Posts

Showing posts from August, 2014

Do not install untrusted software on your phones and computers

Image
The following is a sample of how easy it is for hackers to obtain the data on your computer. Android was used as an example but it could easily be IOS, Windows or even a Macintosh. The article explaining the research and the root cause is found here . However, if you choose not to read the article, a demo of how easy it is to obtain your information is shown here .. The videos are also shown below:

A few excellent resources for Unix Admins/Users

For those of you who use a lot Linux and want to be able to use it better, here are some useful links: Linux Performance Tools Linux Command Line vi Cheat Sheet I am using this particular page to bookmark this resource so that I can find it easily in future. The presentation for Linux Performance Tools is embedded below Linux Performance Tools from brendangregg