“If privacy matters, it should matter to the phone your life is on.” So says Apple in their recent ads about Privacy on the iPhone and controlling the data you share—but many of the security features they highlight are opt-in, and users often don’t know when or how to activate them.
But hey… we got your back!
Today, Trail of Bits launched i
Today I’m glad to publish a guest post about Galera a software that I’ve used in the past to manage a multi-master mysql cluster:
MariaDB Galera Cluster is a multi-master cluster for MariaDB. MariaDB Galera Cluster currently supports only the InnoDB/XtraDB storage engine. It is mostly used for database redundancy as it consists of multiple master
Guest post by Lucy Benton
Linux is one of the most popular and versatile operating systems available. It can be used on a smartphone, computer and even a car. Linux has been around since the 1990s and is still one of the most widespread operating systems.
Linux is actually used to run most of the Internet as it is considered to be rather stable compared to
Guest Post by Oliver.
Linux Mint is one of the most powerful and elegant Operating system. The purpose of launching a Linux Mint in the market is to provide the modern and comfortable OS which is easy to use for every user. The best thing about Linux Mint is that it is both free and Open Source. Also, it comes at the third position after Microsoft Windows an
This is a small update (1 year later) of a great article by Ilmari Kontulainen, first posted on blog.deveo.com.
I’ll post the original article in blockquote and my notes in green.
Storing large binary files in Git repositories seems to be a bottleneck for many Git users. Because of the decentralized nature of Git, which means every developer has the fu
Today I want to repost a great article first posted on sysadvent blog.
I think it’s a great post that show how to integrate different software to achieve a modern continuos integration.
Original article by:
Written by: Paul Czarkowski (@pczarkowski)
Edited by: Dan Phrawzty (@phrawzty)
Docker and the ecosystem around it have done some great things for d
Article submitted by Mark
In a market that is churning Android powered device after another Android powered device and the obligatory Apple update to its iPhone and iPad brands, it is no wonder people need to look elsewhere if they want to experience something different in the mobile segment. We aren’t really disrespecting Apple and Google’s effo
Article By Cassie Philips.
Linuxaria has been one of my go-to sources for Linux tips and information ever since I discovered it a couple of months ago. I would strongly suggest reading this post on managing processes with cgroup, as it is an example of the quality of their content.
Linux being one of the quickest rising operating systems available to compute
Like every year it’s time once again to read the sysadvent blog, a great source of interesting article.
This one it’s an article of one year ago, but still really useful and interesting
Written by: Michael Stahnke (@stahnma)
Edited by: Adam Compton (@comptona)
Over the years, I have mentored quite a few System Administrators. Levelling up means l
Article by Mikko Ohtamaa first posted on his blog
Often you want to automatize something using shell scripting. In a perfect world your script robot works for you without getting tired, without hick-ups, and you can just sit at the front of your desk and sip coffee.
Then we enter the real world: Your network is disconnected. DNS goes downs. Your HTTP hooks
Article by Daniel Miessler first posted on his blog
lsof is the sysadmin/security über-tool. I use it most for getting network connection related information from a system, but that’s just the beginning for this powerful and too-little-known application. The tool is aptly called lsof because it “lists openfiles“. And remember, in UNIX just about everything
The most new and dangerous bug around it’s the one called “shellshock”, this is a security bug in the widely used Unix Bash shell which was disclosed on 24 September 2014. Many Internet daemons, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands.
If you manage a server with many different users or just your family computer you will probably have many different accounts to manage, and one important aspect of any account it’s its password.
In this small article I’ll show you how to use the basic passwd command but also how to do some small bash script or use a web application, if you have a
Luckily this problem don’t happen so frequently, at least using stable kernel and distributions, but sometime your beloved Linux could go in “Kernel Panic”.
A kernel panic is an action taken by an operating system upon detecting an internal fatal error from which it cannot safely recover. The term is largely specific to Unix and Unix-like
What’s your upload and download speed at home (or in your office) ?
Are you really sure that you get what do you pay for to your ISP ?
To test the speed of our internet connection There are several internet services such as SpeedTest a web service that is available both from Web browsers and mobile application.
Now you can easily check it also with sp
Announce
Share high-quality web security related articles with you:)
Tools