Came here in search of an answer to a problem, but didn't find it? Visit the forum @ LinuxBSDos.com, pick a category and ask a question.

News & Tutorials

Get the best and coolest Linux Gadgets on Gearbest at reasonable prices
LilysDress.com offers cheap bridesmaid dresses of different styles and good quality
In very simple terms, here’s what ESB means

In very simple terms, here’s what ESB means

I like very simple tutorials that even a novice will have fun reading and understanding, and I try to tailor the ones I write here along those line. That’s why I’m sharing this article with you. It took a subject I knew a bit already, but couldn’t really explain to anybody in a manner they could comprehend, and renders it […]

The best tool for Fantasy Football analytics: Excel or R?

The best tool for Fantasy Football analytics: Excel or R?

In the early days, I used Excel for basic stuff, but I’ve been playing with R for some fun and funky data crunching. It’s a nice tool to know how to use. It can be hard, though, to keep up with all the extensions that are being written and released almost daily. But that’s a good problem to have. And […]

Secret NSA technology that can hack computers not connected to the Internet

Secret NSA technology that can hack computers not connected to the Internet

For the really paranoid, for the more security-conscious out there, and for those keeping track of the capabilities of the NSA to spy and track, this will really blow your mind. According to a New York Times report, the NSA has a secret technology that enables it to hack into and mess with data on computers that are not even […]

Apply the nuke patch to LUKS cryptsetup in Linux Mint 16 and Ubuntu 13.10

Apply the nuke patch to LUKS cryptsetup in Linux Mint 16 and Ubuntu 13.10

This short tutorial shows how to apply the Kali Linux nuke patch to LUKS cryptsetup in Linux Mint 16 and Ubuntu 13.10. From a physical security and privacy-enhancing perspective, the nuke patch to LUKS cryptsetup is the best news from any distribution so far this year. What the nuke patch gives you, is a cryptsetup command that allows you to […]

Italian govt agencies to consider Free Software before commercial software

Italian govt agencies to consider Free Software before commercial software

The Italian Digital Agency has recommended that its government’s agencies consider Free Software alternatives before purchasing licenses for commercial software. Recommendations like this tend to come from European governments, never from government agencies over here in our America, even though it will save a ton of money. But a recommendation is one thing, abiding by it, is another. It’s all […]

DA223 HQL: Acer’s all-in-one Android PC has a Snapdragon 600 inside

DA223 HQL: Acer’s all-in-one Android PC has a Snapdragon 600 inside

The DA223 HQL is the newest Android all-in-one computer announced at the just-concluded 2014 edition of the International Consumer Electronics Show (CES) in Las Vegas, Nevada. There have been similar all-in-one computers from other manufacturers at the event, most notably from Lenovo and ASUS. (See Transformer Book Duet offers Windows and Android in dual-boot mode and Lenovo N308 All-in-One Android […]

Cell security in Apache HBase

Cell security in Apache HBase

Here’s a good article about security in Apache HBase that I think some readers will love. Apache HBase is a non-relational database for Hadoop. The article is written by Andrew Purtell, HBase Committer and member of the Intel HBase Team. Here’s an excerpt: For some time Apache HBase has offered a strong security model based on Kerberos authentication and access […]

Your choice: Cinnamon or MATE

I get a lot of queries regarding the difference(s) between the MATE and Cinnamon desktop environments. And of course such queries tend to come from those new to Linux and Free Software. For the benefit of those class of users, this very brief article summarizes the key difference between these two desktop environments. Nothing technical, just basic stuff that will […]

Kali Linux 1.0.6 released. Cryptsetup has “nuclear option” integrated

Kali Linux 1.0.6 released. Cryptsetup has “nuclear option” integrated

The latest edition of Kali Linux, Kali Linux 1.0.6, has been released. Kali Linux is a Linux distribution based on Debian Unstable, and designed for hacking and penetration testing. It comes loaded with the best Free and Open Source (FOSS) hacking applications available. Kali Linux 1.0 is the successor to BackTrack Linux 5 (see BackTrack 5 or Kali Linux 1.0). […]

