Skip to main content

Home/ Future of the Web/ Group items tagged Linux

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

GNU/Linux ¿cual es el camino de la libertad? | Desde Linux [# ! Nota.] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! ... creo que se confunde (a menudo, y, en ocasiones, 'deliberadamente') #Variedad con #Complejidad... la Libre Disponibilidad de distintas aplicaciones/distribuciones no implica 'enfrentamiento'.si no oportunidad... [# ! Echad un Vistazo a 'The Tyranny Of Choice', de JAMES DELINGPOLE en dailymail.co.uk ]http://www.dailymail.co.uk/news/article-466296/The-tyranny-choice-Do-really-need-38-types-milk.html]
  •  
    ""Toda convicción es una cárcel" : Friedrich Nietzsche"
  •  
    ""Toda convicción es una cárcel" : Friedrich Nietzsche"
Gonzalo San Gil, PhD.

6 Linux-based mobile operating systems | CIO - 0 views

  •  
    "Android, yes. But also, Sailfish, Ubuntu, Tizen, and more. "
Gonzalo San Gil, PhD.

Open source is in our DNA | Network World - 0 views

  •  
    "The same thing that compels us to make Linux (and many other projects) free and open source is present in many of humanity's greatest achievements"
  •  
    "The same thing that compels us to make Linux (and many other projects) free and open source is present in many of humanity's greatest achievements"
Gonzalo San Gil, PhD.

Easy, Linux-compatible password management with KeePassX | Opensource.com - 0 views

  •  
    "According to the U.S. Computer Emergency Readiness Team, "Passwords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or 'crack' passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.""
  •  
    "According to the U.S. Computer Emergency Readiness Team, "Passwords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or 'crack' passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.""
Gonzalo San Gil, PhD.

When Linux is the face of kindness | Opensource.com - 0 views

  •  
    "My late father, Lou Shapiro, was an early leader of UNICEF, so relief work was baked into the genetics of my family. His work was centered on emergency relief for the survivors of earthquakes and other natural disasters. Whenever there was an earthquake in the world, "
  •  
    "My late father, Lou Shapiro, was an early leader of UNICEF, so relief work was baked into the genetics of my family. His work was centered on emergency relief for the survivors of earthquakes and other natural disasters. Whenever there was an earthquake in the world, "
Gonzalo San Gil, PhD.

Keeweb A Linux Password Manager - LinuxAndUbuntu - 0 views

  •  
    "Today we are depending on more and more online services. Each online service we sign up for, let us set a password and this way we have to remember hundreds of passwords. In this case, it is easy for anyone to forget passwords. "
Gonzalo San Gil, PhD.

Open Source Security Process -- Part 1: A Cloud Security Introduction | Linux.com - 0 views

  •  
    [In part one of this four-part series, Xen Project Advisory Board Chairman Lars Kurth takes a look at the theories behind cloud security and how they relate to The Walking Dead -- yes, the TV show. Read on to find out more. ...]
Gonzalo San Gil, PhD.

xRAT | My IT kitchen - 0 views

  •  
    "Lightweight web browser Remote Access Tool for GNU/Linux systems."
Gonzalo San Gil, PhD.

Top 5 Best Linux Firewalls - 2 views

  •  
    "As part of the contest we conducted recently, we got 160+ comments from the geeky readers who choose their favorite firewall. Based on this data, the top spot goes to.. drum roll please.."
Gary Edwards

Out in the Open: Inside the Operating System Edward Snowden Used to Evade the NSA | Ent... - 0 views

  •  
    TAILS anonymous Operating System- excerpt: "When NSA whistle-blower Edward Snowden first emailed Glenn Greenwald, he insisted on using email encryption software called PGP for all communications. But this month, we learned that Snowden used another technology to keep his communications out of the NSA's prying eyes. It's called Tails. And naturally, nobody knows exactly who created it. Tails is a kind of computer-in-a-box. You install it on a DVD or USB drive, boot up the computer from the drive and, voila, you're pretty close to anonymous on the internet. At its heart, Tails is a version of the Linux operating system optimized for anonymity. It comes with several privacy and encryption tools, most notably Tor, an application that anonymizes a user's internet traffic by routing it through a network of computers run by volunteers around the world. Snowden, Greenwald and their collaborator, documentary film maker Laura Poitras, used it because, by design, Tails doesn't store any data locally. This makes it virtually immune to malicious software, and prevents someone from performing effective forensics on the computer after the fact. That protects both the journalists, and often more importantly, their sources. "The installation and verification has a learning curve to make sure it is installed correctly," Poitras told WIRED by e-mail. "But once the set up is done, I think it is very easy to use." An Operating System for Anonymity Originally developed as a research project by the U.S. Naval Research Laboratory, Tor has been used by a wide range of people who care about online anonymity: everyone from Silk Road drug dealers, to activists, whistleblowers, stalking victims and people who simply like their online privacy. Tails makes it much easier to use Tor and other privacy tools. Once you boot into Tails - which requires no special setup - Tor runs automatically. When you're done using it, you can boot back into your PC's normal operating
Gonzalo San Gil, PhD.

