- Welcome Guest
- Sign In
In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi.
This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...
Linux users love to chat, and few topics are so prevalent among users as distributions. A big one is a distro's suitability for beginners. Drawing in eager new users is the only way to grow the Linux community. Successful recruitment often hinges on making sure that newcomers start with a distro tha...
Once in a blue moon, one will experience sheer terror at the hands of a buggy Linux system. No amount of battle-hardiness can keep you completely safe, either. I know this because not too long ago, a fear-inducing Linux bug came for me. I wanted to share this true Linux story, so that you may be inf...
Canonical's AdGuard Home Ubuntu Appliance is a new addition to the ranks of its appliances. With this offering, users can quickly implement a ready-made solution for blocking bothersome content at the network level on a home network. Doing so involves no more than downloading, installing, and bootin...
Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...
The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...
When Linux first emerged from its cocoon in a frenzied Usenet thread, it is doubtful that almost anyone imagined the project would ascend to global prominence. Even more astonishingly, its dominance was driven as much, if not more, by its adoption by the private sector -- although it posed an antith...
It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of IoT security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for an...
It would have been reasonable for those attending Josh Bressers' session at CypherCon -- myself included -- to expect a presentation by a cryptocurrency expert. It was billed as a talk about plumbing the depths of the Bitcoin blockchain. When Bressers admitted that his material grew out of a hobby, ...
A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...
For those who try to keep their finger on the Linux community's pulse, 2018 was a surprisingly eventful year. Spread over the last 12 months, we've seen various projects in the Linux ecosystem make great strides, as well as suffer their share of stumbles. All told, the year wrapped up leaving plenty...
A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...
It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...
Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differin...
In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiph...
It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...
Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balanc...
As much as I love to poke at the inner workings of my computer, I'll admit that until recently, I didn't give much thought to which version of the Linux kernel my desktop system was running. For most desktop users, this isn't odd. Compatibility of kernel modules is often critical for servers and pro...
"How do you run an operating system?" may seem like a simple question, since most of us are accustomed to turning on our computers and seeing our system spin up. However, this common model is only one way of running an operating system. As one of Linux's greatest strengths is versatility, Linux offe...
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/cybersecurity-collaboration.jpg
https://www.linuxinsider.com/story/can-public-private-partnerships-improve-open-source-security-177379.html
Can Public-Private Partnerships Improve Open-Source Security?
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/05/developer-happy.jpg
https://www.linuxinsider.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/open-source-business.jpg
https://www.linuxinsider.com/story/open-source-experts-2024-outlook-for-ai-security-sustainability-177250.html
Open-Source Experts’ 2024 Outlook for AI, Security, Sustainability
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/09/crm-gears.jpg
https://www.linuxinsider.com/story/open-source-overhaul-revitalizes-pipeliner-crm-through-forced-rebuild-177361.html
Open-Source Overhaul Revitalizes Pipeliner CRM Through Forced Rebuild
https://www.linuxinsider.com/wp-content/uploads/sites/2/2022/02/network-engineers-code.jpg
https://www.linuxinsider.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/01/smartphone-user-happy.jpg
https://www.linuxinsider.com/story/how-to-speed-up-a-suddenly-slow-android-phone-178982.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/07/Acer-Chromebook-Plus-516-GE.jpg
https://www.linuxinsider.com/story/acer-chromebook-plus-516-ge-redefines-gaming-style-computing-performance-179261.html
Acer Chromebook Plus 516 GE Redefines Gaming Style, Computing Performance
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/VPN-encrypted-connection.jpg
https://www.linuxinsider.com/story/how-to-connect-via-openvpn-on-ubuntu-177342.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2021/08/linux-review-tux-keyboard.jpg
https://www.linuxinsider.com/story/dynebolic-linux-return-falls-short-of-creative-goals-177381.html
https://www.linuxinsider.com/wp-content/uploads/sites/2/2023/02/IT-team.jpg
https://www.linuxinsider.com/story/cyber-forecast-for-2023-and-beyond-hang-on-for-a-bumpy-digital-ride-177752.html
Cyber Forecast for 2023 and Beyond: Hang on for a Bumpy Digital Ride
https://www.linuxinsider.com/wp-content/uploads/sites/2/2024/04/Noble-Numbat.jpg
https://www.linuxinsider.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide