Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged Linux-like

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

11 predictions for Linux in 2016 | CIO - 0 views

  •  
    "Peer into the future The Linux world changed a lot in 2015. Perhaps the biggest change was at Microsoft, which turned from a foe into a lover of Linux. We saw the first Ubuntu Linux powered smartphone. Samsung launched a smartwatch running on Tizen Linux. In the enterprise, Linux and open source continued to become stronger with technologies like OpenStack, Docker, and Cloud Foundry. It has been an exciting year. What does 2016 hold for Linux? Here are my predictions."
Gonzalo San Gil, PhD.

Linux Essentials - 0 views

  •  
    [The Linux Professional Institute (LPI) is proud to announce an innovative "first-of-its-kind" program for the academic sector, youth and others new to the world of Linux and Open Source technology. Created in partnership with a community of teachers,trainers and experts world-wide. The "Linux Essentials" program prepares the next generation to acquire the advanced skills needed to fill increasing shortages of workers in today's mixed IT environments. It supports government and educational authorities bringing Linux and Open Source to the classroom at much younger ages. Supporting learning and fun through skills competitions like World Skills and Euroskills. Supporting international collaboration and the development of teacher-tested educational initiatives for the classroom. ...]
Gonzalo San Gil, PhD.

Software Piracy and Linux Adoption by Arne Rogde Gramstad :: SSRN - 0 views

  •  
    "Arne Rogde Gramstad University of Oslo, Department of Economics, Students February 5, 2016 Abstract: The open-source software operating system Linux is a free-of-charge substitute to proprietary systems like Microsoft Windows. By using a cross-country data set, this paper finds evidence that increased piracy of proprietary software has a negative impact on adoption of desktop versions of Linux. The interpretation of this result is that the availability of pirated versions of Windows leads to fewer individuals installing a Linux operating system on their desktop computers. Thus, in the absence of software piracy, Linux would be a more widely used operating system. Number of Pages in PDF File: 11 Keywords: Open-source software, software piracy, intellectual property JEL Classification: L11, L17, O34"
Gonzalo San Gil, PhD.

The Corrupting Influence of Money in the Linux Foundation (Bias for Sale) | Techrights - 0 views

  •  
    "Posted in GNU/Linux, GPL, Microsoft, VMware at 2:20 am by Dr. Roy Schestowitz When enemies of the GPL (GNU) like Microsoft and VMware - not just GNU/Linux-friendly companies such as Red Hat - pay the Linux Foundation to get their way"
Gonzalo San Gil, PhD.

Why Linux pioneer Linus Torvalds prefers x86 chips over ARM processors | PCWorld - 0 views

  •  
    "Agam Shah IDG News Service Oct 7, 2016 1:03 PM Linux pioneer Linus Torvalds is a stand-up guy-he says what he feels. There's no sugarcoating, and he'll admit to faults, like recent issues with the Linux 4.8 kernel. He was full of surprises at last week's Linaro Connect conference, when he was asked about his favorite chip architecture. He didn't blink before saying it was x86, not ARM. "
Gonzalo San Gil, PhD.

5 Lies Linux-Haters Like To Tell - 0 views

  •  
    Linux may have been a scary operating system before, but all of that has changed in recent years. These myths, which are more accurately called lies, are now dead.
  •  
    Linux may have been a scary operating system before, but all of that has changed in recent years. These myths, which are more accurately called lies, are now dead.
Gonzalo San Gil, PhD.

[# ! Hyper-Thec.] How to Manage Kernel Modules in Linux - 0 views

  •  
    "by Babak Mammadov · Published October 30, 2016 · Updated October 30, 2016 When we install Linux Like operating system at that time Linux kernel install most of device driver's modules and after the installation it also allows us to install new device drivers as modules using the commands modprobe and insmod."
Gonzalo San Gil, PhD.

On a mission to make Linux as accessible as possible | Opensource.com - 0 views

  •  
    "Kendell Clark: My Linux story This article details the circumstances behind my switch away from proprietary operating systems and my switch to Linux. Like many, I switched out of frustration with other operating systems and not directly because of Linux's open source model. I developed my passion for that after the switch was made."
Gonzalo San Gil, PhD.

Linux Disable USB Devices (Disable loading of USB Storage Driver) - 0 views

  •  
    "In our research lab, would like to disable all USB devices connected to our HP Red Hat Linux based workstations. I would like to disable USB flash or hard drives, which users can use with physical access to a system to quickly copy sensitive data from it. How do I disable USB device support under CentOS Linux, RHEL version 5.x/6.x/7.x and Fedora latest version?"
Gonzalo San Gil, PhD.

Tools To Password Protect Folder In Linux - LinuxAndUbuntu - 0 views

  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
  •  
    "Most of the time, having a password protected user is all you need to keep your files private and protected from prying eyes. There are those few times when you need to allow access to your account to another person, sometimes there are folders or files you would like to keep away from being accessed. Now we can password protect folder with several handy tools. In the Windows world, these tools are quite easily available for Windows but today we will look at a few options available for the Linux user."
Gonzalo San Gil, PhD.

