Search

Results 1-20 of 37 for Jonathan Terrasi.
HOW TO

Get No-Fuss File-Level Crypto With Fscrypt

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

TECH BLOG

What Does the Penguin Say?

Linux users love to chat, and few topics are so prevalent among Linux users as distributions. A big one is a distro's suitability for beginners. Drawing in eager new users is the only way to grow the Linux community. Successful recruitment often hinges on making sure that newcomers start with a dist...

DEPLOYING LINUX

It Came From the Live-Boot: A True Linux Horror Story

Once in a blue moon, one will experience sheer terror at the hands of a buggy Linux system. No amount of battle-hardiness can keep you completely safe, either. I know this because not too long ago, a fear-inducing Linux bug came for me. I wanted to share this true Linux story, so that you may be inf...

AdGuard Home: Another Brick in the Ad-Blocking Wall

Canonical's AdGuard Home Ubuntu Appliance is a new addition to the ranks of its appliances. With this offering, users can quickly implement a ready-made solution for blocking bothersome content at the network level on a home network. Doing so involves no more than downloading, installing, and bootin...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

TECH BLOG

The Case Against Full-Disk Encryption

The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...

OPINION

You’ve Come a Long Way, Linux-Baby

When Linux first emerged from its cocoon in a frenzied Usenet thread, it is doubtful that almost anyone imagined the project would ascend to global prominence. Even more astonishingly, its dominance was driven as much, if not more, by its adoption by the private sector -- although it posed an antith...

The Router’s Obstacle-Strewn Route to Home IoT Security

It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of IoT security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for an...

CONFERENCE REPORT

Digging for Bitcoin Is a Labor of Love

It would have been reasonable for those attending Josh Bressers' session at CypherCon -- myself included -- to expect a presentation by a cryptocurrency expert. It was billed as a talk about plumbing the depths of the bitcoin blockchain. When Bressers admitted that his material grew out of a hobby, ...

BEST OF ECT NEWS

How to Conquer Your Fear of Arch Linux

A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...

OPINION

Where Linux Went in 2018 – and Where It’s Going

For those who try to keep their finger on the Linux community's pulse, 2018 was a surprisingly eventful year. Spread over the last 12 months, we've seen various projects in the Linux ecosystem make great strides, as well as suffer their share of stumbles. All told, the year wrapped up leaving plenty...

HOW TO

Overcoming Your Terror of Arch Linux

A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...

HOW TO

Changing Up Your Linux Distro

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...

Can Hackers Crack the Ivory Towers?

Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differin...

DevOps: Plenty of Devs, Not Enough Ops

In spite of all the high-profile breaches that seem to sweep the headlines with greater frequency, companies slowly but surely have been getting a handle on internal security practices. At this point, it's hard to imagine any employee, in or out of the tech sector, who hasn't been run through antiph...

HOW TO

When It’s Time for a Linux Distro Change

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...

HOW TO

Open Up the Source Code to Lock Down Your Data

Meaningful security is more than an app or an OS. It's a mindset. Linux security tools by themselves will not make you or anyone more secure. Security requires trade-offs in convenience, so the tools I'll highlight here are not recommended as "daily drivers." Only you can determine your ideal balanc...

HOW TO

With Linux, You Don’t Get One Kernel of Truth… You Get Many

As much as I love to poke at the inner workings of my computer, I'll admit that until recently, I didn't give much thought to which version of the Linux kernel my desktop system was running. For most desktop users, this isn't odd. Compatibility of kernel modules is often critical for servers and pro...

HOW TO

Take Linux and Run With It

"How do you run an operating system?" may seem like a simple question, since most of us are accustomed to turning on our computers and seeing our system spin up. However, this common model is only one way of running an operating system. As one of Linux's greatest strengths is versatility, Linux offe...

HOW TO

With the Shell, You Can Go Wild(card) and Follow Your Pipe Dream

There is more to the shell, the terminal's interpreter software, than commands composed of alphanumeric characters. In addition to those familiar programs, there is a whole host of processing tools hiding behind the symbols of a standard keyboard. To say nothing of their incredible potency in combin...

LinuxInsider Channels