NATO Group Catfished Soldiers to Prove a Point About Privacy

With $60 and a few fake Facebook accounts, researchers were able to identify service members in a military exercise, track their movement, and even persuade them to disobey...

Read More

The Imperfect Truth About Finding Facts in a World of Fakes

It used to make sense to believe something until it was debunked; now, it makes sense to assume certain claims are fake—unless they are verified.

Read More
How Linux testing has changed and what matters today
Feb19

How Linux testing has changed and what matters today

If you’ve ever wondered how your Linux computer stacks up against other Linux, Windows, and MacOS machines or searched for reviews of Linux-compatible hardware, you’re probably familiar with Phoronix. read...

Read More
4 secrets management tools for Git encryption
Feb19

4 secrets management tools for Git encryption

There are a lot of great open source tools out there for storing secrets in Git. It can be hard to determine the right one for you and your organization—it depends on your use cases and requirements. To help you compare and choose, we’ll look at four of the most popular open source tools for secrets management and see how they stack up against each other: read...

Read More
3 tools for viewing files at the command line
Feb19

3 tools for viewing files at the command line

I always say you don’t need to use the command line to use Linux effectively—I know many Linux users who never crack open a terminal window and are quite happy. However, even though I don’t consider myself a techie, I spend about 20% of my computing time at the command line, manipulating files, processing text, and using utilities. One thing I often do in a terminal window is viewing files, whether text or word...

Read More