article thumbnail

The Linux Migration: December 2018 Progress Report

Scott Lowe

In December 2016, I kicked off a migration from macOS to Linux as my primary laptop OS. In this post, I’d like to recap where things stand as of December 2018, after 8 months of full-time use of Linux as my primary laptop OS. Linux Distribution. Applications.

Linux 60
article thumbnail

The Linux Migration: April 2017 Progress Report

Scott Lowe

In December 2016, I kicked off a migration to Linux (from OS X) as my primary laptop OS. Let me start by saying that I am actively using a Linux-powered laptop as my primary laptop right now, and I have been doing so since early February. Linux Distribution. Applications. LTS (“Xenial Xerus”).

Linux 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Technology Short Take 174

Scott Lowe

For your reading pleasure, I’ve collected links on topics ranging from Kubernetes Gateway API to recent AWS attack techniques to some geeky Linux and Git topics. Lee Holmes shines a light on the security risks of Postman , although the risks really could apply to just about any cloud-connected application. Read more details here.

Linux 107
article thumbnail

Report Reveals Top Cyber Threats, Trends of 2023 First Half

SecureWorld News

The Critical Start Cyber Threat Intelligence (CTI) team analyzed a range of intelligence sources, such as customer data, open-source intelligence, vulnerability research, social media monitoring, and Dark Web monitoring to identify the most pressing cybersecurity threats of the first half of 2023.

Trends 71
article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

… And when you went from one application to the other, you had to redo it all from scratch. But we also had Linux, which the open-source movement championed. So I hope that we will have a Linux of language models, a Linux of AI. ” “The biggest surprise is that AI used to be narrow.

article thumbnail

Free Courses at Linux Academy — August 2019

Linux Academy

Our free cloud training allows students to begin developing their Linux and Cloud skills. Visit the Linux Academy Booth at Black Hat or find Ell at any of the other Hacker Summer Camp events! Kali Linux Deep Dive – In this course, you will learn how to find the vulnerabilities in frameworks like Metasploit, BeEF, SET, etc.

Course 25
article thumbnail

Information Stealing Malware on the Rise, Uptycs Study Shows

SecureWorld News

According to the new Uptycs whitepaper, Detecting the Silent Threat: 'Stealers are Organization Killers' (gated link), a variety of new info stealers have emerged this year, preying on Windows, Linux, and macOS systems. This year, however, there are multiple new info stealers arising that target all three platforms: Windows, Linux, and macOS.

Malware 67