7-Year-Old Samba Flaw Lets Hackers Access Thousands of Linux PCs Remotely
A 7-year-old critical remote code execution vulnerability has been discovered in Samba networking software that could allow a remote attacker to take control of an affected Linux and Unix machines.
security  Samba 
2 days ago
WannaCry Ransomware: Everything You Need To Know Immediately
The only positive thing about this attack is that — you are here — as after reading this easy-to-understandable awareness article, you would be so cautious that you can save yourself from WannaCry, as well as other similar cyber attacks in the future.
security  malware  ransomware 
12 days ago
Journey to the centre of the Earth | Visual.ly
How far would you have to travel to reach the Earth's core? And what would you see along the way? Discover what lies beneath...
15 days ago
Installing Neon on top of Kubuntu without reinstall • KDE Community Forums
So I have decided to install Neon on top of my Kubuntu-16.04 (+ backports PPA + libreoffice PPA).
KDE  KDE-Neon  Kubuntu 
22 days ago
How to upgrade kubuntu 16.04 -> KDE neon
How to upgrade kubuntu 16.04 -> KDE neon
KDE  KDE-Neon  Kubuntu 
22 days ago
Cronaca di un attacco di ransomware: in chat con i criminali
Quello che segue è un racconto di un grave attacco informatico a un'azienda che ho seguito personalmente come giornalista, arrivando a dialogare con gli aggressori, ma è soprattutto un promemoria del fatto che storie come questa possono capitare a chiunque e dovunque e hanno conseguenze pesanti per chi non fa prevenzione.
malware  ransomware 
5 weeks ago
A successful Git branching model » nvie.com
In this post I present the development model that I’ve introduced for some of my projects (both at work and private) about a year ago, and which has turned out to be very successful. I’ve been meaning to write about it for a while now, but I’ve never really found the time to do so thoroughly, until now. I won’t talk about any of the projects’ details, merely about the branching strategy and release management.
Git  workflow  development  programming 
5 weeks ago
Redirect Query String via .htaccess
This quick tutorial aims to clear up any confusion and explains how to redirect any URL based on its query string.
Apache  redirect 
5 weeks ago
Wikileaks CIA Files - What this means for Internet security and encryption - ProtonMail Blog
Earlier today, Wikileaks dumped a large database of secret documents from the CIA in a released dubbed #Vault7. Here we do a deeper analysis of the leak and the broader implications on online security and encrypted services.
security  encryption  wikileaks  cia  leaks 
11 weeks ago
"Proof Mode" for your Smartphone Camera
ProofMode is an app for your smartphone that adds data to the photos you take to prove that they are real and unaltered
photo  camera  proof  signature  security 
12 weeks ago
E-Ink Tablets | Digital Paper & Notepads | Sony US
In a world overwhelmed with paper, Sony introduces a revolutionary way to work. Digital Paper from Sony, in conjunction with a cloud service, gives you the power to annotate, share, and save your documents – all from a handy device that's light enough to carry anywhere.
notetaking  notes  hardware  devices 
february 2017
reMarkable | The paper tablet
The paper tablet for people who prefer paper. Here to replace your notebooks, sketchbooks and printouts. Paper-like reading, writing and sketching with digital powers.
notetaking  notes  devices  hardware 
february 2017
“These 25 Productivity Principles Will Change How You Work Forever”
Everyone struggles to get work done everyday. Here is a summary of all you need to know and do to get real work done everyday without losing your mind.
february 2017
My Google Keep 2017 Wishlist
I then decided to... (insert drum roll sound effect) ...stick with Google. Meaning, using Google Keep for all kinds of lists and notes, and Google Drive for longer drafts.
productivity  Google  note  notetaking 
february 2017
A Straightforward Guide to the WordPress Template Hierarchy - WPMU DEV
In this post I’ll walk you through the template hierarchy and explain how it works with some worked examples. By the time you’ve read through this you should be able to create theme template files like a pro!
WordPress  template  webdev  webdesign 
february 2017
Material Design Color Palette Generator - Material Palette
Making over your site’s typography isn’t just about finding the right font or size. Nope, it’s also about finding the right color. If you haven’t experimented with this Material Design Palette yet, take a moment to do so now. You’ll see that regardless of which branding colors you select, the primary and secondary font color are always black or a shade of grey.
color  palette  icons  material_design  webdesign  webdev 
february 2017
TCnext - Site dedicated to the development of the next "truecrypt"
TrueCrypt.ch is the gathering place for all up-to-date information. Unfortunately TrueCrypt.org is dead. But, we (the pure-privacy people) will help organize a future.
TrueCrypt  security  cryptography 
february 2017
VeraCrypt - Home
VeraCrypt is a free disk encryption software brought to you by IDRIX and that is based on TrueCrypt 7.1a.
TrueCrypt  security  cryptography  VeraCrypt 
february 2017
TrueCrypt 7.1a Hashes
The SHA256, SHA1, and MD5 hashes of all TrueCrypt version 7.1a files.
TrueCrypt  security  cryptography 
february 2017
Perché ho detto ai miei amici di non usare più WhatsApp e Telegram
Un confronto sulle impostazioni di privacy delle app di messaggistica.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
january 2017
Tactical Technology Collective
Tactical Tech is a non profit that explores the political and social role of technology in our lives.
activism  privacy 
january 2017
Home | Me and my Shadow
Through your computer, mobile phone, and other digital devices, you leave behind hundreds of digital traces (also called data traces) every day: bits of information about you that are created, stored, and collected.  When your digital traces are put together to create stories about you or profiles of you, these become your digital shadows. These can give others huge insight into your life; and they can also be totally wrong. Either way, once they're out there, they are almost impossible to control....
privacy  security 
january 2017
security in-a-box | tools and tactics for digital security
Security in-a-Box is a guide to digital security for activists and human rights defenders throughout the world.
security  privacy  activism  human_rights 
january 2017
Welcome to the United States of Emergency
Today marks the first day of a disaster on a scale that until a few months ago was beyond our imagination.
politics  from instapaper
january 2017
Create a Print-Friendly Page with Gutenberg.css - Hongkiat
On informational websites it’s still a good practice to offer a custom print stylesheet. Thankfully, you don’t need to design your own because Gutenberg is here to help.
CSS  webdev  print 
january 2017
“Why I told my friends to stop using WhatsApp and Telegram”
Reading the above, you might think you are fine since WhatsApp, Facebook Messenger, and Google Allo also use the Signal Protocol. Well, you’re not.
security  messaging  WhatsApp  Telegram  Allo  Messenger  Signal 
january 2017
Moving to HTTPS on WordPress | CSS-Tricks
I just recently took CSS-Tricks "HTTPS everywhere". That is, every URL on this site enforces the HTTPS (SSL) protocol. Non-secure HTTP requests get redirected to HTTPS. Here's some notes on that journey.
security  Apache  SSL  server  TLS 
january 2017
Sortd transforms your email into organized lists.
Gmail  mail  productivity 
january 2017
Why Deep Work Helps You Get More Done in Less Time
Deep work doesn’t just help you get more done in less time. It significantly improves the quality of your life.
productivity  working 
january 2017
Dario Taraborelli: The Beauty of LaTeX
There are several reasons why one should prefer LATEX to a WYSIWYG word processor like Microsoft Word: portability, lightness, security are just a few of them (not to mention that LATEX is free).
january 2017
An SQL Injection Attack Is a Legal Company Name in the UK - Schneier on Security
Someone just registered their company name as ; DROP TABLE "COMPANIES";-- LTD.
january 2017
Should I escape translated strings in a WordPress plugin or theme? - James Collins
When writing a WordPress plugin recently, I wasn’t sure whether a translatable text/string is considered safe, or if it needs to escaped before being output.
security  WordPress  escape 
january 2017
La “Venexit” e l’insegnamento del dialetto veneto nelle scuole | Alex's Brain Dump
Questa scelta è stata fatta da una maggioranza di anziani, spesso pensionati, che si sentono deboli ed hanno paura di tutto. Persone che hanno paura soprattutto di ciò che non somiglia loro e di ciò che non sanno comprendere: stranieri, “immigrati”, “clandestini” e via dicendo. Persone nostalgiche e spesso paranoiche che si sono sentite in diritto di scaricare le loro paure ed il loro odio per gli “alieni” sulle spalle delle generazioni che dovranno subire il peso delle loro scelte scellerate.
politics  from instapaper
january 2017
WWW Malware Hides in Images - Schneier on Security
In this particular scenario, malvertising campaign operators hid malicious code inside PNG images used for banner ads.
security  malware  from instapaper
january 2017
Op-ed: Why I’m not giving up on PGP | Ars Technica
Every once in a while, a prominent member of the security community publishes an article about how horrible OpenPGP is. Matthew Green wrote one in 2014 and Moxie Marlinspike wrote one in 2015. The most recent was written by Filippo Valsorda, here on the pages of Ars Technica, which Matthew Green says "sums up the main reason I think PGP is so bad and dangerous."
In this article I want to respond to the points that Filippo raises. In short, Filippo is right about some of the details, but wrong about the big picture. For the record, I work on GnuPG, the most popular OpenPGP implementation.
security  OpenPGP  PGP 
january 2017
Op-ed: I’m throwing in the towel on PGP, and I work in security | Ars Technica
After years of wrestling with GnuPG with varying levels of enthusiasm, I came to the conclusion that it's just not worth it, and I'm giving up—at least on the concept of long-term PGP keys. This editorial is not about the gpg tool itself, or about tools at all. Many others have already written about that. It's about the long-term PGP key model—be it secured by Web of Trust, fingerprints or Trust on First Use—and how it failed me.
security  OpenPGP  PGP 
january 2017
Giving Up on PGP - Schneier on Security
Filippo Valsorda wrote an excellent essay on why he's giving up on PGP.
security  OpenPGP  PGP 
january 2017
10+ WordPress hacks to enhance your dashboard
In WordPress, the dashboard is a very important part, as it is where you - the admin - publish content and control everything about your blog. In this article, I have compiled over 10 WordPress hacks and code snippets to enhance your WordPress dashboard.
WordPress  admin  dashboard  hacks 
january 2017
Desktop Zero: How To Manage Unproductive Digital Clutter
I used to have many files scattered across my computer desktop, making my immediate files easy to find. Or so I thought. While fighting tight deadlines, I came to realize that finding that one vital file amid the mess on my desktop was a slog. Wasn’t the point of having folders and files right in front me the purpose of having a desktop at all?
desktop  files  productivity 
january 2017
REM vs EM – The Great Debate | Zell Liew
One of the best practices to typography on the web is to use relative units like rem and em. The question is, which should you use? There’s been a longstanding debate between rem supporters and em supporters, believing that you should use one over the other. In this article, you’re going to find my take on rem vs em. You’re also going to learn exactly what rem and em are, and how to use them to build modular components.
CSS  rem  em 
january 2017
10 minuti al giorno che ti cambiano la vita
Concentrazione, calma, chiarezza nella propria vita. Chi non ne vorrebbe di più? Eppure basterebbe veramente poco per raggiungere questo obiettivo.
meditation  from instapaper
january 2017
Class Breaks
There's a concept from computer security known as a class break. It's a particular security vulnerability that breaks not just one system, but an entire class of systems. Examples might be a vulnerability in a particular operating system that allows an attacker to take remote control of every computer that runs on that system's software. Or a vulnerability in Internet-enabled digital video recorders and webcams that allow an attacker to recruit those devices into a massive botnet.
security  Internet  from instapaper
january 2017
DIY WordPress Popular Posts
What I wanted was a simple way of counting hits and displaying a simple list of the most popular posts. This DigWP tutorial explains how to do it with two easy steps.
WordPress  from pocket
january 2017
Photocopier Security - Schneier on Security
A modern photocopier is basically a computer with a scanner and printer attached. This computer has a hard drive, and scans of images are regularly stored on that drive. This means that when a photocopier is thrown away, that hard drive is filled with pages that the machine copied over its lifetime. As you might expect, some of those pages will contain sensitive information.
security  hardware 
january 2017
Elementary icons for kde | KDE and LINUX
I’ll port the elementary icon set to KDE
KDE  icons 
january 2017
Violare il copyright è naturale - Il Post
Ma possiamo farlo? Possiamo prendere una poesia che ci è piaciuta e ricopiarla su un blog? Possiamo fare su internet, in maniera spontanea e libera, ciò che ai tempi del liceo facevamo con le audiocassette? Possiamo insomma raccontare noi stessi utilizzando i libri, la musica, le opere d’arte come mediatori sentimentali e attraverso questo tipo di contenuti altrui diventare noi stessi dei piccoli produttori culturali? La risposta è no, non possiamo. Se decidiamo di farlo ugualmente, con ogni probabilità violeremo la legge sul diritto d’autore. E poiché è indubbio che di doveri verso gli altri ne abbiamo molto bisogno, ma di diritti per noi stessi ancora di più, la legge sul diritto d’autore, dopo internet, dovrà essere cambiata.
january 2017
WordPress: perché usare l’approccio OOP | Gabriele Romanato
In questo articolo introdurremo alcuni dei concetti chiave per programmare in modo object-oriented in WordPress. Un requisito necessario è la conoscenza dell’OOP in PHP oltre che la conoscenza di base del funzionamento di WordPress.
WordPress  PHP  OOP 
december 2016
Use a specific SSH key with a domain - Mte90.Net
You are a developer but you don’t want to share your key with hosting for safety but also to enable others to easily access.
