Tagged: Security

Hoodie hacker behind a laptop 0

SSL: What is it? Do I need it?

SSL (Secure Socket Layer) is the industry standard to secure a link between two computers, usually server and client. SSL and its successor TLS are so your first choice, but do you really need it? And...

Linux penguins 0

Linux 4.2 will enable you to update your firmware

After the jump from 3.19 to 4.0 this year, after the not-so-exciting 4.1 version that introduced EXT4 encryption thanks to Google, the penguin is approaching version 4.2. With that said, this release might be closer than...

Occupy Flash 0

Adobe Flash is suddenly heading to exit

It was 2005 when YouTube was launched, it seems like yesterday but 10 years have passed. YouTube wouldn’t however have been possible without a special cross-browser plugin: Adobe Flash Player.

security permissions 0

Special Permissions: Sticky Bit, SUID and SGID

Sticky Bit, SUID and SGID are special permissions used in Unix-like systems, hence in Linux. Knowing how to use and why one should use them isn’t necessarily fundamental to understand basic permissions in Linux, however they...

Bitcoin wallet 0

How to set up a Bitcoin wallet

Well well well, you’ve heard of Bitcoin or read this article and now you want to get started. You’ve come in the right place; the first step, though it may seem trivial, is crucial to get...

Bitcoin network 0

What are Bitcoins?

One trending topic recently has been Bitcoin, and when I say recently I mean more than a year. I’ve had many friends coming at me to ask “Hey… mark, since you are into that stuff, do...

Linux Permissions 0

Linux permissions: chown, chgrp and chmod

Second post dedicated to Linux file system permissions, in this post you’ll learn how to see and modify permissions with the terminal. If you missed the first one, here’s the link.

file system permissions archive 0

Understanding Linux permissions

Whoever heard of Linux has heard of its ironclad security, or that when you use Ubuntu you won’t get any viruses or the likes. File system permissions is a key part (but not the most important)...