Category Archives: Tecnologia

Start 2016 with a bunch of unusual Linux OS!

linux-distributions-to-look-forward-in-2016

What’s better than testing? For me nothing!

For this reason, let me introduce some “unusual” Linux distribution proposed by Jesse Afolabi @Jesseflb via Techmint.

VeltOS and PapyrOS are based on Arch but the last one is in its pre-alpha testing so it’s not suggested for beginners.

Moreover, we may decide to begin 2016 with Korora that is still one of my favorite projects also after so many years since the first release.

Last but not least, we have Solus OS 2 that it is not the most Linux distribution I tested but it is stable and really well built.

Happy 2016!

Protect your Privacy: use a Self-destructing, single-use File Sharing Service

encryption-100410129-primary-idge

Image from infoworld.com

If you need to share a confidential file to one of your colleague and you have not enough time to manually encrypt the file before uploading it to a you may consider to use securesha.re.

This online service let you to share a file through its online service encrypting it before it is uploaded to the securesha.re servers.

DevStash.io uses a 128-bit client-side AES encryption through a SSL protocol. This website automatically offers a 40 charaters long, randomly generated password that can be changed by user if he/she prefers to use its own passphrase.

Moreover securesha.re keep the file reachable in a long, random URL to decrease that files could be discovered through a brute force search.

Last but not least, this website let you delete the uploaded file after a pre-defined amount of time or/and after a pre-defined number of views. The default configuration allows just one view and an automatic deleting after seven days but the views can be extended till 10 and the amount of days reduced to just 1 day.

Personally I normally prefer to encrypt files by myself before sharing them online but I will keep securesha.re in mind in the case I need to share a file and I have not my laptop with me.

Link
star-wars-logo

Image from opencastingcall2013.com

What Do Star Wars and Recent Data Breaches Teach Us About Cyber Ethics?

Could Privacy Law Limitations kill the Internet Dream?

Is Privacy a fundamental human right? Your personal answer to this question is the starting point to think about the current Internet legislation and to evaluate if the recent legal restrictions on civil rights could represent the “end of the Internet Dream.” A clear and motivated opinion about this issue is a strategic keypoint for all those people who, as me, operate everyday in one of the many Internet branches as consultants, lawyers, programmers, marketing experts, investors or, more often, as common users.

Dan Gillmor, via BACKCHANNEL, has recently underlined that a liberal legislation should not restrict end to end encryption, because it represents the best safeguards for tomorrow’s freedom. A standard use of fragile encryption, imposed by Law, will not only interfere with privacy, but will also heavily tamper with Internet global security.

o-INTERNET-PRIVACY-facebook

Image by quotesgram.com

On the other hand, Dan Patterson, via TECHREPUBLIC, has reported two different conversations with UN reporters who affirmed that strong encryption allows privacy and privacy is the corner stone of truth, especially for reporters, because it helps to “validate the veracity of information.”

Consequently, to preserve our privacy in our daily living it would be useful to:

  • Use Privilege VPN or  HTTPS connections when you surf Internet;
  • Use Encrypted Storage for your data, especially if you cannot avoid using cloud-based services;
  • Watch the Legislator: contact the MP/Politician who represents you and express your point of view, each time a restrictive Law proposal is under discussion.

As Citizens, the real challenge we have for the next months is represented by the influence we will be able to exercise on new Laws that should find a legal equilibrium between anti-terrorism surveillance and the need of protecting citizen’s personal information allowing the use of VPN/HTTPS connections and Encrypted Storage.

3 things you need to remember when Upgrading to Fedora 23 as for the Unicmen’s instructions

The upgrade from Fedora 22 to Fedora 23 is not automatic, as usual in my Fedora experience, but it is really simple to manage if you follow the path suggested by Unixmen.

There are few things you need:

connect your laptop to the power plug (if you use a laptop);

– a couple of hours (something more or less depending on your CPU, RAM, Internet connection speed, etc..);

few lines of commands on the Terminal

The upgrading process is well structured and to start it you need to launch Terminal and upgrade the native Fedora Fedup with its new version that now is integrated into DNF:

dnf upgrade

Then you have to install the DNF plugin:

dnf install dnf-plugin-system-upgrade

and finally you can start the “core” part of the upgrade just typing:

dnf system-upgrade download –releasever=23 –allowerasing –best 

Where:

– allowerasing will continue the upgrade also in presence of any “old” (not yet upgraded) third part repositories that normally would have completely stopped the main upgrading process

-best is a verbose mode in case of unsatisfied dependencies

After a while, depending on your Internet connection speed, you will be able to conclude the upgrade typing:

dnf system-upgrade reboot

Your laptop will reboot and the upgrade starts.

From now you spend more than 40 minutes waiting and answering to few easy questions that the OS asks you to solve some configuration matters.

The length of the waiting time depends obviously on the CPU, the RAM and the type of Hard Disk installed into your PC.

That’s it!

Link
http3a2f2fwww-redpill-linpro-com2fsysadvent2fassets2fimg2fbackup_disk

Image from redpill-linpro.com

Cloning block devices online using Software RAID

Link
giphy

Image by boingboing.net

The TPP global trade treaty is very bad news for information security. Here’s why

Link

paris_assemble_nationale-640x430French state of emergency allows website blocking, device search powers