Sitemap About Privacy Policy Articles TiVo Conversion Grabbing the Files Decoding the Files Editing the Files Hacker Public Radio Miscellaneous Shows LibreOffice LibreOffice Writer LibreOffice Calc LibreOffice Impress Security and Privacy Linux Under Attack Health and Healthcare HPR – Better Social Media HPR – GIMP Published eBooks eBook Software in Linux Finding eBooks The “top” command Freedom is not Free Who Owns Your Files Google Play Music All Access Security and Privacy Why Do We Need Privacy, And Isn’t It A Waste Of Time Anyway? Encryption and E-mail Encryption Basics Creating a Key Pair – Command Line Creating a Key Pair – GUI Client Encryption and E-mail with Thunderbird Encryption and Gmail Encrypting E-mail on Android; Importing Keys Hashing, Passwords, and Certificates Hashing and Password Security Passwords, Entropy, and Good Password Practices Symmetric vs. Asymmetric Encryption Digital Signatures and Certificates TLS/SSL Certificate Issues and Solutions True Crypt, Heartbleed, and Lessons Learned Sensible Security: The Schneier Model TrueCrypt and GnuPG: An Update TrueCrypt, Heartbleed, and Lessons Learned LastPass Hacked: What Does This Mean? SSH and Tunneling SSH Introduction Home ssh server SSH Basics SSH Authentication: Keys SSH Authentication: Server and Agents SSH options, Port Forwarding over SSH, Keepalives SSH, Tunneling, and VPNs SOCKS Proxy Security Best Practices from SOUPS NIST’s New Password Rules Diffie-Hellman-Merkle Key Exchange Diffie-Hellman and Forward Secrecy TLS 1.3 NIST Cybersecurity Framework Encryption and Quantum Computing NotPetya and Maersk: An Object Lesson News update on Firefox NIST’s Quantum Cryptography Update 20200815 NIST Quantum Cryptography Update 20221008 Passkeys Slide Shows Introduction to Linux Linux Directory Structure The find and locate Commands Installing Software in Linux Installing Software in Linux, Part 1: Repositories Installing Software in Linux, Part 2: Working With Packages Installing Software in Linux, Part 3: Command Line and Compiling From Source The Shell Game The Shell Game, Part 1: What is a Shell? The Shell Game, Part 2: What are the choices in shells? The Shell Game, Part 3: Introduction to Bash The Shell Game, Part 4: Bash Shortcuts Hardware Discovery Commands The ps Command Installing Linux: Partitioning and File System Considerations The ifconfig Command Help, My Computer is Sluggish! Passwords Encryption Basics SSL Certificates Password Best Practices and the LastPass Hack Diffie-Hellman-Merkle Key Exchange Forward Secrecy TLS 1.3 Better Social Media? Pluspora MeWe Diaspora Mastodon The Fediverse ActivityPub Conference 2019 Opening Keynote 9/7/19: “ActivityPub: past, present, future” Is ActivityPub Paving The Way to Web 3.0? The Semantic Social Network Keep unwanted messages off the Fediverse Decentralised Hashtag Search and Subscription in Federated Social Networks OSS compliance with privacy by default and design Advice to new Fediverse administrators and developers The case for the unattributed message Federated Blogging with WriteFreely I don’t know what I’m talking about: a newbie’s introduction to ActivityPub Architectures of Robust Openness OcapPub PixelFed ActivityPub Conference 2020 ActivityPub 2020: Evan Prodromou ActivityPub Conference 2020: Nilesh Trivedi BookWyrm Fediverse Update May, 2022 Sitemap Save as PDF