Search

Results 1-20 of 55 for Jonathan Terrasi.
OPINION

We’re Late Closing the Barn Door on Pegasus

People are freaking out about reports of NSO Group's Pegasus surveillance tool being used to spy on journalists, political dissidents, and other opponents of regimes worldwide. It's disheartening, and worth discussing. But why are we shocked? In Pegasus' case, the game theory is clear: some company ...

REVIEW

Clear Linux* Delivers a Lucid if Limited Vision of Desktop Linux

Intel's Clear Linux* has been on my radar for its ambition to sprint to the head of the pack. While it's certainly not the first distro developed by a tech heavyweight, it's a rare case in which a private company releases a distro with no direct commercial application. It's an experiment to prove wh...

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

A Linux Safari to Classify the Genus of This Penguin

Recently, I took an interest in poking at Gentoo a bit. In the eyes of many desktop Linux users, it's considered a rite of passage to install this historically significant distribution. This curiosity sent me on a much more interesting Linux safari to explore what truly differentiates distributions....

OPINION

Once the Big Tech Battler, Open Source Is Now Big Tech’s Battleground

A cadre of tech giants have created the Rust Foundation. This is neither the first nor largest contribution to an open-source project by private tech vendors. Still, the creation of this new body marks another noteworthy instance in which proprietary software companies took the initiative to found a...

The ‘Unix Way’ Has a Right Way That’s Almost a Lost Way

As I study tech sector innovations, I see signs that the old traditions are fading. I'm not one to sanctify tradition for tradition's sake, but I see merit in maintaining a traditional approach to computing tasks that encourages shrewdness. To illustrate what I mean, these are some ways we are stray...

Where Will the Penguin March From Here?

Linux began its life as a humble experiment in Unix porting, but from there it quickly became a popular kernel for server OSes due to its low cost and customizability. From there it morphed to power network appliances and Android, proving it was lean enough for a whole gamut of embedded systems. It'...

HOW TO

3 Helpful Networking Projects for Your Raspberry Pi

In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi. It was upon casting a stray glance into the corner of my room where...

HOW TO

Get No-Fuss File-Level Crypto With Fscrypt

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

TECH BLOG

What Does the Penguin Say?

Linux users love to chat, and few topics are so prevalent among users as distributions. A big one is a distro's suitability for beginners. Drawing in eager new users is the only way to grow the Linux community. Successful recruitment often hinges on making sure that newcomers start with a distro tha...

DEPLOYING LINUX

It Came From the Live-Boot: A True Linux Horror Story

Once in a blue moon, one will experience sheer terror at the hands of a buggy Linux system. No amount of battle-hardiness can keep you completely safe, either. I know this because not too long ago, a fear-inducing Linux bug came for me. I wanted to share this true Linux story, so that you may be inf...

AdGuard Home: Another Brick in the Ad-Blocking Wall

Canonical's AdGuard Home Ubuntu Appliance is a new addition to the ranks of its appliances. With this offering, users can quickly implement a ready-made solution for blocking bothersome content at the network level on a home network. Doing so involves no more than downloading, installing, and bootin...

TECH BLOG

The ‘Unix Way’

We neglect our OS at the risk of radically underutilizing the incredible tools that it enables our device to be. Most of us only come into contact with one, or possibly both, of two families of operating systems: "House Windows" and "House Practically Everything Else." The latter is more commonly kn...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

TECH BLOG

The Case Against Full-Disk Encryption

The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...

DHS Brings Web App to Coronavirus Fight

The Department of Homeland Security, through its Science & Technology Directorate, has released a web app to help predict the decay rate of coronavirus in the air. The tool, entitled "Estimated Airborne Decay of SARS-CoV-2," accounts for the ambient temperature, relative humidity, and UV index in an...

The Strange, Meandering Journey to Online Speech Regulation

There has been a lot of debate in the public sphere around the degree and kind of legal regulation a society should apply to online speech. While the dialogue has become more intense and urgent in the last few years, the effort to impose limits on Internet speech has been contentious from the start....

HOW TO

Back to the RSS Future

For understandable reasons, people feel worn down by the volume and composition of the media coming at them. This fatigue stems from a few compounding factors. There is a strong perception that the character of the information presented by the media is warped by highly polarized players. Nearly two-...

How to Stay Safe on the Internet, Part 4: Fighting the Power

Category 2 adversaries are nothing to sneeze at, but their resources are finite. If you armor up enough, they will give up, and move onto an easier comparable target. In confronting the threat of category 3, everything you have learned ratchets up to a whole new level of paranoia. Category 3 adversa...

How to Stay Safe on the Internet, Part 3: Drive the Black Hatters Mad

How do you know if you are at risk of being hacked? Like conventional criminals, criminal hackers choose easy and lucrative targets. One group in the crosshairs is made up of companies that have data on millions of users, such as private sector entities with a Web presence. Why go after data one use...

When will supply chain disruptions begin to improve?
Loading ... Loading ...

TechNewsWorld Channels