Agedu - Find Out Wasted Disk Space In Linux - OSTechNix - 0 views

  •  
    "Today, let us talk about a simple, yet another must-have utility in your arsenal. Meet agedu, a small utility that tracks down the wasted disk space in your Linux system. Running out of disk space? No worries! Install agedu and find out which directories or files are consuming more space. Just delete them if they are no longer needed or move them safely to an archive medium to free up some space. It works on Windows and Unix-like operating systems. It is available under MIT license. That means you can use it for free, copy, distribute, and reuse."
Gonzalo San Gil, PhD.

Linux Process Table Tutorial | Linux Servers and Security Howtos - Chris Binnie - 0 views

  •  
    A fundamental design feature of Unix-like Operating Systems is that many of a system's resources are accessible via the filesystem, as a file. For example the "procfs" pseudo-filesystem offers us access to all kinds of valuable treasures.
Gonzalo San Gil, PhD.

Cracking Linux with the backspace key? [LWN.net] - 0 views

  •  
    "Anybody who has been paying attention to the net over the last week or so will certainly have noticed an abundance of articles with titles like "How to hack any Linux machine just using backspace". All this press does indeed highlight an important vulnerability, but it may not be the one that they think they are talking about."
Gonzalo San Gil, PhD.

Teaching open source communities about conflict resolution | Opensource.com - 0 views

  •  
    Interview with Gina Likins and Donna Benjamin At OSCON in Portland this year, Donna Benjamin and Gina Likins are combining forces to talk about a topic that is sometimes easily dismissed: conflict resolution. Given the growing need to address conflict in technology, and that even popular projects like the Linux Kernel adopting codes of conduct, it's no surprise that conferences feature talks on human interaction."
  •  
    Interview with Gina Likins and Donna Benjamin At OSCON in Portland this year, Donna Benjamin and Gina Likins are combining forces to talk about a topic that is sometimes easily dismissed: conflict resolution. Given the growing need to address conflict in technology, and that even popular projects like the Linux Kernel adopting codes of conduct, it's no surprise that conferences feature talks on human interaction."
Gonzalo San Gil, PhD.

What Is Open Source Software? [MakeUseOf Explains] - 0 views

  •  
    "By Joel Lee on 1st February, 2013 | Technology Explained, Web Culture | 25 Comments "Open source" is a term that's thrown around a lot these days. You may know that certain things are open source, like Linux and Android, but do you know what it entails?"
  •  
    "By Joel Lee on 1st February, 2013 | Technology Explained, Web Culture | 25 Comments "Open source" is a term that's thrown around a lot these days. You may know that certain things are open source, like Linux and Android, but do you know what it entails?"
Gonzalo San Gil, PhD.

What are the different file types in Linux and UNIX - 0 views

  •  
    "Unix like operating system supports several different types of files. Some of the more common file types are regular files, directory files, executable files, symbolic link files, and device files, and are described in the following sub-sections."
  •  
    "Unix like operating system supports several different types of files. Some of the more common file types are regular files, directory files, executable files, symbolic link files, and device files, and are described in the following sub-sections."
Gonzalo San Gil, PhD.

Server Hardening | Linux Journal [ # ! WARNING ☠ Note ;) ] - 0 views

  •  
    "Jan 14, 2016 By Greg Bledsoe in HOW-TOs Security Servers SysAdmin Server hardening. The very words conjure up images of tempering soft steel into an unbreakable blade, or taking soft clay and firing it in a kiln, producing a hardened vessel that will last many years. Indeed, server hardening is very much like that"
  •  
    "Jan 14, 2016 By Greg Bledsoe in HOW-TOs Security Servers SysAdmin Server hardening. The very words conjure up images of tempering soft steel into an unbreakable blade, or taking soft clay and firing it in a kiln, producing a hardened vessel that will last many years. Indeed, server hardening is very much like that"
Gonzalo San Gil, PhD.

Real Hackers Don't Wear Hoodies (Cybercrime is Big Business) | Linux.com | The source f... - 0 views

  •  
    "Most people probably have an idea about what a hacker looks like. The image of someone sitting alone at a computer, with their face obscured by a hoodie, staring intently at lines of code in which their particular brand of crime or mischief is rooted, has become widely associated with hackers. You can confirm this by simply doing an image search for "hackers" and seeing what you come up with"
Gonzalo San Gil, PhD.

Limit Your Linux Super Powers With su & sudo | FOSS Force - 0 views

  •  
    "Don Parris I recently offered some security tips aimed at new system administrators. And hey, the home users among you should take note, after all, you're the administrator of your home system! One of the tips was "Don't run as root." Today I would like to expand on that a bit. First, we'll take a look at why you should limit the use of your super powers. Then we'll look at the best ways to use su and sudo to help you limit your risks."
1 - 20 of 28 Next ›
Showing 20 items per page