Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
19 days ago
"Proof Mode" for your Smartphone Camera
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered
photo  camera  proof  signature  security 
26 days ago
E-Ink Tablets | Digital Paper & Notepads | Sony US
In a world overwhelmed with paper, Sony introduces a revolutionary way to work. Digital Paper from Sony, in conjunction with a cloud service, gives you the power to annotate, share, and save your documents – all from a handy device that's light enough to carry anywhere.
notetaking  notes  hardware  devices 
4 weeks ago
reMarkable | The paper tablet
The paper tablet for people who prefer paper. Here to replace your notebooks, sketchbooks and printouts. Paper-like reading, writing and sketching with digital powers.
notetaking  notes  devices  hardware 
4 weeks ago
“These 25 Productivity Principles Will Change How You Work Forever”
Everyone struggles to get work done everyday. Here is a summary of all you need to know and do to get real work done everyday without losing your mind.
Productivity 
5 weeks ago
My Google Keep 2017 Wishlist
I then decided to... (insert drum roll sound effect) ...stick with Google. Meaning, using Google Keep for all kinds of lists and notes, and Google Drive for longer drafts.
productivity  Google  note  notetaking 
5 weeks ago
A Straightforward Guide to the WordPress Template Hierarchy - WPMU DEV
In this post I’ll walk you through the template hierarchy and explain how it works with some worked examples. By the time you’ve read through this you should be able to create theme template files like a pro!
WordPress  template  webdev  webdesign 
6 weeks ago
Material Design Color Palette Generator - Material Palette
Making over your site’s typography isn’t just about finding the right font or size. Nope, it’s also about finding the right color. If you haven’t experimented with this Material Design Palette yet, take a moment to do so now. You’ll see that regardless of which branding colors you select, the primary and secondary font color are always black or a shade of grey.
color  palette  icons  material_design  webdesign  webdev 
7 weeks ago
TCnext - Site dedicated to the development of the next "truecrypt"
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
TrueCrypt  security  cryptography 
7 weeks ago
VeraCrypt - Home
VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on TrueCrypt 7.1a.
TrueCrypt  security  cryptography  VeraCrypt 
7 weeks ago
TrueCrypt 7.1a Hashes
The SHA256, SHA1, and MD5 hashes of all TrueCrypt version 7.1a files.
TrueCrypt  security  cryptography 
7 weeks ago
Perché ho detto ai miei amici di non usare più WhatsApp e Telegram
Un confronto sulle impostazioni di privacy delle app di messaggistica.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
8 weeks ago
Tactical Technology Collective
Tactical Tech is a non profit that explores the political and social role of technology in our lives.
activism  privacy 
9 weeks ago
Home | Me and my Shadow
Through your computer, mobile phone, and other digital devices, you leave behind hundreds of digital traces (also called data traces) every day: bits of information about you that are created, stored, and collected.  When your digital traces are put together to create stories about you or profiles of you, these become your digital shadows. These can give others huge insight into your life; and they can also be totally wrong. Either way, once they're out there, they are almost impossible to control....
privacy  security 
9 weeks ago
security in-a-box | tools and tactics for digital security
Security in-a-Box is a guide to digital security for activists and human rights defenders throughout the world.
security  privacy  activism  human_rights 
9 weeks ago
Welcome to the United States of Emergency
Today marks the first day of a disaster on a scale that until a few months ago was beyond our imagination.
politics  from instapaper
9 weeks ago
Create a Print-Friendly Page with Gutenberg.css - Hongkiat
On informational websites it’s still a good practice to offer a custom print stylesheet. Thankfully, you don’t need to design your own because Gutenberg is here to help.
CSS  webdev  print 
9 weeks ago
“Why I told my friends to stop using WhatsApp and Telegram”
Reading the above, you might think you are fine since WhatsApp, Facebook Messenger, and Google Allo also use the Signal Protocol. Well, you’re not.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
10 weeks ago
Moving to HTTPS on WordPress | CSS-Tricks
I just recently took CSS-Tricks "HTTPS everywhere". That is, every URL on this site enforces the HTTPS (SSL) protocol. Non-secure HTTP requests get redirected to HTTPS. Here's some notes on that journey.
security  Apache  SSL  server  TLS 
10 weeks ago
Sortd
Sortd transforms your email into organized lists.
