Spammers Abuse Medium.com to Spread ‘Pirate’ Scams
Nov11

Spammers Abuse Medium.com to Spread ‘Pirate’ Scams

Founded in 2012 by former Twitter CEO Evan Williams, online publishing platform Medium.com swiftly became the go-to place for many authors. The site has featured works of renowned writers, politicians, high profile activists, major companies, as well as average Joes. Today, Medium has millions of daily visitors, making it one of the 100 most visited websites in the world. The majority of these are drawn to the compelling and...

Read More
ACE Hits Two More Pirate Streaming Sites, Seizes More Openload Domains
Nov11

ACE Hits Two More Pirate Streaming Sites, Seizes More Openload Domains

After a standing start just over two years ago, the Alliance for Creativity and Entertainment quickly became the most feared anti-piracy group on the planet. Compromised of around three dozen entertainment companies, including the major Hollywood studios, Netflix and Amazon, the group now targets piracy on a global scale, sharing resources and costs to tackle infringement wherever it might be. Last week the group took down Openload...

Read More
Cheat sheet for common Linux commands
Nov11

Cheat sheet for common Linux commands

The terminal is one of the most efficient ways to interact with a Linux computer. When you type a command into the shell, you tell your computer exactly what you want it to do, specifying both the source and destination of what you need done, and then there’s no further interaction required. Every time you type a valid command into a shell, you’re essentially programming, even though your program may only run for a...

Read More
3 approaches to secrets management for Flatpak applications
Nov11

3 approaches to secrets management for Flatpak applications

Flatpak enables desktop applications to run in isolated sandboxes, which significantly improves security as it prevents applications from affecting one another and impacting the host system. In practice, however, typical applications still need to access services and user data that are shared among other applications and the host. read...

Read More
A guide to intermediate awk scripting
Nov11

A guide to intermediate awk scripting

This article explores awk’s capabilities, which are easier to use now that you know how to structure your command into an executable script. Logical operators and conditionals You can use the logical operators and (written &&) and or (written ||) to add specificity to your conditionals. For example, to select and print only records with the string “purple” in the second column and an amount less than...

Read More