Linux How-Tos and Linux Tutorials: Filter Content on Your Home Network with...
There are a lot of websites out there—websites offering content you might not want the users on your home (or home office) network seeing, whether they're children or adults. To avoid this, you can...
View ArticleKrebs on Security: Expect Phishers to Up Their Game in 2016
Expect phishers and other password thieves to up their game in 2016: Both Google and Yahoo! are taking steps to kill off the password as we know it. New authentication methods now offered by Yahoo! and...
View ArticleErrata Security: Trump is right about "schlong"
The reason Trump is winning is because the attacks against him are unfair. The recent schlong-gate is a great example.Yes, "schlong" means "penis", but is also means "rubber hose". Getting beaten by a...
View Article[Медийно право] [Нели Огнянова] : Съд на ЕС: държавно подпомагане на цифровия...
Стана известно решението на Общия съд по дело T‑461/13 Кралство Испания срещу Европейска комисия с предмет искане за отмяна на Решение 2014/489/ЕС на Комисията от 19 юни 2013 г. относно държавна помощ...
View ArticleSource Code in TV and Films: From: The Martian. Shows snippet of pvslib, a NASA…
From: The Martian. Shows snippet of pvslib, a NASA system verification library. Source
View ArticleSchneier on Security: Using Law Against Technology
On Thursday, a Brazilian judge ordered the text messaging service WhatsApp shut down for 48 hours. It was a monumental action. WhatsApp is the most popular app in Brazil, used by about 100 million...
View ArticleRaspberry Pi: Sense HAT Christmas projects
Just imagine: you’re elbows deep in Christmas cheer, and the rest of the family wants to know what that chunk of circuit board you found in the toe of your stocking does. Here are some demonstrations...
View ArticleTorrentFreak: FBI Investigates Hollywood Ties to Pirated ‘Hateful Eight’...
The pirated screener of Tarantino's "The Hateful Eight" has been traced back to a copy sent to a top Hollywood executive. The FBI is currently investigating the breach, which is part of series of...
View ArticleBeyond Bandwidth: Dear Santa: All I Want for Christmas is Better Business...
It’s the time of year when many of us are running frantically around the mall (or toggling between eBay and Amazon) trying to find those perfect gifts to delight our loved ones come Christmas morning....
View ArticleLWN.net: Security advisories for Wednesday
Arch Linux has updated claws-mail (code execution). CentOS has updated qemu-kvm (C6: two vulnerabilities). Debian has updated libxml2 (multiple vulnerabilities). Fedora has updated kernel (F23: three...
View Article/dev/ttyS0: Binwalk v2.1.1 Stable Release
Binwalk v2.1.1 has been released! If you’re still running v2.0.1, upgrading is highly recommended!
View ArticleLWN.net: Kirkland: More people use Ubuntu than anyone actually knows
Dustin Kirkland feels that Ubuntu users have been undercounted, and so has put together a census of his own. "Ever watch a movie on Netflix? You were served by Ubuntu. Ever hitch a ride with Uber or...
View ArticleDarknet – The Darkside: Facebook Disabled Flash For Video Finally
So Facebook disabled Flash for video finally, sadly it’s still there for games but a large use case for it just went out the window. And really, it’s not surprising after the recent mega patch in Adobe...
View ArticleKrebs on Security: Malware-Driven Card Breach at Hyatt Hotels
Hyatt Hotels Corporation said today it recently discovered malicious software designed to steal credit card data on computers that operate the payment processing systems for Hyatt-managed locations.
View ArticleLWN.net: [$] LWN.net Weekly Edition for December 24, 2015
The LWN.net Weekly Edition for December 24, 2015 is available.
View ArticleAWS DevOps Blog: AWS CodeDeploy: Deploying from a Development Account to a...
AWS CodeDeploy helps users deploy software to a fleet of Amazon EC2 or on-premises instances. A software revision is typically deployed and tested through multiple stages (development, testing,...
View ArticleRaspberry Pi: Mashup Minecraft with The MagPi #41
The New Year 2016 edition of the official Raspberry Pi magazine is out now! For many of our new readers this marks the magazine’s ‘difficult second album’, which begs the question: how do you top the...
View ArticleTorrentFreak: iLok2 DRM System Appears to Have Been Cracked
A DRM system popular in the high-end audio creation market appears to have been cracked. iLok2, the successor to iLok, had remained secure since its release but a flood of software during the past few...
View ArticleLWN.net: Rutkowska: State considered harmful – A proposal for a stateless laptop
Qubes OS creator Joanna Rutkowska has announced a new paper [PDF] describing a stateless laptop design that, she thinks, will address a number of the security problems she sees as being inherent in the...
View ArticleSchneier on Security: Police Dog Sniffs for Hard Drives
This weird story describes a "porn dog" that is trained to find hidden hard drives. It's used in child porn investigations. I suppose it's reasonable that computer disks have a particular chemical...
View Article