From time to time people email me asking about what kind of work flow I use for this blog. In this article I'll elaborate on the process. https://unixdigest.com/articles/come-full-circle-back-to-html.html
Privacy on the Internet is important because privacy risks range from the gathering of statistics on users to more malicious acts such as the spreading of spyware and the exploitation of various forms of bugs (software faults). Many companies, such as Google, track which websites people visit and then use the information, for instance by sending advertising based on one's web browsing history. Sometimes prices on products are changed on the same website, depending on tracking information, and tw
The GNU Public License (GPL) was created to be the antithesis of the standard proprietary license, let's take a look at some of the problems with GPL. https://unixdigest.com/articles/some-of-the-problems-with-the-gpl.html
In this tutorial we're going to take a look at setting up full disk encryption on the Artix Linux base system using GRUB for both a BIOS/MBR based setup and a UEFI based setup. While the choice to install in UEFI mode is encouraging, vendor UEFI implementations still carry more bugs than their BIOS/MBR counterparts. You are advised to do a search relating to your particular motherboard model before proceeding. Contrary to "modern" advice I still haven't found any compelling reason to use UEFI ye
About a documentary that explores the dangerous human impact of social networking. Tech experts sound the alarm on their own creations! https://unixdigest.com/articles/the-social-dilemma.html
The other day, as I was going through some of my old notes, I stumbled upon something I had written about the console, the terminal and the shell on UNIX-like operating systems. I have decided to rewrite these notes in order to share them here on my website. So without further ado we will now stroll down memory lane and take a quick look at the origins of the Unix terminal and shell. And I will also give my advice to new users on Linux or BSD regarding the choice of terminal emulator and shell.
If we assume that no security bugs are injected by malicious programmers, then security issues, like other issues, are errors in code introduced by programmers by mistake. This means that the complexity of a program deeply affect the number of mistakes. This also means that one very important goal is to make code as simple as possible, until it becomes absolutely and obviously correct. Complexity is perhaps the most important factor that controls both the creation and defeat of errors, including
Are you a JavaScript framework or library fan-boy? One of those so-called front-end developers who cannot figure out how to build a website without completely smothering everything in JavaScript? Well, if you are, let me share a JavaScript nightmare with you. https://unixdigest.com/articles/javascript-malware-infested-nightmare.html
So, you normally do something like pip install foo, or composer install foo, or npm install foo, or perhaps go get foo, and you never read the source code of the package you just pulled down? Guess what, that's one (almost) sure way to blow up your project! https://unixdigest.com/articles/are-you-trusting-open-source-blindly-then-you-are-in-for-a-world-of-hurt.html