Watch: How to Pick a Lock

LinuxSecurity.com: You can’t keep your data secure software alone. A good hacker knows a complex set of skills that includes computers, social engineering, and physical security. That means a hacker that really wants your stuff will know how to pick a lock to get it.

From: Linux Security

Share

10 useful ncat (nc) Command Examples for Linux Systems

LinuxSecurity.com: ncat or nc is networking utility with functionality similar to cat command but for network. It is a general purpose CLI tool for reading, writing, redirecting data across a network. It is designed to be a reliable back-end tool that can be used with scripts or other programs. It’s also a great tool for network debugging, as it can create any kind of connect one can need.

From: Linux Security

Share

Quantum Computing Is the Next Big Security Risk

LinuxSecurity.com: The 20th century gave birth to the Nuclear Age as the power of the atom was harnessed and unleashed. Today, we are on the cusp of an equally momentous and irrevocable breakthrough: the advent of computers that draw their computational capability from quantum mechanics.

From: Linux Security

Share

FCC Chair Ajit Pai Falsely Claims Killing Net Neutrality Will Help Sick and Disabled People

LinuxSecurity.com: For the duration of the fight over net neutrality, there have been a constant stream of falsehoods pushed by AT&T, Verizon, and Comcast to justify their frontal assault on the popular rules. One popular bogeyman has been that net neutrality rules devastated telecom sector investment, a claim consistently disproven by publicly-accessible SEC filings, earnings reports, independent analysis, and statements to investors from more than a half-dozen industry executives.

From: Linux Security

Share