I'm writing this in a hotel room entered through two doors. The hall door
is the normal kind: you stick a card in a slot, a light turns green, and the
door unlocks. The inner one is three inches thick, has no lock and serves a
single purpose: protection from an explosion. more>>
There's an old quote from Jamie Zawinkski that goes: "Some people, when confronted with a problem, think ‘I know, I'll use regular expressions.’ Now they have two problems." Even people like me who like regular expressions laugh at the truth in that quote, because we've seen the consequences when someone doesn't think through the implications of a poorly written pattern. When some people write a bad pattern, they end up with extra lines in a log file. When the NSA does it, they capture and retain Internet traffic on untold numbers of innocent people.
I don't know how many readers know this, but my very first Linux
column ("Browse the Web without a Trace", January 2008) was about how
to set up and use Tor. Anonymity and privacy on the Internet certainly
take on a different meaning in the modern era of privacy-invading
software and general Internet surveillance. more>>
We've covered Tor in LJ before (see Kyle Rankin's "Browse the Web without a Trace", January 2008), but that was some time ago, and this subject seems to be more timely with each passing day. Also, with Tor being at only 0.2.x status, it still qualifies as software in development, so I'm justified in featuring it this month. more>>
In the early hours of June 18 the Electronic Frontier Foundation and the Tor Project released a beta of a Firefox extension dubbed “HTTPS Everywhere” with the intention of providing encryption of user data when visiting certain sites. According to the official announcement, “HTTPS Everywhere” will provide SSL encryption to sites like Google Search, Wikipedia, Twitter and Identi.ca, and Facebook. more>>
As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.
Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.
In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.