- Welcome Guest
- Sign In
It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of Internet of Things security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for anyone who owns a connected device ...
It would have been reasonable for those attending Josh Bressers' session at last month's CypherCon -- myself included -- to expect a presentation by a cryptocurrency expert. It was billed as a talk about plumbing the depths of the Bitcoin blockchain. When Bressers admitted that his material grew out of a hobby, I was surprised. Still, the talk was far from disappointing...
A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly positive, and he said as much in his piece and during the subsequent podcast interview...
For those who try to keep their finger on the Linux community's pulse, 2018 was a surprisingly eventful year. Spread over the last 12 months, we've seen various projects in the Linux ecosystem make great strides, as well as suffer their share of stumbles. ...
A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly positive, and he said as much in his piece and during the subsequent podcast interview...
It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. ...
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. ...
An increasing number of healthcare professionals have become alert to the need for well-rounded medical device security in recent years, and players throughout the industry have started putting more effort into raising the bar. ...
Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia ...
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. ...
It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time ...
Regular readers probably already know this, but the main consideration that persuaded me to try Linux was security. With the many devastating breaches and unsettling privacy encroachments revealed in the past few years, I wanted to take control my digital life. ...
As much as I love to poke at the inner workings of my computer, I'll admit that until recently, I didn't give much thought to which version of the Linux kernel my desktop system was running. ...
"How do you run an operating system?" may seem like a simple question, since most of us are accustomed to turning on our computers and seeing our system spin up. However, this common model is only one way of running an operating system. As one of Linux's greatest strengths is versatility, Linux offers the most methods and environments for running it.
There is more to the shell, the terminal's interpreter software, than commands composed of alphanumeric characters. In addition to those familiar programs, there is a whole host of processing tools hiding behind the symbols of a standard keyboard. ...
Linux offers so much for users to sink their teeth into that even among desktop and more casual users, it's easy to get caught up in the tradecraft. It's only too tempting to put your system's technical capabilities to the test by trying out a new program or practicing a new command. As with any other interest, though, Linux is not much fun unless you can revel in it with fellow fans and enjoy the camaraderie.
If you've taken the time to get the hang of terminal basics, you're probably at the point where you want to start putting together what you've learned. Sometimes issuing commands one at a time is enough, but there are cases when it can be tedious to enter command after command just to perform a simple task. This is where the extra symbols on your keyboard come in...
Regular readers know that I usually stick to the well-charted territory of essential terminal commands and practical overviews of Linux history, since they are immediately useful to newcomers. Thankfully for beginners, the basics don't change very quickly -- but that's not to say that Linux is a stagnant ecosystem. Far from it. Linux can be found at the very frontier of emerging computer trends...
If you've ever been curious enough to look through your system's root directory ("/"), you may have found yourself a little overwhelmed. Most of the three-letter directory names don't tell you much about what they do, and if you ever needed to make important modifications, it would be tough to know where to look. ...
If you've been using Linux for any length of time, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there is much more to it than that. ...
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/11/web-team.jpg
https://www.ecommercetimes.com/story/customer-commerce-offers-smbs-an-e-commerce-path-to-better-cx-177820.html
Customer Commerce Offers SMBs an E-Commerce Path to Better CX
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/frustrated-computer-user.jpg
https://www.ecommercetimes.com/story/investment-scams-skyrocket-victims-in-us-fleeced-for-4b-in-2022-177544.html
Investment Scams Skyrocket, Victims in US Fleeced for $4B in 2022
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/08/millennial-couple.jpg
https://www.ecommercetimes.com/story/the-complex-implications-of-grinch-and-scalper-bots-beyond-the-holidays-177838.html
The Complex Implications of Grinch and Scalper Bots Beyond the Holidays
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/02/ChatGPT-smartphone.jpg
https://www.ecommercetimes.com/story/the-future-of-ai-in-retail-beyond-the-chatgpt-hype-177681.html
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/11/maximize-sales.jpg
https://www.ecommercetimes.com/story/the-power-of-bundling-to-maximize-sales-this-holiday-season-and-beyond-177847.html
The Power of Bundling To Maximize Sales This Holiday Season and Beyond
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/12/Zipline-drone-front-door-delivery.jpg
https://www.ecommercetimes.com/story/zipline-drone-delivery-projects-ready-for-takeoff-in-us-cities-178862.html
Zipline Drone Delivery Projects Ready for Takeoff in US Cities
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/08/woman-texting-diner.jpg
https://www.ecommercetimes.com/story/marketers-texting-schedule-can-make-or-break-consumer-engagement-177813.html
Marketers’ Texting Schedule Can Make or Break Consumer Engagement
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2024/01/smartphone-user-perplexed.jpg
https://www.ecommercetimes.com/story/affiliate-marketing-contributing-to-substandard-search-results-study-178978.html
Affiliate Marketing Contributing to Substandard Search Results: Study
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/11/package-deliveries.jpg
https://www.ecommercetimes.com/story/porch-pirate-product-protection-a-win-win-for-sellers-shoppers-177826.html
Porch Pirate, Product Protection a Win-Win for Sellers, Shoppers
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2023/10/shopping-card.jpg
https://www.ecommercetimes.com/story/many-merchants-worried-by-deadline-to-toughen-payment-card-security-177798.html
Many Merchants Worried by Deadline To Toughen Payment Card Security
https://www.ecommercetimes.com/wp-content/uploads/sites/5/2022/02/unboxing.jpg
https://www.ecommercetimes.com/story/subscription-sales-spur-superior-selling-177636.html
Social Media
See all Social Media