Cookie

Alien will turn to “deb” in “rpm” and vice versa

Today we see a small handbook for the operation of "alien”, application that converts archives "deb"To Debian in “rpm"To RedHat, and vice versa. Clearly available only for GNU / Linux. Although it is a stable software and regularly updated, “alienshould not be used for the installation of packages important for the system. Alien offers an alternative if they do not exist compiled packages for your distribution, is not suitable to replace the system libraries. (more…)

Fotoxx, image editor

Today we see a small, but very useful program for organizing and manipulating photos. Fotoxx. Like all software treaty so far, Fotoxx is an open source, without constraints nor restrictions, available for all platforms (GNU/Linux, Windows e MacOS X). [more] Fotoxx has the same features of Picasa Read more…

“Prey” for your laptop

In the previous post we have already talked about how important it is to maintain a certain amount of security on your PC, especially if there are within sensitive data the Personal Information we do not want to disclose.

As already said Prey is the best program that I have been able to find among the programs for tracking stolen pc. E’ un software open source, released under the GNU Public License v3.0 and developed natively for Linux, but also supported by Microsoft and Mac OS X. Prey helps us to rediscover our computer stolen sending emails to our address containing a real "photography"The status of the pc. Prey sends us information about: (more…)

Security: Truecrypt, rSync, Prey

Caution: This article or part of it It was integrated in 2017.

Today we are computer security. Maybe we do not know, but for those who do not use special devices to your pc is risk. If it is stolen, the thief would have free access to all sensitive data content. For this it is important to use some small measure. In the article we will deal with:

  • security not to lose the important data,
  • security not to disclose the sensitive data,
  • safety in case of theft data.

For each of these points there is a program suitable, indeed.. esise a program specially. Of course open-source. (more…)