Free Software Foundation statement on the GNU Bash "shellshock" vulnerability - Free So... - 0 views

  •  
    "by Free Software Foundation - Published on Sep 25, 2014 04:51 PM A major security vulnerability has been discovered in the free software shell GNU Bash. The most serious issues have already been fixed, and a complete fix is well underway. GNU/Linux distributions are working quickly to release updated packages for their users. All Bash users should upgrade immediately, and audit the list of remote network services running on their systems. " [# ! + http://security.stackexchange.com/questions/68168/is-there-a-short-command-to-test-if-my-server-is-secure-against-the-shellshock-b]
  •  
    "by Free Software Foundation - Published on Sep 25, 2014 04:51 PM A major security vulnerability has been discovered in the free software shell GNU Bash. The most serious issues have already been fixed, and a complete fix is well underway. GNU/Linux distributions are working quickly to release updated packages for their users. All Bash users should upgrade immediately, and audit the list of remote network services running on their systems. "
Gonzalo San Gil, PhD.

Learn GNU/Linux the Fun Way | Linux Journal - 0 views

  •  
    "Oct 02, 2014 By Doc Searls in Education Sometimes a gift just falls in your lap. This month, it came in the form of an e-mail out of the blue from Jared Nielsen, one of two brothers (the other is J.R. Nielsen) who created The Hello World Program, "an educational web series making computer science fun and accessible to all". If it had been just that, I might not have been interested. "
  •  
    "Oct 02, 2014 By Doc Searls in Education Sometimes a gift just falls in your lap. This month, it came in the form of an e-mail out of the blue from Jared Nielsen, one of two brothers (the other is J.R. Nielsen) who created The Hello World Program, "an educational web series making computer science fun and accessible to all". If it had been just that, I might not have been interested. "
Gonzalo San Gil, PhD.

How to configure peer-to-peer VPN on Linux - Xmodulo - 0 views

  •  
    "Last updated on October 9, 2014 Authored by Dan Nanni Leave a comment A traditional VPN (e.g., OpenVPN, PPTP) is composed of a VPN server and one or more VPN clients connected to the server. When any two VPN clients talk to each other, the VPN server needs to relay VPN traffic between them. The problem of such a hub-and-spoke type of VPN topology is that the VPN server can easily become a performance bottleneck as the number of connected clients increase"
  •  
    "Last updated on October 9, 2014 Authored by Dan Nanni Leave a comment A traditional VPN (e.g., OpenVPN, PPTP) is composed of a VPN server and one or more VPN clients connected to the server. When any two VPN clients talk to each other, the VPN server needs to relay VPN traffic between them. The problem of such a hub-and-spoke type of VPN topology is that the VPN server can easily become a performance bottleneck as the number of connected clients increase"
Gonzalo San Gil, PhD.

What is good reference management software on Linux - Xmodulo - 1 views

  •  
    "Last updated on October 10, 2014 Authored by Adrien Brochard 3 Comments Have you ever written a paper so long that you thought you would never see the end of it? If so, you know that the worst part is not dedicating hours on it, but rather that once you are done, you still have to order and format your references into a structured convention-following bibliography."
  •  
    "Last updated on October 10, 2014 Authored by Adrien Brochard 3 Comments Have you ever written a paper so long that you thought you would never see the end of it? If so, you know that the worst part is not dedicating hours on it, but rather that once you are done, you still have to order and format your references into a structured convention-following bibliography."
Gonzalo San Gil, PhD.

Command Line Tool to Monitor Linux Containers Performance - 0 views

  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
  •  
    "ctop is a new command line based tool available to monitor the processes at the container level. Containers provide operating system level virtualization environment by making use of the cgroups resource management functionality. This tool collects data related to memory, cpu, block IO and metadata like owner, uptime etc from cgroups and presents it in a user readable format so that one can quickly asses the overall health of the system. Based on the data collected, it tries to guess the underlying container technology. ctop is useful in detecting who is using large amounts of memory under low memory situations."
Gonzalo San Gil, PhD.

Save Wifi :the FCC is attempting to criminalize freedom via new regulations | ThinkPeng... - 1 views

  •  
    "Will you help us save wifi? The FCC is attempting to force new rules on manufacturers that will require everybody to lock down computing devices. Anything with a modern wireless chip is likely to be affected (software defined radio). This includes routers, cell phones, computers, bluetooth adapters, and similar devices. This means that users won't be able to install free software operating systems such as GNU/Linux or other third party firmwares/operating systems without the cooperation of the manufacturer. "
Gonzalo San Gil, PhD.

The Halloween Documents - 0 views

  •  
    "Where will Microsoft try to drag you today? Do you really want to go there? In the last week of October 1998, a confidential Microsoft memorandum on Redmond's strategy against Linux and Open Source software was leaked to me by a source who shall remain nameless. I annotated this memorandum with explanation and commentary over Halloween Weekend and released it to the national press. Microsoft was forced to acknowledge its authenticity. The press rightly treated it as a major story and covered it (with varying degrees of cluefulness). "
Gonzalo San Gil, PhD.

Linux Foundation SysAdmin Resources - Linux Foundation Training - 0 views

  •  
    "Resources to Start Your SysAdmin Career"
Gonzalo San Gil, PhD.

Richard Stallman 'basically' has no problem with the NSA using GNU/Linux | ITworld - 0 views

  •  
    " It's Stallman's philosophy that 'a program must not restrict what jobs its users do with it' -- and that includes the NSA."
Gonzalo San Gil, PhD.

Linux Foundation Security Checklist: Have It Your Way | Community | LinuxInsider - 0 views

  •  
    "Sysadmins should use the LF security checklist as a resource, said its creator, Konstantin Ryabitsev. "They can evaluate it, adapt it, hack on it until it fits their purpose, and hopefully contribute back...
« First ‹ Previous 261 - 280 of 448 Next › Last »
Showing 20 items per page