SSH  domain 
december 2016
Telefonino nuovo? Mettetegli un cane da guardia. Ma pensateci bene | Il Disinformatico
Uno studente di cinematografia olandese, dopo aver subìto il furto di un iPhone, ha deciso installare Cerberus su un Android e ha lasciato che il telefonino gli venisse rubato, per poi documentare come veniva utilizzato. Il risultato è un documentario di 21 minuti, Find My Phone.
phone  Cerberus 
december 2016
Prismatic — WordPress Plugins
Display beautiful syntax-highlighted code snippets with Prism.js or Highlight.js.
WordPress  plugin  code 
december 2016
WordPress Table Prefix: Changing It Does Nothing to Improve Security
Changing your WordPress table prefix is risky to implement and it does absolutely nothing to enhance your site security. In today’s post I’m going to explain what the original idea is behind this and why you should simply not do it.
WordPress  security  database  prefix 
december 2016
How Signal Is Evading Censorship - Schneier on Security
Signal, the encrypted messaging app I prefer, is being blocked in both Egypt and the UAE. Recently, the Signal team developed a workaround: domain fronting.
Signal  messaging  security  Google 
december 2016
9 Tools to Monitor Linux Disk Partitions and Usage in Linux
In this article, we will review a number of Linux command line utilities that you can use to check disk partitions in Linux.
partitions  tools 
december 2016
Creating the perfect GPG keypair - Alex Cabal
You’d think that today, where laptops and world travel are commonplace, there’d be a little more information on how to secure a private key you have to travel with. But I could only find one resource: the Debian Wiki entry on subkeys. Fortunately it turns out this wiki page has exactly the solution we need.
OpenPGP  keypair  subkeys  GnuPG  security 
december 2016
Screencast con ffmpeg e audio « Tecnologia e non solo
Per catturare il desktop uso il comando ffmpeg -r 15 -s 1680x1050 -f x11grab -i :0.0 -vcodec libx264 -vpre lossless_fast -crf 30 -threads 2…
ffmpeg  screencast  from instapaper
december 2016
Introduction To URL Rewriting - Smashing Coding
Many Web companies spend hours and hours agonizing over the best domain names for their clients. They try to find a domain name that is relevant and…
rewrite  Apache  URL  from instapaper
december 2016
Create WordPress Plugins with OOP Techniques | Nettuts+
Object-oriented code, among other things, can help organize and add reusability to your code. In this tutorial, I will teach you the basics of writing a…
OOP  PHP  development  from instapaper
december 2016
Licenses - Choose a License
Home Open source licenses grant permission to everyone to use, modify, and share licensed software for any purpose, subject to conditions preserving the…
license  open_source  from instapaper
december 2016
What Are the Three Trees? Find Out in Our New Course on Git Basics
Git has become the most widely used system for version control and sharing code. If you want to help build open-source software, or if you want to work on a…
Git  from instapaper
september 2016
Turtl: Secure, Open Source Evernote Alternative
| Posted: August 16, 2016 | Updated: 2016-09-05T13:43:31Z Turtl is a secure, open source Evernote alternative, available for Linux, Windows, Mac, and Android.…
notes  Evernote  from instapaper
august 2016
30 days in a terminal: Day 1 — The essentials
Home Applications Linux About | Bryan is a writer and works as the Social Media Marketing Manager of SUSE. On this blog, he seeks to highlight the coolest…
terminal  from instapaper
june 2016
Typography Handbook
A concise, referential guide on best web typographic practices.
typography  webdev  webdesign  CSS  from instapaper
june 2016
How to Create Retina Display Image Assets for Better Looking Websites
May 29 Posted on May 29, 2016 by in Tips & Tricks | You’ve invested a lot of time into making your new website perfect, so why does it look so fuzzy when you…
webdev  from instapaper
may 2016
Considerations for styling the pre tag
You’ve probably used it. It’s that very special tag in HTML that allows for the white space within the tags to actually be honored. For example, four spaces will actually be four spaces! That’s unlike how HTML normally works, where white space “collapses” (the four spaces will become one). The pre tag is useful indeed.
webdev  webdesign  from pocket
may 2016
« earlier      
activism admin allo antivirus apache audiolibri camera cerberus certificate cia code color copyright cryptography css dashboard database desktop development devices domain em encryption escape evernote ffmpeg files git gmail gnupg google gpl hacks hardware htaccess human_rights icons internet kde kde-neon keypair kubuntu latex leaks license licenses mail malware material_design meditation messaging messenger note notes notetaking oop open_source openpgp palette partitions pgp phone photo php plugin politics prefix print privacy productivity programming proof ransomware raspberrypi redirect rem rewrite samba science screencast security server signal signature ssh ssl subkeys telegram template terminal tls tools trello truecrypt typography url veracrypt vpn webdesign webdev whatsapp wikileaks wordpress workflow working wp_query zoho

Copy this bookmark: