Roberto Arduini

198 Flips | 20 Magazines | 4 Likes | @RobertoArduini | Keep up with Roberto Arduini on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Roberto Arduini”

2-Minute Linux Tip: How to use the top command

Hi, this is Sandra Henry-Stocker, author of the “Unix as a Second Language” blog on Network World.<br>In today’s Linux tip, we’re going to look at top – …

Linux

Best free Linux firewalls of 2018

A firewall is an important aspect of computer security these days, and most modern routers have one built in, which while helpful, can be difficult …

Linux

Windows 10 tip: Fine-tune memory usage to make the most of a virtual machine

By default, Hyper-V assigns a measly amount of RAM to virtual machines you create. For best performance in the virtual PC, adjust these numbers, and …

Windows 10

How To: Bypass Locked Windows Computers to Run Kali Linux from a Live USB

It's easy to run Kali Linux from a live USB on nearly any available computer, but many publicly accessible laptops and desktops will be locked down …

Linux

How to Install Linux OS on USB Drive and Run it On Any PC

Ever thought of using any computer which is not yours, with all your personal stuff and configuration? It is possible with any Linux distribution. …

Linux

15 tech upgrades you can get for free

You’ve spent so much money already – on a laptop, tablet, computer, router, network extender, printer, and smartphone. You’ve signed up for the internet, and you’re paying monthly fees. You’ll be relieved to know that a lot of tech is free.<p>Open-source software is like the “generic” brands you find …

Software

Bash tips for everyday at the command line

As the default shell for many of the Linux and Unix variants, Bash includes a wide variety of underused features, so it was hard to decide what to …

Linux

How to ensure all new user home directories are created without world-readable permissions in Linux

Out of the box, standard users can view other user's home directory. Here's an easy way to prevent this for newly-created users.<p>If you administer a …

Linux

How to partition a disk in Linux

Creating and deleting partitions in Linux is a regular practice because storage devices (such as hard drives and USB drives) must be structured in …

Linux

Become Certified Ethical Hacker with 19-Course Bootcamp Bundle

Today, the ability to identify vulnerabilities in businesses computer networks, cyber-security systems and software is in high demand. There a rise …

Ethical Hacking

Windows 10 tip: Quickly create a virtual machine to test new features

Beginning with Windows 10 version 1709, the Hyper-V Manager includes an option to create a new virtual machine from a single dialog box. Be sure to …

Windows 10

10 Open Source Security Tools You Should Know

Open source tools can be the basis for solid security and intense learning. Here are 10 you should know about for your IT security toolkit.

Information Security

6 of the best VPNs for Kodi so you can watch all your favorite movies and TV shows from anywhere

If you’re a movie buff or enjoy nothing more than binge-watching box sets, chances are you've heard of Kodi. Kodi is a free, open-source software …

Information Systems

How to identify and defend against the steps of a cybersecurity kill chain

A kill chain is a specific series of steps attackers can use to access unauthorized systems or data. Here's how to recognize them and what to do.<p>A …

Cybersecurity

How to enable dark mode in Windows 10

Mac users may be excited by the addition of a dark mode to MacOS Mojave but did you know this is something Windows 10 ($100 at Amazon.com) could already do?<p>When the Windows 10 Anniversary Update arrived a few years back it brought the ability to put your device into Dark Mode, which offers black …

Windows 10

Beginner's guide to NFTables (Basic Linux Firewall configuration)

<b>Introduction</b><p>NFTables is the application where you define the rules for the Linux Firewall It is intended to replace iptables, ip6tables, arptables …

Linux

How to Create and Use Bash Scripts

Bash scripting is an extremely useful and powerful part of system administration and development. It might seem extremely scary the first time you do …

Linux

Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software)

Hackers are always seeking zero-day exploits that can successfully bypass Windows 10's security features. There has been extensive research into …

Forensics

How to set up 2 factor authentication in Ubuntu Server 18.04

In this tutorial we will learn how to enable Multi-factor authentication in Ubuntu Server 18.04, this will increase security by confirming your …

Linux

A cheap VPN could be the only thing standing between you and internet freedom

Signing up for a VPN (virtual private network) is important if you want to be able to browse the internet privately, as well as access streaming …

Privacy

How To: Use Maltego to Fingerprint an Entire Network Using Only a Domain Name

Hackers rely on good data to be able to pull off an attack, and reconnaissance is the stage of the hack in which they must learn as much as they can …

Information Security

The "how to use NMAP" wiki

A wiki for NMAP and the nmap scripting engine‍ called NSE‍ - for posts about the tools and their uses, plus of course for tutorials and training …

Linux

How to: Turn a Raspberry Pi into a VPN server

A guide to building an encrypted connection to your home network from anywhere.

Raspberry Pi

Problemi con Windows 10? Ecco lo strumento per ottenere di nuovo un'installazione pulita

Non tutti lo conoscono, ma lo strumento <b>Fresh Start di Windows 10</b> può essere molto utile quando il sistema ha iniziato a presentare fastidiosi …

How to Scan for (and Repair) Corrupted System Files in Windows 10

Built inside of every version of Windows 10 is the System File Checker tool, a Swiss army knife of sorts that can help you navigate your way out of …

Windows 10

Be cautious, free VPNs are selling your data to 3rd parties

It isn’t unusual to find companies using deceptive practices when trying to market and grow their brands. One niche where this is very rife is in the VPN industry. It was recently revealed that contrary to claims on their websites, 26 of the 117 most popular VPN services log user data despite …

Privacy

Best Linux Software: Our Editorial List of Essential Linux Apps

Being a new Linux user, sometimes you may feel your Linux system is scary and confusing if you recently have come from Windows or Mac OS. But …

Linux

The year of Linux on the (Windows) Desktop - WSL Tips and Tricks

I've been doing a ton of work in bash/zsh/fish lately - Linuxing. In case you didn't know, Windows 10 can run Linux now. Sure, you can run Linux in a …

Linux

Windows 10 tip: How to turn on System Protection and create System Restore points

One of the oldest Windows recovery tools, System Restore, is disabled by default on most Windows 10 installations. Here's how to re-enable this …

Windows 10