Tag Archives: ComputerBorders

Void Linux – the Strangely Overlooked Distribution by https://is.gd/PAo8bG

Ahh, Void Linux. You may or may not have heard of it. If you have, more than likely it was by word of mouth, so to speak, from internet comments on a forum, YouTube video or in passing on Reddit. But this little distro rarely gets any press or recognition otherwise.

Perhaps it’s time that changes, as Void Linux is an interesting distro in its own right and a good alternative to something like Arch Linux. It also has a no-systemd approach.

from https://is.gd/PAo8bG

Selected by Galigio via Computer Borders

Blockchains Never Forget by https://is.gd/OFGKhN


Just three years ago, in 2014, I wrote a little short story set in a future where most work is organized around blockchains. That story was set sometime past the 2120s, but it appears we’ll get there a century earlier than I thought.

The idea of organizing work through smart contracts on blockchains has been moving ahead at a breathtaking pace.

from https://is.gd/OFGKhN

Selected by Galigio via Computer Borders

An introduction to Linux’s EXT4 filesystem by https://is.gd/LDEKBw

In previous articles about Linux filesystems, I wrote an introduction to Linux filesystems and about some higher-level concepts such as everything is a file.

I want to go into more detail about the specifics of the EXT filesystems, but first, let’s answer the question, “What is a filesystem?”

from https://is.gd/LDEKBw

Selected by Galigio via Computer Borders

How to Spring Clean Your Digital Clutter to Protect Yourself by https://is.gd/x8RFXN

You’re using strong and unique passwords. You’re on the lookout for phishing emails. And you’ve set up two-factor authentication on every account that offers it. Basically, you’re acing Personal Cybersecurity 101.

But with new threats popping up all the time, you may be looking for other proactive steps you can take to protect yourself. Here’s an easy one: Clean up your digital junk.

from https://is.gd/x8RFXN

Selected by Galigio via Computer Borders