article thumbnail

Technology Short Take 176

Scott Lowe

Ivan Pepelnjak dives deep on DHCP relaying on a Linux host. Rob McBryde shares his story of reviving a 2012 MacBook Pro with Linux. Security In early February a vulnerability was uncovered in a key component of the Linux boot process. Think Linux doesn’t have malware? TL;DR: It’s not as easy as it might seem.)

Linux 112
article thumbnail

GeekWire Podcast: NY Times vs. Microsoft; Plus, Oren Etzioni on AI in 2023 and beyond

GeekWire

GPT: Microsoft finds itself on the other side of an industry-defining copyright dispute Francesco Marconi in the WSJ: AI and Journalism Need Each Other Listen below, or subscribe to GeekWire in Apple Podcasts , Google Podcasts , Spotify or wherever you listen, and keep reading for key takeaways. Related coverage on GeekWire: NYT v.

Microsoft 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Technology Short Take 118

Scott Lowe

Operating Systems/Applications. Network bonding in Linux—as outlined in this article —is something I may have to explore. What I’d really like to have is something like ControlPlane (née Marco Polo for the longtime Mac users), but for Linux. jq , awk , and sed. Learn them , use them, love them.

Linux 60
article thumbnail

Americans are one step closer to a national contact tracing app for Covid-19

Vox

Apple and Google worked together to make the tool interoperable with iOS and Android operating systems, and iOS 14 has the exposure notification tool baked into the system itself and notifies users about the feature, creating a relatively seamless process to enable it. Open Sourced is made possible by Omidyar Network.

article thumbnail

Technology Short Take 116

Scott Lowe

If you’re unfamiliar with public key infrastructure (PKI), digital certificates, or encryption, you may find this Linux Journal article helpful. Operating Systems/Applications. That’s good—the butterfly keyboards are awful (in my opinion). It provides the basics behind X.509v3

Storage 60
article thumbnail

Microsoft CEO Satya Nadella on the business of Windows

The Verge

POSIX, which is a set of operating system standards. WSL, which is the part of Windows that lets you run Linux. In 2019, I think you had said to Wired , “The operating system is no longer the most important layer for us. ” This is a pressure that every operating system feels.

Windows 80
article thumbnail

The Hacker Mind Podcast: Digital Forensics

ForAllSecure

You’ll want someone with years of pen testing experience, some one who knows the operating system like no other. So in general, an operating system that eventually allows you to gain more information about the context within which attack was made. Maybe your first concern is to make sure the company is functional.