Search

Results 1-20 of 58 for Jonathan Terrasi.
INSIGHTS

Don’t Become a Fool in the IT Gold Rush

To give back to computer science education in a small way, I'd like to share my observations about determining the quality of instructional resources. Hopefully, those of you treading a similar path will learn the easy way what I learned the hard way.

Start Here When Things Go Wrong on Your Linux System

If you’ve run any operating system for any length of time, you will probably have encountered strange phenomena. Here are a few routes you can traverse to track down suspicious behavior on your Linux system.

HOW TO

Computers Use Processes, So Should You

Writing about technology over the years I've produced many guides on how to do cool stuff with your computer. However, without the right foundation, even the most thorough guide can leave room for pesky variables to creep in. This made me realize how important it is to establish what firm footing fo...

OPINION

We’re Late Closing the Barn Door on Pegasus

People are freaking out about reports of NSO Group's Pegasus surveillance tool being used to spy on journalists, political dissidents, and other opponents of regimes worldwide. It's disheartening, and worth discussing. But why are we shocked? In Pegasus' case, the game theory is clear: some company ...

REVIEW

Clear Linux* Delivers a Lucid if Limited Vision of Desktop Linux

Intel's Clear Linux* has been on my radar for its ambition to sprint to the head of the pack. While it's certainly not the first distro developed by a tech heavyweight, it's a rare case in which a private company releases a distro with no direct commercial application. It's an experiment to prove wh...

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

A Linux Safari to Classify the Genus of This Penguin

Recently, I took an interest in poking at Gentoo a bit. In the eyes of many desktop Linux users, it's considered a rite of passage to install this historically significant distribution. This curiosity sent me on a much more interesting Linux safari to explore what truly differentiates distributions....

OPINION

Once the Big Tech Battler, Open Source Is Now Big Tech’s Battleground

A cadre of tech giants have created the Rust Foundation. This is neither the first nor largest contribution to an open-source project by private tech vendors. Still, the creation of this new body marks another noteworthy instance in which proprietary software companies took the initiative to found a...

The ‘Unix Way’ Has a Right Way That’s Almost a Lost Way

As I study tech sector innovations, I see signs that the old traditions are fading. I'm not one to sanctify tradition for tradition's sake, but I see merit in maintaining a traditional approach to computing tasks that encourages shrewdness. To illustrate what I mean, these are some ways we are stray...

Where Will the Penguin March From Here?

Linux began its life as a humble experiment in Unix porting, but from there it quickly became a popular kernel for server OSes due to its low cost and customizability. From there it morphed to power network appliances and Android, proving it was lean enough for a whole gamut of embedded systems. It'...

HOW TO

3 Helpful Networking Projects for Your Raspberry Pi

In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi. It was upon casting a stray glance into the corner of my room where...

HOW TO

Get No-Fuss File-Level Crypto With Fscrypt

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

TECH BLOG

What Does the Penguin Say?

Linux users love to chat, and few topics are so prevalent among users as distributions. A big one is a distro's suitability for beginners. Drawing in eager new users is the only way to grow the Linux community. Successful recruitment often hinges on making sure that newcomers start with a distro tha...

DEPLOYING LINUX

It Came From the Live-Boot: A True Linux Horror Story

Once in a blue moon, one will experience sheer terror at the hands of a buggy Linux system. No amount of battle-hardiness can keep you completely safe, either. I know this because not too long ago, a fear-inducing Linux bug came for me. I wanted to share this true Linux story, so that you may be inf...

AdGuard Home: Another Brick in the Ad-Blocking Wall

Canonical's AdGuard Home Ubuntu Appliance is a new addition to the ranks of its appliances. With this offering, users can quickly implement a ready-made solution for blocking bothersome content at the network level on a home network. Doing so involves no more than downloading, installing, and bootin...

TECH BLOG

The ‘Unix Way’

We neglect our OS at the risk of radically underutilizing the incredible tools that it enables our device to be. Most of us only come into contact with one, or possibly both, of two families of operating systems: "House Windows" and "House Practically Everything Else." The latter is more commonly kn...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

TECH BLOG

The Case Against Full-Disk Encryption

The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...

DHS Brings Web App to Coronavirus Fight

The Department of Homeland Security, through its Science & Technology Directorate, has released a web app to help predict the decay rate of coronavirus in the air. The tool, entitled "Estimated Airborne Decay of SARS-CoV-2," accounts for the ambient temperature, relative humidity, and UV index in an...

The Strange, Meandering Journey to Online Speech Regulation

There has been a lot of debate in the public sphere around the degree and kind of legal regulation a society should apply to online speech. While the dialogue has become more intense and urgent in the last few years, the effort to impose limits on Internet speech has been contentious from the start....

Which device do you use most for digital communication?
Loading ... Loading ...

LinuxInsider Channels