Social and Private with Friendica Developing for a Post-Facebook WorldJun 19, 2012
Be social and keep in touch while maintaining your privacy with Friendica, a network that centralizes social media.more »
Security Lessons: Hacking Hardware Don’t forget your hardwareMay 29, 2012
Now that your networks are secure and you’ve convinced your users to secure their passwords and software, it’s time to turn your attention to your hardware to keep it from being attacked.more »
Bash offers any number of simplifications, especially when it comes to pesky individual steps in installation routines for larger software packages. Some caution is advisable, though, if you need to handle database and application passwords, which can easily be compromised.more »
Fluendo, Lineo Solutions, Mocana, and NVidia join the Linux Foundation and see the benefits of Linux in the future of computing.more »
Better Bash Shell scripts from hell: ShebangJan 31, 2012
In the beginning was the double pound sign and the exclamation mark – or at least shell scripts always start this way. The inventor, Dennis Ritchie, really didn’t know how much pain this was going to cause users.more »
Security Lessons: Password Storage Storing your passwords properlySep 23, 2011
High-performance graphics cards and proper storage can help keep your passwords secure.more »
Security Lessons: JTAG Hacking Owning your own stuffMay 31, 2011
Who’s device is it? Just because you bought it doesn’t mean you can look inside. But the Internet has plenty of resources for jailbreakers.more »
Security Lessons: Bufferbloat Will cheap RAM break the Internet?Apr 29, 2011
An abundance of buffers hides the Internet’s dirty little secret.more »
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.
The Linux New Media Awards have honored the most significant products, projects, people, and organizations for open source/Linux every year since 2000.
Legendary Uber-distro splits over the systemd controversy.
New LTS version offers many refinements for the Cinnamon and Mate desktops and significant improvement under the hood.
One of CeBIT’s most successful forums returns in 2015.
A new study says it is possible to unmask 81% of TOR users.
Redmond joins the revolution by turning the .NET Core Runtime into a GitHub project.
Users only had 7 hours to update before the intrusions started.
It's official: The new web arrives