Gmail  mail  productivity 
11 weeks ago
Why Deep Work Helps You Get More Done in Less Time
Deep work doesn’t just help you get more done in less time. It significantly improves the quality of your life.
productivity  working 
11 weeks ago
Dario Taraborelli: The Beauty of LaTeX
There are several reasons why one should prefer LATEX to a WYSIWYG word processor like Microsoft Word: portability, lightness, security are just a few of them (not to mention that LATEX is free).
LaTeX 
11 weeks ago
An SQL Injection Attack Is a Legal Company Name in the UK - Schneier on Security
Someone just registered their company name as ; DROP TABLE "COMPANIES";-- LTD.
security 
11 weeks ago
Should I escape translated strings in a WordPress plugin or theme? - James Collins
When writing a WordPress plugin recently, I wasn’t sure whether a translatable text/string is considered safe, or if it needs to escaped before being output.
security  WordPress  escape 
11 weeks ago
La “Venexit” e l’insegnamento del dialetto veneto nelle scuole | Alex's Brain Dump
Questa scelta è stata fatta da una maggioranza di anziani, spesso pensionati, che si sentono deboli ed hanno paura di tutto. Persone che hanno paura soprattutto di ciò che non somiglia loro e di ciò che non sanno comprendere: stranieri, “immigrati”, “clandestini” e via dicendo. Persone nostalgiche e spesso paranoiche che si sono sentite in diritto di scaricare le loro paure ed il loro odio per gli “alieni” sulle spalle delle generazioni che dovranno subire il peso delle loro scelte scellerate.
politics  from instapaper
11 weeks ago
WWW Malware Hides in Images - Schneier on Security
In this particular scenario, malvertising campaign operators hid malicious code inside PNG images used for banner ads.
security  malware  from instapaper
11 weeks ago
Op-ed: Why I’m not giving up on PGP | Ars Technica
Every once in a while, a prominent member of the security community publishes an article about how horrible OpenPGP is. Matthew Green wrote one in 2014 and Moxie Marlinspike wrote one in 2015. The most recent was written by Filippo Valsorda, here on the pages of Ars Technica, which Matthew Green says "sums up the main reason I think PGP is so bad and dangerous."
In this article I want to respond to the points that Filippo raises. In short, Filippo is right about some of the details, but wrong about the big picture. For the record, I work on GnuPG, the most popular OpenPGP implementation.
security  OpenPGP  PGP 
11 weeks ago
Op-ed: I’m throwing in the towel on PGP, and I work in security | Ars Technica
After years of wrestling with GnuPG with varying levels of enthusiasm, I came to the conclusion that it's just not worth it, and I'm giving up—at least on the concept of long-term PGP keys. This editorial is not about the gpg tool itself, or about tools at all. Many others have already written about that. It's about the long-term PGP key model—be it secured by Web of Trust, fingerprints or Trust on First Use—and how it failed me.
security  OpenPGP  PGP 
11 weeks ago
Giving Up on PGP - Schneier on Security
Filippo Valsorda wrote an excellent essay on why he's giving up on PGP.
security  OpenPGP  PGP 
11 weeks ago
10+ WordPress hacks to enhance your dashboard
In WordPress, the dashboard is a very important part, as it is where you - the admin - publish content and control everything about your blog. In this article, I have compiled over 10 WordPress hacks and code snippets to enhance your WordPress dashboard.
WordPress  admin  dashboard  hacks 
11 weeks ago
Desktop Zero: How To Manage Unproductive Digital Clutter
I used to have many files scattered across my computer desktop, making my immediate files easy to find. Or so I thought. While fighting tight deadlines, I came to realize that finding that one vital file amid the mess on my desktop was a slog. Wasn’t the point of having folders and files right in front me the purpose of having a desktop at all?
desktop  files  productivity 
11 weeks ago
REM vs EM – The Great Debate | Zell Liew
One of the best practices to typography on the web is to use relative units like rem and em. The question is, which should you use? There’s been a longstanding debate between rem supporters and em supporters, believing that you should use one over the other. In this article, you’re going to find my take on rem vs em. You’re also going to learn exactly what rem and em are, and how to use them to build modular components.
