How-To Geek

Dave McKay-Freelance Journalist

Dave McKay

Freelance Journalist

  • 417
    articles
  • 416
    Features
  • 1
    Guides

Page 15

About Dave McKay

Dave McKay first used computers when punched paper tape was in vogue, and he has been programming ever since. After over 30 years in the IT industry, he is now a full-time technology journalist. During his career, he has worked as a freelance programmer, manager of an international software development team, an IT services project manager, and, most recently, as a Data Protection Officer. Dave is a Linux evangelist and open source advocate. Expect detailed how-to's, distribution reviews, and Linux-centric editorials.

Latest Articles

How to Get a Graphical Device Manager for Linux

HardInfo is like Windows Device Manager for Linux. A great GUI and tons of detailed information. Here's how to use it.

Quick Steps to Better Home Working Security

The new normal involves fewer people in offices and more people working from home.

How To Stop Being Overwhelmed by Security Audits

Getting certified against a standard or compliant with data protection legislation is always tough.

Need to Pay the Ransom? Negotiate First

Did you know that ransomware gangs are open to negotiation? If circumstances dictate you have to pay the ransom don't just roll over---negotiate a better deal.

The Top Five Cloud Security Threats

Practically every business is running some kind of cloud network, meaning cloud security is vital.

The Best Linux Distributions Without systemd

Wanting to leave systemd behind but don't know which Linux distribution to head to? Let's look at some you can try.

SolarWinds Hack: What Happened and How To Protect Yourself

Federal agencies and global organizations were compromised in a long-term, state-sponsored cyberattack.

How to Use the restic Backup Program on Linux

Safeguard your precious files and irreplaceable photos with the restic backup program.

How to Process a File Line by Line in a Linux Bash Script

Reading lines from a file is an elementary programming skill. Doing it in Bash means handling a few Linux gotchas. We'll show you how.

How To Defend Yourself Against Rootkits

Rootkits compromise a network in a way that lets the threat actors get back in whenever they like.

Use SQL and osquery to Check Your Hardware on Linux

Do you keep forgetting the syntax for obscure hardware commands you hardly use? The osquery application lets you interrogate the hardware, users, and performance of your Linux computer with standard SQL commands.

How to Install Signal Desktop on Linux

The Signal Linux client gives you Signal's famous security and privacy on your computer. Peace of mind and a real keyboard!

Cyberattacks to Watch Out For In 2021

Forewarned is forearmed.

The Trickbot Botnet is Dead - Or Is It?

In the run-up to the 2020 US election, Microsoft launched an offensive against a prolific botnet called Trickbot.

Why Are Some Network Ports Risky, And How Do You Secure Them?

There's a network port for every type of traffic.

How to Use OpenPGP Encryption for Emails in Thunderbird

Encrypted email used to be tricky, but Thunderbird's slick OpenPGP integration makes it much easier to use.

Why Do They Spell Phishing With 'ph?' An Unlikely Homage

Back in the counter-culture days of the U.

How to Use DB Browser for SQLite on Linux

Design, create, and edit SQLite database files on Linux with DB Browser for SQLite.

From Lone Wolf to Organized Crime - Where Cyber Threats Come From

There's more than one type of threat actor, and they're all differently skilled.

Web
Why Cyber Criminals Love Phones

Safeguarding your data by protecting your computers? Great.

13 14 15 16 17
Page 15 / 21