Come full circle - back to HTML

From time to time people email me asking about what kind of work flow I use for this blog. In this article I'll elaborate on the process. https://unixdigest.com/articles/come-full-circle-back-to-html.html

1y | unixsheikh
Choose your browser carefully

Privacy on the Internet is important because privacy risks range from the gathering of statistics on users to more malicious acts such as the spreading of spyware and the exploitation of various forms of bugs (software faults). Many companies, such as Google, track which websites people visit and then use the information, for instance by sending advertising based on one's web browsing history. Sometimes prices on products are changed on the same website, depending on tracking information, and tw

1y | unixsheikh
Some of the problems with the GPL

The GNU Public License (GPL) was created to be the antithesis of the standard proprietary license, let's take a look at some of the problems with GPL. https://unixdigest.com/articles/some-of-the-problems-with-the-gpl.html

1y | unixsheikh
Real full disk encryption using GRUB on Artix Linux for BIOS and UEFI

In this tutorial we're going to take a look at setting up full disk encryption on the Artix Linux base system using GRUB for both a BIOS/MBR based setup and a UEFI based setup. While the choice to install in UEFI mode is encouraging, vendor UEFI implementations still carry more bugs than their BIOS/MBR counterparts. You are advised to do a search relating to your particular motherboard model before proceeding. Contrary to "modern" advice I still haven't found any compelling reason to use UEFI ye

1y | unixsheikh
The Social Dilemma

About a documentary that explores the dangerous human impact of social networking. Tech experts sound the alarm on their own creations! https://unixdigest.com/articles/the-social-dilemma.html

1y | unixsheikh
The terminal, the console and the shell - what are they?

The other day, as I was going through some of my old notes, I stumbled upon something I had written about the console, the terminal and the shell on UNIX-like operating systems. I have decided to rewrite these notes in order to share them here on my website. So without further ado we will now stroll down memory lane and take a quick look at the origins of the Unix terminal and shell. And I will also give my advice to new users on Linux or BSD regarding the choice of terminal emulator and shell.

1y | unixsheikh
Code has to be simplified until it becomes absolutely correct

If we assume that no security bugs are injected by malicious programmers, then security issues, like other issues, are errors in code introduced by programmers by mistake. This means that the complexity of a program deeply affect the number of mistakes. This also means that one very important goal is to make code as simple as possible, until it becomes absolutely and obviously correct. Complexity is perhaps the most important factor that controls both the creation and defeat of errors, including

1y | unixsheikh
JavaScript malware infested nightmare

Are you a JavaScript framework or library fan-boy? One of those so-called front-end developers who cannot figure out how to build a website without completely smothering everything in JavaScript? Well, if you are, let me share a JavaScript nightmare with you. https://unixdigest.com/articles/javascript-malware-infested-nightmare.html

1y | unixsheikh
Are you trusting open source blindly? Then you're in for a world of hurt!

So, you normally do something like pip install foo, or composer install foo, or npm install foo, or perhaps go get foo, and you never read the source code of the package you just pulled down? Guess what, that's one (almost) sure way to blow up your project! https://unixdigest.com/articles/are-you-trusting-open-source-blindly-then-you-are-in-for-a-world-of-hurt.html

1y | unixsheikh

Membri



Căutare