How To

HOW TO

Bolt-On Security the Linux Way

In this piece, I aim to provide a range of simple but effective options for encrypting a small number of files. In particular, these options are salient for use cases like tax filing, where users are sending sensitive documents to recipients with an unknown degree of technical proficiency. Fond as I...

Picking the ideal Linux distribution takes research and planning. Not because Linux is a challenge. Rather, the Linux OS offers a seemingly unending selection of distributions to meet general computing as well as special needs for enterprise, SMBs, and personal use.

In spite of being a beloved companion to computer hobbyists the world over, the Raspberry Pi doesn't get enough credit. In fact, single-board computers of all stripes haven't gotten their due -- I just happen to have a Raspberry Pi.

For the majority of consumers, cutting the cable TV cord is a mixed bag for a variety of reasons. The big misconception is that you will drastically lower your cable bill. That is not the case unless you can also pickup free TV reception from an antenna. Otherwise, you will need to use a video strea...

This piece is a demonstration of one means of setting up file-level encryption which is widely available for Linux desktop users. To offer a similar encryption scheme to as many users as possible, we'll walk through how to use fscrypt to create an encrypted filesystem. While simple, fscrypt offers m...

To deliver exceptional customer experiences at-scale, retailers need to have their finger on the pulse of changing consumer expectations. Modern consumers expect checkout to be seamless and safe, no matter the digital channel or their geographic location. Let's look at best practices that retailers ...

With hurricane season in full bloom and the additional prospect of natural disasters, the importance for companies to have disaster data plans in place is paramount. TechNewsWorld discussed disaster preparedness with a panel of IT experts. Check out their recommendations -- and make sure that you ha...

HOW TO

Digital Security Is as Easy as PGP

Average computer users would be forgiven for not having any idea what PGP is. There is so much going on below the surface of the modern computing experience that even critically important security tools like PGP are tucked away. To be sure, there are specialized circles that make regular explicit us...

HOW TO

Back to the RSS Future

For understandable reasons, people feel worn down by the volume and composition of the media coming at them. This fatigue stems from a few compounding factors. There is a strong perception that the character of the information presented by the media is warped by highly polarized players. Nearly two-...

Your opinion on the TikTok controversy: ban, regulate, or maintain status quo?
Loading ... Loading ...