Search

Results 1-20 of 43 for Jonathan Terrasi.
REVIEW

Clear Linux* Delivers a Lucid if Limited Vision of Desktop Linux

Intel's Clear Linux* has been on my radar for its ambition to sprint to the head of the pack. While it's certainly not the first distro developed by a tech heavyweight, it's a rare case in which a private company releases a distro with no direct commercial application. It's an experiment to prove wh...

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

A Linux Safari to Classify the Genus of This Penguin

Recently, I took an interest in poking at Gentoo a bit. In the eyes of many desktop Linux users, it's considered a rite of passage to install this historically significant distribution. This curiosity sent me on a much more interesting Linux safari to explore what truly differentiates distributions....

OPINION

Once the Big Tech Battler, Open Source Is Now Big Tech’s Battleground

A cadre of tech giants have created the Rust Foundation. This is neither the first nor largest contribution to an open-source project by private tech vendors. Still, the creation of this new body marks another noteworthy instance in which proprietary software companies took the initiative to found a...

The ‘Unix Way’ Has a Right Way That’s Almost a Lost Way

As I study tech sector innovations, I see signs that the old traditions are fading. I'm not one to sanctify tradition for tradition's sake, but I see merit in maintaining a traditional approach to computing tasks that encourages shrewdness. To illustrate what I mean, these are some ways we are stray...

Where Will the Penguin March From Here?

Linux began its life as a humble experiment in Unix porting, but from there it quickly became a popular kernel for server OSes due to its low cost and customizability. From there it morphed to power network appliances and Android, proving it was lean enough for a whole gamut of embedded systems. It'...

HOW TO

Get No-Fuss File-Level Crypto With Fscrypt

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

TECH BLOG

What Does the Penguin Say?

Linux users love to chat, and few topics are so prevalent among Linux users as distributions. A big one is a distro's suitability for beginners. Drawing in eager new users is the only way to grow the Linux community. Successful recruitment often hinges on making sure that newcomers start with a dist...

DEPLOYING LINUX

It Came From the Live-Boot: A True Linux Horror Story

Once in a blue moon, one will experience sheer terror at the hands of a buggy Linux system. No amount of battle-hardiness can keep you completely safe, either. I know this because not too long ago, a fear-inducing Linux bug came for me. I wanted to share this true Linux story, so that you may be inf...

AdGuard Home: Another Brick in the Ad-Blocking Wall

Canonical's AdGuard Home Ubuntu Appliance is a new addition to the ranks of its appliances. With this offering, users can quickly implement a ready-made solution for blocking bothersome content at the network level on a home network. Doing so involves no more than downloading, installing, and bootin...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

TECH BLOG

The Case Against Full-Disk Encryption

The information security industry, with all its raging debates, has rallied around a small corpus of best practices. One of the highest on this list is full-disk encryption, which security experts regard as sacrosanct. This is the encryption that ensures that someone who snatches your device won't b...

OPINION

You’ve Come a Long Way, Linux-Baby

When Linux first emerged from its cocoon in a frenzied Usenet thread, it is doubtful that almost anyone imagined the project would ascend to global prominence. Even more astonishingly, its dominance was driven as much, if not more, by its adoption by the private sector -- although it posed an antith...

The Router’s Obstacle-Strewn Route to Home IoT Security

It is newly minted conventional wisdom that not a single information security conference goes by without a presentation about the abysmal state of IoT security. While this is a boon for researchers looking to make a name for themselves, this sorry state of affairs is definitely not beneficial for an...

CONFERENCE REPORT

Digging for Bitcoin Is a Labor of Love

It would have been reasonable for those attending Josh Bressers' session at CypherCon -- myself included -- to expect a presentation by a cryptocurrency expert. It was billed as a talk about plumbing the depths of the bitcoin blockchain. When Bressers admitted that his material grew out of a hobby, ...

BEST OF ECT NEWS

How to Conquer Your Fear of Arch Linux

A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...

OPINION

Where Linux Went in 2018 – and Where It’s Going

For those who try to keep their finger on the Linux community's pulse, 2018 was a surprisingly eventful year. Spread over the last 12 months, we've seen various projects in the Linux ecosystem make great strides, as well as suffer their share of stumbles. All told, the year wrapped up leaving plenty...

HOW TO

Overcoming Your Terror of Arch Linux

A recent episode of a Linux news podcast I keep up with featured an interview with a journalist who had written a piece for a non-Linux audience about giving it a try. It was surprisingly widely read. The writer's experience with some of the more popular desktop distributions had been overwhelmingly...

HOW TO

Changing Up Your Linux Distro

It's common for Linux users to hop between distributions and survey the field, and I recently reached a point where I had to seriously rethink the one I was using most of the time. Between hardware compatibility issues with my old standby and some discouraging missteps with other go-to choices, I fe...

Can Hackers Crack the Ivory Towers?

Just like leaders in every other field you can imagine, academics have been hard at work studying information security. Most fields aren't as replete with hackers as information security, though, and their contributions are felt much more strongly in the private sector than in academia. The differin...

Which review rating influences you most when researching a business?
Loading ... Loading ...

LinuxInsider Channels