Toggle search form
Search for:
Toggle navigation
zwilnik
Linux and Open Source goodness
Home
About
Privacy Policy
Articles
TiVo Conversion
Grabbing the Files
Decoding the Files
Editing the Files
Hacker Public Radio
Miscellaneous Shows
LibreOffice
LibreOffice Writer
LibreOffice Calc
LibreOffice Impress
Security and Privacy
Linux Under Attack
Health and Healthcare
HPR – Better Social Media
HPR – GIMP
Published
eBooks
eBook Software in Linux
Finding eBooks
The “top” command
Freedom is not Free
Who Owns Your Files
Google Play Music All Access
Security and Privacy
Why Do We Need Privacy, And Isn’t It A Waste Of Time Anyway?
Encryption and E-mail
Encryption Basics
Creating a Key Pair – Command Line
Creating a Key Pair – GUI Client
Encryption and E-mail with Thunderbird
Encryption and Gmail
Encrypting E-mail on Android; Importing Keys
Hashing, Passwords, and Certificates
Hashing and Password Security
Passwords, Entropy, and Good Password Practices
Symmetric vs. Asymmetric Encryption
Digital Signatures and Certificates
TLS/SSL Certificate Issues and Solutions
True Crypt, Heartbleed, and Lessons Learned
Sensible Security: The Schneier Model
TrueCrypt and GnuPG: An Update
TrueCrypt, Heartbleed, and Lessons Learned
LastPass Hacked: What Does This Mean?
SSH and Tunneling
SSH Introduction
Home ssh server
SSH Basics
SSH Authentication: Keys
SSH Authentication: Server and Agents
SSH options, Port Forwarding over SSH, Keepalives
SSH, Tunneling, and VPNs
SOCKS Proxy
Security Best Practices from SOUPS
NIST’s New Password Rules
Diffie-Hellman-Merkle Key Exchange
Diffie-Hellman and Forward Secrecy
TLS 1.3
NIST Cybersecurity Framework
Encryption and Quantum Computing
NotPetya and Maersk: An Object Lesson
News update on Firefox
NIST’s Quantum Cryptography Update 20200815
NIST Quantum Cryptography Update 20221008
Passkeys
Slide Shows
Introduction to Linux
Linux Directory Structure
The find and locate Commands
Installing Software in Linux
Installing Software in Linux, Part 1: Repositories
Installing Software in Linux, Part 2: Working With Packages
Installing Software in Linux, Part 3: Command Line and Compiling From Source
The Shell Game
The Shell Game, Part 1: What is a Shell?
The Shell Game, Part 2: What are the choices in shells?
The Shell Game, Part 3: Introduction to Bash
The Shell Game, Part 4: Bash Shortcuts
Hardware Discovery Commands
The ps Command
Installing Linux: Partitioning and File System Considerations
The ifconfig Command
Help, My Computer is Sluggish!
Passwords
Encryption Basics
SSL Certificates
Password Best Practices and the LastPass Hack
Diffie-Hellman-Merkle Key Exchange
Forward Secrecy
TLS 1.3
Better Social Media?
Pluspora
MeWe
Diaspora
Mastodon
The Fediverse
ActivityPub Conference 2019
Opening Keynote 9/7/19: “ActivityPub: past, present, future”
Is ActivityPub Paving The Way to Web 3.0?
The Semantic Social Network
Keep unwanted messages off the Fediverse
Decentralised Hashtag Search and Subscription in Federated Social Networks
OSS compliance with privacy by default and design
Advice to new Fediverse administrators and developers
The case for the unattributed message
Federated Blogging with WriteFreely
I don’t know what I’m talking about: a newbie’s introduction to ActivityPub
Architectures of Robust Openness
OcapPub
PixelFed
ActivityPub Conference 2020
ActivityPub 2020: Evan Prodromou
ActivityPub Conference 2020: Nilesh Trivedi
BookWyrm
Fediverse Update May, 2022
Sitemap
Return to
Hacker Public Radio
HPR – GIMP
Intro to GIMP
GIMP: The Canvas
GIMP: Selection Tools
GIMP: Paint Tools
GIMP: Transform Tools
GIMP: Color Tools
GIMP: Miscellaneous Tools
GIMP: Brushes
GIMP: Patterns and Gradients
GIMP: Introduction to Layers
Save as PDF
In this section
Hacker Public Radio
Miscellaneous Shows
LibreOffice
Security and Privacy
Health and Healthcare
HPR – Better Social Media
HPR – GIMP
Security & Privacy
GNU Privacy Guard (GPG)
Hak5
Krebs on Security
Schneier on Security
Security Now
The Command Line Podcast
The SANS Institute
Advertisements
Start here
About
Privacy Policy
Articles
TiVo Conversion
Grabbing the Files
Decoding the Files
Editing the Files
Hacker Public Radio
Miscellaneous Shows
LibreOffice
LibreOffice Writer
LibreOffice Calc
LibreOffice Impress
Security and Privacy
Linux Under Attack
Health and Healthcare
HPR – Better Social Media
HPR – GIMP
Published
eBooks
eBook Software in Linux
Finding eBooks
The “top” command
Freedom is not Free
Who Owns Your Files
Google Play Music All Access
Security and Privacy
Why Do We Need Privacy, And Isn’t It A Waste Of Time Anyway?
Encryption and E-mail
Encryption Basics
Creating a Key Pair – Command Line
Creating a Key Pair – GUI Client
Encryption and E-mail with Thunderbird
Encryption and Gmail
Encrypting E-mail on Android; Importing Keys
Hashing, Passwords, and Certificates
Hashing and Password Security
Passwords, Entropy, and Good Password Practices
Symmetric vs. Asymmetric Encryption
Digital Signatures and Certificates
TLS/SSL Certificate Issues and Solutions
True Crypt, Heartbleed, and Lessons Learned
Sensible Security: The Schneier Model
TrueCrypt and GnuPG: An Update
TrueCrypt, Heartbleed, and Lessons Learned
LastPass Hacked: What Does This Mean?
SSH and Tunneling
SSH Introduction
Home ssh server
SSH Basics
SSH Authentication: Keys
SSH Authentication: Server and Agents
SSH options, Port Forwarding over SSH, Keepalives
SSH, Tunneling, and VPNs
SOCKS Proxy
Security Best Practices from SOUPS
NIST’s New Password Rules
Diffie-Hellman-Merkle Key Exchange
Diffie-Hellman and Forward Secrecy
TLS 1.3
NIST Cybersecurity Framework
Encryption and Quantum Computing
NotPetya and Maersk: An Object Lesson
News update on Firefox
NIST’s Quantum Cryptography Update 20200815
NIST Quantum Cryptography Update 20221008
Passkeys
Slide Shows
Introduction to Linux
Linux Directory Structure
The find and locate Commands
Installing Software in Linux
Installing Software in Linux, Part 1: Repositories
Installing Software in Linux, Part 2: Working With Packages
Installing Software in Linux, Part 3: Command Line and Compiling From Source
The Shell Game
The Shell Game, Part 1: What is a Shell?
The Shell Game, Part 2: What are the choices in shells?
The Shell Game, Part 3: Introduction to Bash
The Shell Game, Part 4: Bash Shortcuts
Hardware Discovery Commands
The ps Command
Installing Linux: Partitioning and File System Considerations
The ifconfig Command
Help, My Computer is Sluggish!
Passwords
Encryption Basics
SSL Certificates
Password Best Practices and the LastPass Hack
Diffie-Hellman-Merkle Key Exchange
Forward Secrecy
TLS 1.3
Better Social Media?
Pluspora
MeWe
Diaspora
Mastodon
The Fediverse
ActivityPub Conference 2019
Opening Keynote 9/7/19: “ActivityPub: past, present, future”
Is ActivityPub Paving The Way to Web 3.0?
The Semantic Social Network
Keep unwanted messages off the Fediverse
Decentralised Hashtag Search and Subscription in Federated Social Networks
OSS compliance with privacy by default and design
Advice to new Fediverse administrators and developers
The case for the unattributed message
Federated Blogging with WriteFreely
I don’t know what I’m talking about: a newbie’s introduction to ActivityPub
Architectures of Robust Openness
OcapPub
PixelFed
ActivityPub Conference 2020
ActivityPub 2020: Evan Prodromou
ActivityPub Conference 2020: Nilesh Trivedi
BookWyrm
Fediverse Update May, 2022
Sitemap
Go to mobile version