-
May 21, 2020
"I think computer viruses should count as life. I think it says something about human nature that the only form of life we have created so far is purely destructive. We’ve created life in our own image." - Stephen Hawking… read more »
-
May 20, 2020
A very good feature of GNOME is the automatic mount of app's document sharing when an iOs device is connected to the system. On my i3 setup the user experience is more basic, but still useful. First, resolve some dependencies:… read more »
-
May 19, 2020
“It's still magic even if you know how it's done.” ― Terry Pratchett Apple battles Ableton Live with new Logic Pro X 10.5 features Today, Apple announced Logic Pro X 10.5, a major update to its popular digital audio workstation (DAW) for… read more »
-
May 18, 2020
Since October 2018 Update, Windows 10 comes with a "Packet Monitor" tool called pktmon.exe.With the upcoming release of the Windows 10 May 2020 Update, Microsoft will update the pktmon tool to allow real-time visualization of monitored packets. How to use… read more »
-
May 15, 2020
“There's something really liberating about having some corner of your life that's yours, that no one gets to see except you. It's a little like nudity or taking a dump. Everyone gets naked every once in a while. Everyone has… read more »
-
May 14, 2020
curl is a project providing a library and command-line tool for transferring data using various protocols.The command line tool can be used inside shell scripts with ease and it has around 120 command line options for various tasks. Is a… read more »
-
May 13, 2020
"Amateurs hack systems, professionals hack people" - Bruce Schneier Zoom to add end-to-end encryption with Keybase acquisition Zoom has acquired secure messaging and identity management firm Keybase as its looks to shore up security capabilities on its platform with end-to-end… read more »
-
May 12, 2020
Björn Ruytenberg, a researcher of Eindhoven University of Technology, published a research about a new vulnerability in Thunderbolt ports. The new attack, named "Thunderspy" [1], is designed to break Thunderbolt's security, making it possible for attackers to steal information from… read more »