Cryptography is an important part of IT security, and OpenSSL is a well-known cryptography toolkit for Linux. Experts depend on OpenSSL because it is free, it has huge capabilities, and it’s easy to use in Bash scripts.
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.
Choosing the right filesystem for a particular job can be a difficult task. We tested seven candidates and found some interesting results to make an administrator’s choice easier.
When I was thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.
Admins of small businesses who want to cover all their infrastructure requirements with a single server are the target group of small business servers. In this article, we introduce three Linux distributions that meet this requirement.
Aaron Seigo discusses KDE’s new approach to managing change and the changes coming up in the next few years.
Even as the tech world works to figure out just what to do with the potential of cloud computing and big data, along comes a new bit of technology fueled by open source software: software-defined networks.
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.
Create secure passwords with the help of a password generator and check for quality at the same time.
A new project for sharing media files might be as important for its philosophy as its features.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm