Posted by meshal on Saturday, August 20, 2016 @ 02:59:57 EDT (143 reads)
It's been more than three months since the release of the previous BlackArch Linux ISO image, and the development team managed to add more than 100 new tools you can use for penetration testing and ethical hacking work.Read More...
Posted by meshal on Friday, August 12, 2016 @ 11:00:55 EDT (233 reads)
After a long development cycle (including many betas and release candidates to get everything just exactly perfect) we're pleased to announce the availability of the new stable release.Read More...
Posted by meshal on Friday, August 29, 2014 @ 10:00:34 EDT (7201 reads)
All testing happened from an Intel Core i7 4790K system with XFX Radeon R9 290 4GB graphics card. No other hardware/software changes were made during the testing process aside from downgrading the kernel when using the Catalyst driver to what's found in Ubuntu 14.04 for kernel API compatibility.
(While most Phoronix readers should already be well aware, the reported CPU frequency differences in the system table just come down to the different CPU scaling driver on the different kernels and reporting base vs. Turbo frequency; along with the other reporting differences just come down to how the different drivers/kernels expose their information but it was all maintained during testing.
Posted by meshal on Tuesday, August 12, 2014 @ 18:42:00 EDT (6601 reads)
Nvidia has released some new information surrounding their upcoming 64-bit Tegra K1 variant, codenamed 'Project Denver', discussing the architecture of the chip while also making some bold performance claims.
Diving deeper into the Denver CPU cores, and Nvidia has revealed some info on the architecture being used. Each Denver core uses a seven-way superscalar microarchitecture that's capable of seven operations per clock cycle at best, leading to high throughput when conditions are ideal. During typical usage patterns it's unlikely you'll achieve seven operations per cycle, but it's impressive nevertheless.
Posted by meshal on Sunday, August 10, 2014 @ 17:41:16 EDT (6711 reads)
Most Linux admins are aware of the yum (Yellow Dog Updater Modified) utility for package management in Red Hat-based distros such as RHEL, CentOS, and Fedora. Few, however, are aware of the power, benefits, and utility of yum groups.
The following tutorial is based on CentOS 6.5 and should work with other versions of Red Hat-based distros. Older versions may require that you install yum-utils in order to use yum groups.
Posted by meshal on Sunday, August 10, 2014 @ 11:57:33 EDT (5270 reads)
Well there I was, rebuilding a router and having a good time when I accidentally damaged the partition table on my main Linux installation, which is a GUID partition table, or GPT.
How did this happen? I was installing Voyage Linux on a compact flash card, and while I was messing around with GParted and other filesystem tools I accidentally ran some commands on/dev/sdb, my main hard disk, instead of /dev/sdc, the compact flash card. Like, oops. I don't know exactly which operations gummed up /dev/sdb, which would be good to know.
Posted by meshal on Saturday, August 09, 2014 @ 15:20:12 EDT (6010 reads)
Few Linux desktops have brought about such controversy as GNOME 3. It’s been ridiculed, scorned, and hated since it was first released. Thing is, it’s actually a very good desktop. It’s solid, reliable, stable, elegant, simple... and with a few minor tweaks and additions, it can be made into one of the most efficient and user-friendly desktops on the market.
I decided to go about this process by first installing a clean Ubuntu GNOME distribution that included GNOME 3.12. With the GNOME-centric desktop ready to go, it’s time to start tweaking.
Posted by meshal on Saturday, August 09, 2014 @ 09:56:15 EDT (9413 reads)
Your antivirus tool has many different opportunities to protect your PC from attack. It can totally block access to a malicious URL, wipe out the downloaded code on sight, recognize and prevent malicious behavior, even roll back the system changes made by a malware attack.Read More...
Posted by meshal on Saturday, August 09, 2014 @ 09:41:14 EDT (8361 reads)
Popular digital currency bitcoin is a project run by the US National Security Agency (NSA), according to a group that tracks the activities of government organisations around the globe.
The group, named CIA Project, claims evidence that the cryptocurrency is made by the NSA or the CIA.Read More...
Posted by meshal on Friday, August 08, 2014 @ 09:44:40 EDT (5207 reads)
NAS and storage server manufacturer Synology sends word this afternoon that they are informing their customers of a currently ongoing and dangerous ransomware attack that is targeting Synology devices.
Dubbed SynoLocker, the ransomware is targeting Internet-exposed Synology servers and utilizing a hereto-unknown exploit to break in to those systems. From there SynoLocker engages in a Cryptolocker-like ransom scheme, encrypting files stored on the server and then holding the key ransom. The attackers are currently ransoming the key for 0.6 Bitcoins (roughly KWD 99.04 ($350 USD)), a hefty price to pay to get your files back.