Do you wish there was a more secure option for sending text messages and even making calls from your phone? Wouldn't it be great if that option utilized end-to-end encryption to ensure that your communications were entirely protected? Well, that option exists in the form of Signal.
This tutorial shows you how to run programs at a specific time or in a given interval on Ubuntu by using the crontab. In this example, we will set up a backup job with the tar command to run once a week.
My last few articles have described building a pretty sophisticated password generator, except for one thing: I never quite got to the point of scrambling the end result to add a second level of randomness. I sidestepped the issue by saying it was an exercise for the reader, but in fact, it's a pretty interesting problem, so let's look at it here.
The latest wpa_supplicant package for Fedora 28 includes compile-time support for PMF (Protected Management Frames). This is a good thing, as it protects against a set of WiFi replay attacks. However, a small number of users reported WiFi connectivity problems after an upgrade to Fedora 28.
LimeSurvey is a free and an open source online survey application written in PHP and uses a MySQL or PostgreSQL database. In this tutorial, we will learn how to install LimeSurvey on Ubuntu 18.04 LTS (Bionic Beaver) server.
Many times it happens that you feel the need of knowing the IP address of your device. Following are the four methods through which you can find the IP address of your device.
To provide an insight into the quality of software available for Linux, we have compiled a list of 8 best free password managers. Hopefully, there will be something of interest for anyone wanting to automate the process of entering passwords and other data, and save the hassle of remembering multiple passwords.
The L1 Terminal Fault (L1TF) affects Intel processors and thereby Linux systems. Learn what this vulnerability is all about and what Linux users should do about it.
GNOME has been my favorite desktop environment for quite some time. While I always make it a point to check out other environments from time to time, there are some aspects of the GNOME desktop that are hard to live without. While there are many great desktop environments out there, GNOME feels like home to me. Here are some of the features I enjoy most about GNOME. read more
Both adult and kid hackers demonstrated at DEF CON how the hackable voting machine may be the least of our worries in the 2018 elections.
Linux command line offers several tools for user management (some of which we've already discussed). One such utility is chage, which lets you tweak password expiry information.
11-year-old Emmett Brewer is too young to vote, but it turned out that he’s not too young to learn how to change election results on a replica of Florida’s state website… in under 10 minutes, mind you, as the Voting Village announced on Friday:
If you have any experience with programming or just altering config files, I'm sure you've been dumbstruck by how one change you've made along the line affects the whole project. Identifying and isolating the problem without a version control system is often time- and energy-intensive, involving retracing your steps and checking all changes made before the unwanted behavior first occurred. A version control system is designed explicitly to make that process easier and provide readable comparisons between versions of text.
News briefs for August 14, 2018.
I’m excited to announce that Amy Keating will be joining us in September as Mozilla’s new General Counsel. Amy will work closely with me to help scale and reinforce our legal capabilities. She will be responsible for all aspects of Mozilla’s legal work including product counseling, commercial contracts, licensing, privacy issues and legal support to the Mozilla Foundation.
Not that we needed it, but there's more evidence today that Intel has been playing fast and loose with security in order to stay ahead of the fast-chip competition. Today it was announced that there are three more Meltdown/Spectre-type Intel chip exploits. The vulnerability affects Intel's desktop, workstation, and server CPUs.
Wanting some Linux love, but just can't let that Windows 10 desktop go? Come this way... Linux lovers have received a double load of delight this week with the emission of the 4.18 kernel and a refresh of Windows-wannabe Zorin OS.…
Prometheus is an open source monitoring system that allows you to collect metrics from any configured target system. Prometheus implements a multi-dimensional data-model with powerful queries, great visualization, precise alerting, and comes with many integrations.
This series will explain the purpose of git, how to clone GitHub repository, GitLab repository, or otherwise. How to view the changelog and how to revert to an older version of the repository, add and remove files, commit changes, update remote repositories, fetch most recent versions of a repo, and more. GUI front-ends will also be covered, as well as troubleshooting and how typical IDEs will handle source code files belonging to a git repo.
Aaeon is rolling out a new EPIC form-factor “EPIC-KBS9” SBC with 6th or 7th Gen Core S-series chips, 4x GbE ports, up to 32GB DDR3, and mini-PCIe and PCIe x4 expansion. Aaeon’s EPIC-KBS9 follows two other EPIC-KBS SBCs to support Intel’s 6th “Skylake” or 7th “Kaby Lake” generation S-Series processors: the EPIC-KBS7, which emphasized real-world […]