CSS  rem  em 
11 weeks ago
10 minuti al giorno che ti cambiano la vita
Concentrazione, calma, chiarezza nella propria vita. Chi non ne vorrebbe di più? Eppure basterebbe veramente poco per raggiungere questo obiettivo.
meditation  from instapaper
11 weeks ago
Class Breaks
There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of systems. Examples might be a vulnerability in a particular operating system that allows an attacker to take remote control of every computer that runs on that system's software. Or a vulnerability in Internet-enabled digital video recorders and webcams that allow an attacker to recruit those devices into a massive botnet.
security  Internet  from instapaper
11 weeks ago
DIY WordPress Popular Posts
What I wanted was a simple way of counting hits and displaying a simple list of the most popular posts. This DigWP tutorial explains how to do it with two easy steps.
WordPress  from pocket
11 weeks ago
Photocopier Security - Schneier on Security
A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that drive. This means that when a photocopier is thrown away, that hard drive is filled with pages that the machine copied over its lifetime. As you might expect, some of those pages will contain sensitive information.
security  hardware 
12 weeks ago
Elementary icons for kde | KDE and LINUX
I’ll port the elementary icon set to KDE
KDE  icons 
12 weeks ago
Violare il copyright è naturale - Il Post
Ma possiamo farlo? Possiamo prendere una poesia che ci è piaciuta e ricopiarla su un blog? Possiamo fare su internet, in maniera spontanea e libera, ciò che ai tempi del liceo facevamo con le audiocassette? Possiamo insomma raccontare noi stessi utilizzando i libri, la musica, le opere d’arte come mediatori sentimentali e attraverso questo tipo di contenuti altrui diventare noi stessi dei piccoli produttori culturali? La risposta è no, non possiamo. Se decidiamo di farlo ugualmente, con ogni probabilità violeremo la legge sul diritto d’autore. E poiché è indubbio che di doveri verso gli altri ne abbiamo molto bisogno, ma di diritti per noi stessi ancora di più, la legge sul diritto d’autore, dopo internet, dovrà essere cambiata.
copyright 
12 weeks ago
WordPress: perché usare l’approccio OOP | Gabriele Romanato
In questo articolo introdurremo alcuni dei concetti chiave per programmare in modo object-oriented in WordPress. Un requisito necessario è la conoscenza dell’OOP in PHP oltre che la conoscenza di base del funzionamento di WordPress.
WordPress  OOP  PHP  via:flydiigo 
12 weeks ago
Use a specific SSH key with a domain - Mte90.Net
You are a developer but you don’t want to share your key with hosting for safety but also to enable others to easily access.
SSH  domain 
12 weeks ago
Telefonino nuovo? Mettetegli un cane da guardia. Ma pensateci bene | Il Disinformatico
Uno studente di cinematografia olandese, dopo aver subìto il furto di un iPhone, ha deciso installare Cerberus su un Android e ha lasciato che il telefonino gli venisse rubato, per poi documentare come veniva utilizzato. Il risultato è un documentario di 21 minuti, Find My Phone.
phone  Cerberus 
12 weeks ago
Prismatic — WordPress Plugins
Display beautiful syntax-highlighted code snippets with Prism.js or Highlight.js.
WordPress  plugin  code 
12 weeks ago
WordPress Table Prefix: Changing It Does Nothing to Improve Security
Changing your WordPress table prefix is risky to implement and it does absolutely nothing to enhance your site security. In today’s post I’m going to explain what the original idea is behind this and why you should simply not do it.
WordPress  security  database  prefix 
12 weeks ago
How Signal Is Evading Censorship - Schneier on Security
Signal, the encrypted messaging app I prefer, is being blocked in both Egypt and the UAE. Recently, the Signal team developed a workaround: domain fronting.
Signal  messaging  security  Google 
12 weeks ago
9 Tools to Monitor Linux Disk Partitions and Usage in Linux
In this article, we will review a number of Linux command line utilities that you can use to check disk partitions in Linux.
partitions  tools 
12 weeks ago
Creating the perfect GPG keypair - Alex Cabal
You’d think that today, where laptops and world travel are commonplace, there’d be a little more information on how to secure a private key you have to travel with. But I could only find one resource: the Debian Wiki entry on subkeys. Fortunately it turns out this wiki page has exactly the solution we need.
