Found 21 results.
I've been known to do comparative reviews if and when I thought they might illustrate a point. Initially I was going to review Elementary OS Juno and in fact installed it and tinkered for about 3 hours when I decided that I should just follow a hunch and see if it was any closer to Ubuntu Mate than I expected.
Here's how that Elementary OS review would have gone:Read More
Today for a lark I tried an open source video capture software called OBS Studio. It is available for free on Sourceforge and works on Windows, Linux, and that other one. I was pleasantly surprised to find it straight forward to use for game capture and will show you the only thing I needed to do to be up and running after installation.Read More
3 or more packages in the Arch Linux user repositories were found to contain malware due to orphaned repository ownership changes, and the resulting packages in question are marked as follows. The packages themselves pose minimal risk but should be removed by anyone using Arch (or any Arch based distro) or anyone using Arch User Repo packages via apt or pacman via source change audits.
Way back in 2008 I tried Linux Mint for the first time. It was of course only initially released in 2006 but even by the time I had tried it I could tell something was distinctly different about this version of Linux... I never much cared for vanilla Ubuntu, but had stayed clear of Mint at first partly because the newcomers made it out to be a Linux for noobs. There are plenty of people who still make the case that Linux Mint is simply the defacto standard for newcomers, but as a Crunchbang Linux user I wasn't in any hurry to switch. The installer was dead simple to make and use, the standard options were good even then, and above all else Linux mint felt very much like the Linux I was using as it had a pre-selected list of programs nearly identical to what I'd install on my desktop on any Linux variant. Open office which is now replaced with Libre-Office vs whatever was on Ubuntu etc.Read More
I had to pause from my usual tech only blogging to bring your attention to an amazing local talent. One of our new neighbors makes these quilts and I was pretty impressed with what I saw. I won't load an entire gallery here but rather will direct you to their website and suggest you share the link with your friends who are into DIY and Sewing.Read More
Mac users will be delighted to know that a single character can crash any existing Mac, Iphone, Ipad, and even watch os device. The character is a Telugu character from the native Indian language charset used by over 70 million people. The potential for this character to be spammed across social media is fairly high. The attack doesn't seem to affect Skype however the character can disable third-party apps like iMessage, Slack, Facebook Messenger, WhatsApp, Gmail, and Outlook for iOS, as well as Safari and Messages for the macOS versions.Read More
By the 3rd quarter of 2017 64% of malicious email attacks contained one form of ransom ware or another. These attacks are on the rise so it seems prudent to disclose some information regarding these attacks, and perhaps some strategies for prevention and removal. Below we'll list the top 10 ransom ware attacks and below that some specific steps that can be taken.Read More
Everything you know about hacking is probably going to change soon. Specter and Meltdown are "among" the first vulnerabilities that potentially make use of weaknesses in isolation layers. Layers that generally are protected from programs that might try to bypass them through more conventional exploitation. The x86 addresses and sinkholes - which are only documented by the manufacturers of processors in ways that read like censored encyclopedias, are in fact being documented in the wild by a few hackers - if not many. This means that anyone who knows how to fuzz a processor's microcodes and has enough time on their hands can in point of fact find exactly the kinds of exploitable snippets of microcode that would make use of vulnerabilities like the ones we are discussing.Read More
Ancient scholars would debate endlessly about all things theoretical. They could imagine the factual basis for their arguments were completely valid, thanks mostly to confirmation bias. It happens once in a while that people come to such erroneous conclusions about things in the modern age, especially things like this. Many of you neither know nor care what a kernel even is, but it is an essential component of your computer's operating system, that determines how your machine will present your requests to the processors, memory, or controlled devices. It does little things like: running device drivers either within, or outside of itself in user space, determining where file systems are accessed, holding the modules that communicate through itself. This topic actually gave rise in the 1970's to a debate that still continues to this day, over whether it is better to use a Micro Kernel, or Monolithic Kernel. Many of those debating still rely on the same arguments in spite of decades of minor changes that pretty much negate any significant difference between these subsystems as anything more than a happenstance.Read More
*Picture somewhat unrelated to content
2017 is nearly over, and my friends and luscious followers... I have opinions. Dear God I've been making money online since 2010, and it still always becomes about looking back at what went wrong or could have gone better. I sold some books, but has anyone ever sold nearly enough books to be happy about it? I've sold services, but again I'd have loved to done 20 times the volume that I have done. Is it marketing to the poor, or is it something else? Something harder to spot?Read More
Kaspersky Labs has a rich history as the maker of the worlds first true antivirus product. The company introduced heuristics based antivirus ages ago and long before any of it's competition. The company is based in Moscow and has operated well above the expected standard for a normal antivirus product. So why has the US government banned it's use recently? Are they really working with Russian government? Where is the evidence?Read More
Newcomers to GNU, Linux, and BSD Operating systems will want very specific instruction regarding the installation of an operating system for their own specific PC, Laptop, or device. However many variations exist due to the variety of Bios, Uefi, and other similar systems. Fortunately the process doesn't change much and this guide can act as an overview to the process itself. This process is almost identical to installing to SD card, but SD cards require an .img file rather than an ISO. A tool called win32 disk imager is preferable for writing to SD cards. This process from Linux requires slightly different tools but those tools exist on the Linux systems themselves i.e. USB image writer on Linux Mint vs Rufus etc.Read More
In recent weeks we've heard how fuzzing is good for Linux, and how security professionals are posing dangers to the Linux kernel's functionality. Both of these statements were entirely fair, and both were from Linux creator Linus Torvalds. His instruction to: ""Do no harm,"" perhaps requires an overview of how security implementations often disable useful services, change commonly used protocols, and similarly can: "complicate existing infrastructures" in ways that can lead to general avoidance of use. From a developer's point of view, security is just one small aspect of a much larger picture. From a security perspective, it is a landscape full of weaknesses that were caused by poor planning by developers.Read More
Courtesy of Wikipedia
We've all been responsible for something at some point. Website Admins, Linux System Admins, Bake sale operators? Whomever you are you have undoubtedly had at least one experience where something was organized neatly for a reason and had someone come along and screw it up royally by being ID 10 T. In new systems this isn't a massive problem, but on established systems someone with the wrong privilege can ruin quite a bit and quickly. Admins go to great pains to prevent this by believing in education until that fails - which it does in dramatic and costly ways.Read More
Whether you prefer Windows or Linux there are steps you can take to improve your system's security and network topology. Step 1 is always information gathering, and that is true of your host system as well. No matter if you are a Pen Tester or just feeling anxious about people sniffing around your PC, these tools help.Read More
I've rated this device a perfect 5 out of 5 for it's exemplary performance and will list it's specs below.
Processor: Intel Cherry Trail Z8300 Quad Core 1.8GHz Operation System: Pre-installed full edition of Windows 10 Ram: 4GB DDR3L Storage Capability: 64GB GPU: Intel HD Graphics, 12 EUs @200-500 Mhz, single-channel memory One USB3.0 port and two USB 2.0 ports WiFi and Bluetooth 4.0 Built-in Arduino Co-processor: ATmega32u4 Video output: HDMI and MIPI-DSI Onboard touch panel overlay connector Supports 100Mbps Ethernet GPIO: 6 GPIOs from Cherry Trail processor 20 GPIOs from Arduino Leonardo 6 Plug and play Gravity sensor connectors Power: 5v/2A Dimension of board: 88 * 70 mm/ 3.46 * 2.76 inches Packing Size: 110 * 94 * 30 mm/4.33 * 3.70 * 1.18 inches N.W.: 55g G.W.: 100g
If you are dual booting Windows, and Linux, chances are that at least once you've been greeted with a broken bootloader, a busybox, or ash shell. If you happen to be dual booting a Debian, Ubuntu, or related distro you can actually fix your bootloader with ease by booting the installer again and run the following from a terminal:
In recent years I've had the opportunity to test and use many of the Linux Distributions, centered around information security. To be clear what I'll be doing in this article is evaluating overall impressions of the distribution, and not the specific tool sets. Many of the tools are suited to many IT tasks and might be confusing to use as a basis for comparison, especially considering they can generally be added to other distributions of Linux. Our evaluation will include overall performance, ease of use, adaptability, and scale, as these are the important factors to consider when selecting a tool for protecting an infrastructure.Read More
Hypothetical scenarios can be annoying when they aren't realistic but have you ever wondered what you would do if you only had one laptop/pc and it fried? How badly would you be setback? Many people deal with this scenario without the added pressure of having anything painfully important to do online, but some have no alternative but to try to get by at least for awhile on nothing but an android device. Lucky for them, and possibly for you, that isn't nearly as bad as you might think.Read More