Search Results

Results 41-60 of 67 for Jonathan Terrasi
HOW TO

Changing Up Your Linux Distro

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. ...

DevOps: Let’s Talk About Security

In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. ...

Medical Device Insecurity: Diagnosis Clear, Treatment Hazy

An increasing number of healthcare professionals have become alert to the need for well-rounded medical device security in recent years, and players throughout the industry have started putting more effort into raising the bar. ...

Can Hackers Crack the Ivory Towers?

Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia ...

DevOps: Plenty of Devs, Not Enough Ops

In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiphishing training. ...

HOW TO

When It’s Time for a Linux Distro Change

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. ...

HOW TO

Open Up the Source Code to Lock Down Your Data

Regular readers probably already know this, but the main consideration that persuaded me to try Linux was security. With the many devastating breaches and unsettling privacy encroachments revealed in the past few years, I wanted to take control my digital life. ...

HOW TO

With Linux, You Don’t Get One Kernel of Truth… You Get Many

As much as I love to poke at the inner workings of my computer, I'll admit that until recently, I didn't give much thought to which version of the Linux kernel my desktop system was running. ...

HOW TO

Take Linux and Run With It

"How do you run an operating system?" may seem like a simple question, since most of us are accustomed to turning on our computers and seeing our system spin up. However, this common model is only one way of running an operating system. As one of Linux's greatest strengths is versatility, Linux offers the most methods and environments for running it.

HOW TO

With the Shell, You Can Go Wild(card) and Follow Your Pipe Dream

There is more to the shell, the terminal's interpreter software, than commands composed of alphanumeric characters. In addition to those familiar programs, there is a whole host of processing tools hiding behind the symbols of a standard keyboard. ...

OPINION

Linux: Come for the Kernel, Stay for the Popcorn

Linux offers so much for users to sink their teeth into that even among desktop and more casual users, it's easy to get caught up in the tradecraft. It's only too tempting to put your system's technical capabilities to the test by trying out a new program or practicing a new command. As with any other interest, though, Linux is not much fun unless you can revel in it with fellow fans and enjoy the camaraderie.

HOW TO

Heading in the Right (Re)Direction

If you've taken the time to get the hang of terminal basics, you're probably at the point where you want to start putting together what you've learned. Sometimes issuing commands one at a time is enough, but there are cases when it can be tedious to enter command after command just to perform a simple task. This is where the extra symbols on your keyboard come in...

OPINION

The Elusive Total Linux Convergence Dream

Regular readers know that I usually stick to the well-charted territory of essential terminal commands and practical overviews of Linux history, since they are immediately useful to newcomers. Thankfully for beginners, the basics don't change very quickly -- but that's not to say that Linux is a stagnant ecosystem. Far from it. Linux can be found at the very frontier of emerging computer trends...

HOW TO

The Filesystem Hierarchy Standard Shows Which Bits Are Boss

If you've ever been curious enough to look through your system's root directory ("/"), you may have found yourself a little overwhelmed. Most of the three-letter directory names don't tell you much about what they do, and if you ever needed to make important modifications, it would be tough to know where to look. ...

HOW TO

Sudo or Sudo Not, There Is No (4th) Try

If you've been using Linux for any length of time, at some point in some tutorial or troubleshooting guide you've more than likely encountered Linux's magic word: "sudo". A casual observer probably can tell you that it's used to access restricted functions on your computer, but there is much more to it than that. ...

HOW TO

Securing Your Linux System Bit by Bit

As daunting as securing your Linux system might seem, one thing to remember is that every extra step makes a difference. It's almost always better to make a modest stride than let uncertainty keep you from starting. ...

OPINION

Hacking and Linux Go Together Like 2 Keys in a Key Pair

Ever since taking an interest Linux, with the specific aim of better understanding and enhancing my personal digital security, I have been fascinated by hacker conferences. As soon as I learned of their existence, I made a point of keeping tabs on the major conferences so I could browse through the latest videos in their archive once each one wraps up.

The IoT’s Scramble to Combat Botnets

With shadowy botnet armies lurking around the globe and vigilante gray-hat actors inoculating susceptible devices, the appetite for Internet of Things security is stronger than ever. ...

What Internet-Connected War Might Look Like

A technician hurriedly slings his backpack over his shoulders, straps on his M9 pistol, and bolts out of the transport with his squad of commandos in a hail of gunfire. As soon as his team reaches the compound, he whips out a laptop and starts deploying a rootkit to the target server, bullets whizzing overhead all the while. ...

HOW TO

A Taste of Linux From a Sample Disk Platter

Since Linus Torvalds developed the Linux kernel, there has been an explosion of distributions that can be categorized into several broad classes. The ecosystem is truly expansive. ...

To earn your loyalty as a consumer, how important is it that a brand provides a personalized experience?
Loading ... Loading ...

CRM Buyer Channels