OpenPGP  keypair  subkeys  GnuPG  security 
12 weeks ago
Screencast con ffmpeg e audio « Tecnologia e non solo
Per catturare il desktop uso il comando ffmpeg -r 15 -s 1680x1050 -f x11grab -i :0.0 -vcodec libx264 -vpre lossless_fast -crf 30 -threads 2…
ffmpeg  screencast  from instapaper
12 weeks ago
Introduction To URL Rewriting - Smashing Coding
Many Web companies spend hours and hours agonizing over the best domain names for their clients. They try to find a domain name that is relevant and…
rewrite  Apache  URL  from instapaper
12 weeks ago
Create WordPress Plugins with OOP Techniques | Nettuts+
Object-oriented code, among other things, can help organize and add reusability to your code. In this tutorial, I will teach you the basics of writing a…
OOP  PHP  development  from instapaper
12 weeks ago
Licenses - Choose a License
Home Open source licenses grant permission to everyone to use, modify, and share licensed software for any purpose, subject to conditions preserving the…
license  open_source  from instapaper
december 2016
What Are the Three Trees? Find Out in Our New Course on Git Basics
Git has become the most widely used system for version control and sharing code. If you want to help build open-source software, or if you want to work on a…
Git  from instapaper
september 2016
Turtl: Secure, Open Source Evernote Alternative
| Posted: August 16, 2016 | Updated: 2016-09-05T13:43:31Z Turtl is a secure, open source Evernote alternative, available for Linux, Windows, Mac, and Android.…
notes  Evernote  from instapaper
august 2016
30 days in a terminal: Day 1 — The essentials
Home Applications Linux About | Bryan is a writer and works as the Social Media Marketing Manager of SUSE. On this blog, he seeks to highlight the coolest…
terminal  from instapaper
june 2016
Typography Handbook
A concise, referential guide on best web typographic practices.
typography  webdev  webdesign  CSS  from instapaper
june 2016
How to Create Retina Display Image Assets for Better Looking Websites
May 29 Posted on May 29, 2016 by in Tips & Tricks | You’ve invested a lot of time into making your new website perfect, so why does it look so fuzzy when you…
webdev  from instapaper
may 2016
Considerations for styling the pre tag
You’ve probably used it. It’s that very special tag in HTML that allows for the white space within the tags to actually be honored. For example, four spaces will actually be four spaces! That’s unlike how HTML normally works, where white space “collapses” (the four spaces will become one). The pre tag is useful indeed.
webdev  webdesign  from pocket
may 2016
Constant Phone Notifications Are Ruining Your Productivity
Have you heard? Multitasking is so last year. New research has begun to suggest that becoming a GTD all star doesn’t necessarily mean doing it all, all at once.…
productivity  from instapaper
may 2016
Understanding The Concept Of Visibility In Object Oriented PHP
I’ve been writing a lot recently about principles of object-oriented programming (OOP) in PHP, including magic methods . OOP is great in that it promotes…
OOP  PHP  development  from instapaper
may 2016
WordPress OOP Introduction
In this article I will be creating a reusable class-encapsulated functions.php file, that you can use for your future WordPress sites.
webdev  WordPress  OOP  from pocket
may 2016
Truly Fluid Typography With vh And vw Units – Smashing Magazine
Embracing fluid typography might be easier than you think. It has wide browser support, is simple to implement and can be achieved without losing control over…
webdev  webdesign  CSS  from instapaper
may 2016
Optimizing Google PageSpeed to 100 in WordPress
What You'll Be Creating How to Reach a PageSpeed of 100 Welcome to part two of our series on Google PageSpeed. In the first episode , I optimized the PageSpeed…
webdev  from instapaper
may 2016
« earlier      
activism admin allo antivirus apache audiolibri camera cerberus certificate cia code color copyright cryptography css dashboard database desktop development devices domain em encryption escape evernote ffmpeg files git gmail gnupg google gpl hacks hardware htaccess human_rights icons internet kde keypair latex leaks license licenses mail malware material_design meditation messaging messenger note notes notetaking oop open_source openpgp palette partitions pgp phone photo php plugin politics prefix print privacy productivity proof raspberrypi rem rewrite screencast security server signal signature ssh ssl subkeys telegram template terminal tls tools trello truecrypt typography url veracrypt via:flydiigo vpn webdesign webdev whatsapp wikileaks wordpress working wp_query zoho

Copy this bookmark:



description:


tags: