The shred command can be used for destroy files so that their contents are very difficult or even impossible to recover. The shred command accomplishes its destruction by repeatedly overwriting files with data patters designed to do maximum damage. Even the use of high-sensitivity data recovery methods and equipment make it difficult to recover files […]
Month: June 2010
Google Voice, the popular and often controversial VoIP, voicemail, and messaging service from Mountain View search giant Google is now open for anyone in the U.S. to use. Previously, you could only open a Google Voice account if you received an invitation from a user already participating in the program. Quote from the people at […]
Today, the newest version of popular open source blogging software WordPress was released. Version 3.0, also known as “Thelonious,” has undergone a significant number of improvements, such as the inclusion of new standard APIs that let theme developers easily implement new backgrounds, headers, menus, custom posts, and more. All of the new APIs are shown […]
I fist must state that these steps I am about to provide are to be used by those of us whom are neurotic about files stored on the file system. While there are some good security reasons one may want to do this; I do what I am going to describe because I feel they […]
For some time I have always used tools such as scp sftp to copy files between Linux based systems. Until the growing need to have this process simplified. I recently fell in love with Linux all over again with the new release of Ubuntu. I always had known it was possible but never had the […]
If you are using SSH to tunnel your web traffic, to keep your information private, you might be vulnerable to a DNS man-in-the-middle attack. If your DNS requests are not tunneled, the operator of the hostile (or locked down) network can still see where you are navigating to on the web when your client makes DNS requests […]