For the better part of my career, my areas of concentration and expertise have been intellectual freedom, copyright (and copyleft), free and open source software, open access and net neutrality. But because I also have expertise in technology, people often ask me if I think e-books should replace print. They assume I would be a fan of digital books replacing paper and ink.
Personally, I prefer print books, but let us put my personal feelings aside for a moment.
Continue reading Why Print Still Rules: The Fading Legacy of E-Books
DDoS attacks on major corporations, popular websites and even governments of countries often make big news in the tech industry. Often times sites that seemed to be on top of security are brought to their knees and find themselves totally at the mercy of their attackers. Of all the types of security violations against a website, DDoS is one of the most powerful and effective.
What is DDoS?
DoS stands for Denial of Service and is a type of attack that seeks to flood a web server with so much traffic that it either causes the server to shut down or simply prevents legitimate users from accessing it. A DDoS or Distributed Denial of Service is one that involves multiple machines all attacking a single victim. The initiators of DDoS attacks often used covert methods, such as malware to infect other machines and use them to unwillingly carry out their attacks. In many cases the agents of these attacks are not even aware that they are being used.
Continue reading DDoS Protection and Mitigation on Modern Web Hosting Technology
KDE Plasma Workspaces provide a graphical interface and lots of eye candy for the desktop Linux experience. Many would argue that it is equal to or even better at this than Microsoft Windows and Mac OS X. KDE, however, is not only a graphical frontend for Linux. It comes with a set of applications and also with a set of system administration tools that can help power users take control of their desktops or laptops without dropping to the command line.
KDE administration tools are primarily located in System Settings. Start system settings by clicking on the kickoff (K) launcher button and selecting “System Settings” or by pressing Alt+F2 and typing “System Settings”. If, for some reason, you cannot find it, the command path is /usr/bin/systemsettings.
Continue reading Managing Users with KDE
File encryption is not just the stuff of spy movies. There are plenty of practical reasons why you might decide to encrypt a single file, multiple files, or even an entire drive. If you keep sensitive digital copies of financial information such as bank statements and tax returns, you can encrypt them to make sure unauthorized users cannot get to them. You may just have documents, such as your first novel, that you do not want anyone to see. Encryption provides an extra layer of security that simple password protection cannot.
Continue reading Secure and Encrypt Your Files with Truecrypt
I was writing an article that had a section about Windows Media Center, and I came across this error when searching their site on Google:
“This means that the security credentials of the server presented absolutely should not be trusted.”
I don’t know if this is Google Chrome’s way of saying the SSL certificate has expired or not. “Revoked” seems rather harsh, unless the issuer truly snatched the certificate from Microsoft’s hands.
Is this true or just Google’s latest strategy to overthrow the mighty Microsoft?