54. NIST readies 'post-quantum' crypto competition
  55. A DIY guide to the Aquaris M10 Ubuntu Edition tablet
  56. Changing your password regularly is a terrible idea, and here's why
  57. House Passes Bill to Sabotage Net Neutrality
  58. How Canadian Police Intercept and Read Encrypted BlackBerry Messages
  59. Congress's New Encryption Bill Just Leaked, And It's As Bad As Experts Imagined
  60. The Best Things in Life are Free
  61. Torvalds prepared to spend next 25 years helping Linux conquer the desktop
  62. A Government Error Just Revealed Snowden Was the Target in the Lavabit Case
  63. Inside the Starburst-sized box that could save the Internet
  64. Secure Messaging Scorecard
  65. US government pushed tech firms to hand over source code
  66. How to foil a bank heist
  67. How the FBI will lose its iPhone fight, thanks to 'West Coast Law'
  68. Best Smart TV OS: Android TV vs Firefox TV vs Tizen vs WebOS
  69. Mozilla Jumps On IoT Bandwagon
  70. Latest attack against TLS shows the pitfalls of intentionally weakening encryption
  71. RSA president slams crypto backdoors as useful only against petty criminals
  72. Odroid-C2 Released
  73. Raspberry Pi 3 With WiFi And Bluetooth
  74. Meizu PRO 5 Ubuntu Edition available for pre-order now
  75. Ubuntu Phone to Add Fingerprint Unlocking
  76. CVE-2015-7547: glibc getaddrinfo stack-based buffer overflow
  77. Mandated encryption backdoors? Such a bad idea, says cybersecurity agency
  78. New Raspberry Pi 2 Rival supports 4K Video
  79. Meaning of Convergence, Exploit Excludes Linux
  80. Crypto flaw was so glaring it may be intentional eavesdropping backdoor
  81. Google lays bare security flaws in anti-malware product with 250 million users
  82. NSA Hacker Chief Explains How to Keep Him Out of Your System
  83. Why did Linux Foundation cut independent board seats?
  84. Announcing Rust 1.6
  85. Analysis and Exploitation of a Linux Kernel Vulnerability (CVE-2016-0728)
  86. A Bitcoin Believer’s Crisis of Faith
  87. It's Elementary My Dear, Watson!
  88. US Intelligence director’s personal e-mail, phone hacked
  89. My Linux wish list for 2016 is just one item long
  90. Toyota Takes Tech From Ford
  91. Desperately seeking Satoshi Nakamoto
  92. ROS, the Robot Operating System, Is Growing Faster Than Ever, Celebrates 8 Years
  93. Adobe updates Flash for Linux
  94. Better Than a Quad-Head Display: My Adventures with "4K" 2160p and Linux
  95. Gems from Southeast LinuxFest
  96. Fedora 18 is go for release