Zorin OS Core 8 screen shot preview

Zorin OS Core 8 screen shot preview

Zorin OS 8 Core Release Candidate was made available for download and testing about a week ago. This of course is a pre-release version of what will become Zorin OS 8. This is also the second Zorin OS-related article appearing on this website. The first was about Zorin OS 6 (see Zorin OS 6 Core preview). Zorin OS 8 Core […]

A Kali Linux cryptsetup patch that can “nuke” an encrypted disk

A Kali Linux cryptsetup patch that can “nuke” an encrypted disk

A recent article titled Emergency Self Destruction of LUKS in Kali revealed an ongoing attempt to add a “nuke” option to cryptsetup, the utulity used to manage disk encryption. The idea is very simple. But before I get to the gist of the article, here’s how setting up full disk encryption protects your data from authorized unauthorized access. When a […]

A $204,000 data-privacy violation fine against a company worth $381 billion!

France has just handed out a fine against Google for failing to comply with the country’s Data Protection Act. What’s the fine amount? A measly USD $204,000 (€150,000)! That’s against a company whose market cap is more than USD $381 billion. At current share prices, that’s the equivalent of 178 Google shares. With a fine like that, no wonder Google […]

Light Table is now open source and hosted on GitHub

Light Table is an “interactive IDE that lets you modify running programs and embed anything from websites to games.” The entire code base has been released under the GNU General Public License and hosted on GitHub. From the official news release: … Light Table is taking a huge step forward – every bit of its code is now on Github […]

An attempt to dual-boot Ubuntu 13.10 and Windows 8 on a Lenovo IdeaCenter K450

An attempt to dual-boot Ubuntu 13.10 and Windows 8 on a Lenovo IdeaCenter K450

I had access to a friend’s store-bought (OEM) Windows 8 computer for just one day. The computer is a Lenovo model. Specifically the Lenovo IdeaCenter K450 with a Core i7 processor, 12 GB of RAM, and a 2 TB hard disk drive (HDD). Very powerful machine. It’s the first OEM Windows 8 machine that I’ve had access to, and so […]

How to build your own phone company with WebRTC and Node.js

How to build your own phone company with WebRTC and Node.js

I’m reposting this article because it’s very cool and anybody can try it and probably succeed on their first attempt. the title of the original article is Build your own phone company with WebRTC and a weekend. I added the Node.js part because it a core tool used to make the application happen. I intend to give this a try […]

Lenovo N308 All-in-One Android computer

The N308 All-in-One (AiO) is an Android computer from Lenovo. Call it the Android version of the Chromebase, an all-in-one unit from LG that’s powered by Google’s chrome OS. (See Chromebase: A Chrome OS All-in-One PC from LG due at CES 2014). The N308 will ship with Android Jelly Bean 4.2.2, with an NVIDIA® Tegra® 4 quad-core processor. And it […]

Transformer Book Duet offers Windows and Android in dual-boot mode

The Transformer Book Duet TD 300 is one of the major product announcements from ASUS at the ongoing International Consumer Electronics Show (CES) in Las Vegas, Nevada. It is a stylish and functional quad-mode notebook-cum-tablet computer that comes with both Windows 8.1 and Android 4.1. Users will be able to switch from one OS to the other just by pressing […]

Can hackers decrypt Target’s PIN data?

Can hackers decrypt Target’s PIN data?

One of the last major news stories of 2013 was the credit card breach at Target Brands, Inc. Hackers managed to steal the login credentials of 40 million of the company’s customers. But they did not just stop at usernames and passwords, they also grabbed the PIN numbers of debit card customers, PIN numbers that the company said are encrypted, […]

How to deploy OSSEC across a large network of systems from RPMs

How to deploy OSSEC across a large network of systems from RPMs

OSSEC is a Host-based Intrusion Detection System (HIDS). It is Free Software, made available under the GNU General Public License (version 2). It can do “log analysis, file integrity checking, Windows registry monitoring, centralized policy enforcement, rootkit detection, real-time alerting and active response.” When I was looking for a security solution for my Cloud servers, it was numero uno on […]

2014: Ringing it in by migrating from Apache to Nginx

2014: Ringing it in by migrating from Apache to Nginx

Happy new year everybody. 2013 was brutal, but I think 2014 will be much better. I’ve spent the past week moving this website from a provider based in the UK to one based in the US of A. Moving from a fully-managed provider to a self-managed system was not as easy as I thought, but the process is almost complete. […]