Home Search
lin - search results
If you're not happy with the results, please do another search
Managing Encrypted Backups in Linux, Part 2
In part 1, we learned how to make simple automated unencrypted and encrypted backups. In this article, I will show you how to fine-tune...
How to Use ‘at’ Command to Schedule a Task on Given or Later Time...
As an alternative to cron job scheduler, the at command allows you to schedule a command to run once at a given time without editing a configuration...
Black Hat: Windows 10 at Risk From Linux Kernel Hidden Inside
A researcher exposes design and control flaws in Windows 10 versions that have the capability to run Linux.
Embedded within some versions of the latest...
Linux Kernel 4.7 Offers New Support for Virtual Devices, Drivers, and More
So, Linux kernel 4.7 is here. The release happened July 24, just over 10 weeks after the release of 4.6 and two weeks after...
Managing Encrypted Backups in Linux: Part 1
Encrypted backups are great, but what if something goes wrong and you can't read your encrypted files? In this two-part series, I’ll show how...
Mint 18 Review: “Just Works” Linux Doesn’t Get Any Better Than This
New themes and moving from GNOME/GTK 3.10 to 3.18 means two good years of Mint 18.x ahead.
The newly released Mint 18 is a major upgrade....
Sparkling Water: Bridging Open Source Machine Learning and Apache Spark
Although many people have experience with the fields of machine learning and artificial intelligence through applications in their pockets, such as Apple’s Siri and...
FCC forces TP-Link to Support Open Source Firmware on Routers
Networking hardware vendor TP-Link today admitted violating US radio frequency rules by selling routers that could operate at power levels higher than their approved limits. In a settlement with the...
The Rise of the Linux Botnet
A new report from Kaspersky Lab on botnet-assisted DDoS attacks shows a steady growth in their numbers the second quarter of this year.
SYN DDoS, TCP DDoS...



