Archive

HOW TO

Computers Use Processes, So Should You

Writing about technology over the years I've produced many guides on how to do cool stuff with your computer. However, without the right foundation, even the most thorough guide can leave room for pesky variables to creep in. This made me realize how important it is to establish what firm footing fo...

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

HOW TO

3 Helpful Networking Projects for Your Raspberry Pi

In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi. It was upon casting a stray glance into the corner of my room where...

HOW TO

Cut the Cord to Trim Your TV Viewing Overhead

For the majority of consumers, cutting the cable TV cord is a mixed bag for a variety of reasons. The big misconception is that you will drastically lower your cable bill. That is not the case unless you can also pickup free TV reception from an antenna. Otherwise, you will need to use a video strea...

HOW TO

Get No-Fuss File-Level Crypto With Fscrypt

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

HOW TO

Back to the RSS Future

For understandable reasons, people feel worn down by the volume and composition of the media coming at them. This fatigue stems from a few compounding factors. There is a strong perception that the character of the information presented by the media is warped by highly polarized players. Nearly two-...

HOW TO

How to Distro Hop With a Web Browser

Getting familiar with Linux up close and personal is easy to do with a free service provided by DistroTest.net, which allows testing without ISO downloads or local installations. Are you a wandering Linux distro hopper looking for a way to streamline the selection process? Are you a Windows or macOS...

HOW TO

Overcoming Your Terror of Arch Linux

A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...

HOW TO

Changing Up Your Linux Distro

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...

HOW TO

7 Ways to Supercharge Your Netflix Experience

We've all been there: scrolling through a seemingly never-ending carousel of shows and movies available on Netflix, trying to find the one thing we might want to sit down and enjoy. Except we often end up spending more time looking for something to kick back and view than actually watching the thing...

HOW TO

When It’s Time for a Linux Distro Change

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...

HOW TO

Open Up the Source Code to Lock Down Your Data

Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balanc...

HOW TO

7 Tips for Powerful Product Photos

Product photos are a vital part of e-commerce. Because they provide the central connection between customers and products, photos can make or break an e-commerce business. "You can have a great looking website and user interface, but if you don't have great product photos it is like driving a Merced...

Elon Musk's Dec. 2 action to release The Twitter Files: Approve or Disapprove?
Loading ... Loading ...

LinuxInsider Channels