In 2009 I wrote an article on security. The best that I could find online to encrypt their files was TrueCrypt, at the time was a safe & software. I can not say the same thing seven years later. The development has been arrested in 2014, but good news there. I could recommend a list of software that do the same thing, but I would not do is leave open questions and invite people to spend time (time that I have already spent). For this reason I will not go further and recommend a project fork that has been followed to the present day. It's called VeraCrypt (the latest release to date is dated October 2016).
Cencellare command history from the history of the terminal is a simple operation. Default, the last 500 commands type in termilane are stored in the hidden file "
.bash_history". The previously typed commands can be read quickly by using the arrow keys ("freccia its" and "down arrow"). This makes it easy to invoke a command recently typed, but it could be a security issue if that session was used by more people. So how does one delete the command history?
After being absent from the blog for the whole month of August, and half of September back at breakneck speed with the usual weekly article. Today we talk about privacy.
The terminal Linux è fantastico, with just a few commands we can have full control over the computer. Vediamo ora nel dettaglio come delete the login information per il computer sul quale siamo loggati.
Years ago I became interested in creation of an internet point using an older pc and a any linux distribution. On that occasion I used Opera, a free browser (the open source) that integrated and integrates still one of the best ways "kiosk".
Since then it's been almost three years, Opera has evolved and continues to integrate the kiosk mode, but steadily growing new projects open source they make their way.
I'm talking about OpenKiosk.
Literally the term "Steganography" from etymological dictionary means "the art of writing in figures, because the script is still secret and unknown to those who do not have the key". Typically quansiasi type of encrypted message may be referred steganographic. The oldest steganographic technique dates back a few thousand years ago (the term itself is derived from the ancient greek), was to use common lemon juice instead of ink. Those who received the letter secret was to bring the paper to a source of heat or an open flame. The parties spent with the lemon juice would not be blackened, while the paper is.
In the previous article we mentioned the technique of quickly '"invisible watermark", a technique that would allow us to prove paternity of a digital photograph. The operation (as already described) is simple. The underlying principle of all is to have a picture "x" (my original photo I just have to keep) and create a picture "and" (the photo that contains the watermark invisible to circulate in internet). To prove to be the author of the photo just to compare a particular procedure by superimposing the two graphics immagni. Magically comparirà il watermark with our name and copyright information.
In today's article we deal with the deletion of data. Sometimes you get to have a huge amount of discs, accumulated over the years, which were once (not anymore) that now have no reason to exist in our drawer. Okay that storage space is never too, but drives off in a drawer I have never served very. This guide will be useful to all those who are going to sell a record, but they do not trust to the end because the user to whom you sell it might get your personal information.
At this point we must make a necessary clarification.
Today we talk about internet browsing, precisely di più server DNS. For those who do not know the DNS servers are responsible for the 'addressing of our request as a string (example "http://www.sito.com/") to the server where the site exists physically. In practice dealing with "translate" a human-perceivable address into an IP address understandable by the computer.
Keeping your data safe is important, on the web and the only obstacle that separates us from a criminal a strong password. Normally we consider a password of medium strength when a certain requirements which will then go to list. It is noted that following this step by step guide there is a possibility that the password is stolen, however,. Aside from reasons such as installing malware, could happen because the thief uses a network of supercomputer with a speed of calculation beyond expectation, but fortunately happens mainly in the field of industrial espionage.
Today's article is not intended to provide instructions to the professionals, but try to be a guide for the average user who does not want to be seen stealing personal information.