LearnAboutLinux.com

1 2 3 4

Mycroft Mark II, Chronicle, Intel and Bionic Beaver

Friday, 26 January 2018 - 13:55 PM - (Security)

News briefs for January 26, 2018.

The Mycroft Mark II Open Source Voice Assistant (that doesn't spy on you) just launched on Kickstarter. Mycroft source code is available on GitHub. more>>

Read More...

Chrome 64, GCC 7.3, Librem 5 Phone Progress and More

Thursday, 25 January 2018 - 13:57 PM - (Security)

News updates for January 25, 2018.

Chrome 64 is now available for Linux, Mac and Windows, featuring a stronger ad blocker and several security fixes, including mitigations for Spectre and Meltdown. See the release updates for more info. more>>

Read More...

Linus Rants, Cryptojacking Protection, openSUSE and Games

Tuesday, 23 January 2018 - 16:15 PM - (Security)

News updates from January 23, 2018.

Linus Torvalds slams Intel's Spectre and Meltdown patches, calling them "COMPLETE and UTTER GARBAGE". See LKML for more. more>>

Read More...

Spectre Patches, Snap, Happy Birthday LWN and More

Monday, 22 January 2018 - 18:54 PM - (Security)

News updates for January 22, 2018.

Are you using protection? Longtime kernel developer, Greg Kroah-Hartman, just posted a simple recipe for users to verify whether they are running a Spectre/Meltdown patched version of the Linux kernel. more>>

Read More...

Raspberry Pi Alternatives

Monday, 22 January 2018 - 13:14 PM - (Hardware)

A look at some of the many interesting Raspberry Pi competitors. more>>

Read More...

Purism Progress Report, Spectre Mitigation for Ubuntu, Malicious Chrome Extensions and More

Thursday, 18 January 2018 - 16:20 PM - (Security)

News briefs for January 18, 2018.

Purism, the group behind the security and privacy-focused Librem 5 phone just recently published a progress report highlighting the latest developments and design decisions to its crowdfunded project. Changes include an even faster processor. more>>

Read More...

Linux Filesystem Events with inotify

Monday, 08 January 2018 - 15:38 PM - (Security)

Triggering scripts with incron and systemd. more>>

Read More...

Banana Backups

Tuesday, 21 November 2017 - 15:58 PM - (Hardware)

In the September 2016 issue, I wrote an article called "Papa's Got a Brand New NAS" where I described how I replaced my rackmounted gear with a small, low-powered ARM device—the Odroid XU4. more>>

Read More...

Zentera Systems, Inc.'s CoIP Security Enclave

Wednesday, 15 November 2017 - 12:38 PM - (Security)

On the heels of being crowned "Cool Vendor in Cloud Security" by Gartner, Zentera Systems, Inc., announced an upgrade to its flagship CoIP Security Enclave solution. more>>

Read More...

Testing the Waters: How to Perform Internal Phishing Campaigns

Tuesday, 31 October 2017 - 13:50 PM - (Security)

Phishing is one of the most dangerous threats to modern computing. Phishing attacks have evolved from sloppily written mass email blasts to targeted attacks designed to fool even the most cautious users. No defense is bulletproof, and most experts agree education and common sense are the best tools to combat the problem. more>>

Read More...

The Wire

Monday, 30 October 2017 - 12:09 PM - (Security)

In the US, there has been recent concern over ISPs turning over logs to the government. During the past few years, the idea of people snooping on our private data (by governments and others) really has made encryption more popular than ever before. One of the problems with encryption, however, is that it's generally not user-friendly to add its protection to your conversations. more>>

Read More...

Lotfi ben Othmane, Martin Gilje Jaatun and Edgar Weippl's Empirical Research for Software Security (CRC Press)

Friday, 20 October 2017 - 16:47 PM - (Security)

Developing truly secure software is no walk through the park. more>>

Read More...

Four Hidden Costs and Risks of Sudo Can Lead to Cybersecurity Risks and Compliance Problems on Unix and Linux Servers

Friday, 20 October 2017 - 15:19 PM - (Security)

Beyond Trust
Sponsored Post:

more>>

It is always a philosophical debate as to whether to use open source software in a regulated environment. Open source software is crowd sourced, and developers from all over the world contribute to packages that are later included in Operating System distributions.

Read More...

iStorage diskAshur Storage Drives

Friday, 06 October 2017 - 16:50 PM - (Security)

With software-free setup and operation, the new iStorage diskAshur group of ultra-secure storage drives works across all operating systems, including Linux, macOS, Android, Chrome, thin and zero clients, MS Windows and embedded systems. more>>

Read More...

Key Considerations for Software Updates for Embedded Linux and IoT

Tuesday, 19 September 2017 - 14:05 PM - (Security)

The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. more>>

Read More...

1 2 3 4