Categories
Software Technical

Command of the day: shred

The shred command can be used for destroy files so that their contents are very difficult or even impossible to recover. The shred command accomplishes its destruction by repeatedly overwriting files with data patters designed to do maximum damage. Even the use of high-sensitivity data recovery methods and equipment make it difficult to recover files […]

Categories
News Technical

Welcome to Google Voice

Google Voice, the popular and often controversial VoIP, voicemail, and messaging service from Mountain View search giant Google is now open for anyone in the U.S. to use. Previously, you could only open a Google Voice account if you received an invitation from a user already participating in the program. Quote from the people at […]

Categories
News Technical

WordPress Version 3.0

Today, the newest version of popular open source blogging software WordPress was released. Version 3.0, also known as “Thelonious,” has undergone a significant number of improvements, such as the inclusion of new standard APIs that let theme developers easily implement new backgrounds, headers, menus, custom posts, and more. All of the new APIs are shown […]

Categories
How-To Technical

No more ‘thumbs.db’ for me

I fist must state that these steps I am about to provide are to be used by those of us whom are neurotic about files stored on the file system.  While there are some good security reasons one may want to do this; I do what I am going to describe because I feel they […]

Categories
How-To Software Technical

Mounting a remote file system using ssh (sshfs)

For some time I have always used tools such as scp sftp to copy files between Linux based systems. Until the growing need to have this process simplified.  I recently fell in love with Linux all over again with the new release of Ubuntu.  I always had known it was possible but never had the […]

Categories
How-To Technical

Configure Firefox to use SSH tunnel for DNS

If you are using SSH to tunnel your web traffic, to keep your information private, you might be vulnerable to a DNS man-in-the-middle attack.  If your DNS requests are not tunneled, the operator of the hostile (or locked down) network can still see where you are navigating to on the web when your client makes DNS requests […]