TrueCrypt’s dramatic shutdown in May, 2014 left everyone shocked. TrueCrypt was the go-to recommendation for full-disk encryption software, and the developers suddenly said the code was “not secure” and halted development.
Zip files can be password-protected, but the standard Zip encryption scheme is extremely weak. If your operating system has a built-in way to encrypt zip files, you probably shouldn’t use it.
When you enter a long command into the Terminal window that you found on the web or in a document, you can save yourself some time by easily copying and pasting the command at the prompt.
You don’t need third-party software to access FTP servers, WebDAV sites, and other remote files shares. Popular desktop operating systems like Windows, Mac, and Linux can all do this out-of-the-box.
If you do not need or want to encrypt files on your computer but would like to stop casual snooping, then what is the best method for password protecting your folders on Linux/Unix? Today’s SuperUser Q&A post has helpful answers to a curious reader’s question.
Chromebooks offer built-in support for SSH tunnelling with their included crosh shell and SSH command. An SSH tunnel allows you to use an SSH connection like a VPN or encrypted proxy, sending your browsing traffic through the secure tunnel.
The Unity Launcher in Ubuntu is locked to the left side of the screen. If you would rather have a launcher at the bottom of the screen, there is a way to convert the Unity Launcher into a dock-style launcher at the bottom of the screen.
Whether you’re cutting out the boring parts of your vacation video or getting a hilarious scene for an animated GIF, Avidemux provides a quick and easy way to cut clips from any video file.
Search for a duplicate-file-finder and you’ll find yourself bombarded with junkware-filled installers and paid applications. We’ve put together lists of the best free duplicate-file-finders so you can save some time.
Whether you’re using Linux on your desktop or a server, there are good tools that will scan your system for duplicate files and help you remove them to free up space. Solid graphical and command-line interfaces are both available.
Most home networks rarely have one single type of client connecting to it. Usually, there’s a blend of Windows, Android, iOS, and maybe even Macs. How do you keep all these clients connected while keeping younger users out of trouble?
Have you switched from Mac to Linux and miss the Mac OS X-style launcher? Or, maybe you just want a dock other than the Unity Launcher on your Linux machine. Cairo-Dock is a customizable dock you can add to your Linux desktop.
It’s time to compress some files, so what format do you use? Zip, RAR, 7z, or something else? We performed some benchmarks to determine which format gives you maximum compression.
It’s worth noting that both Windows Phone and Windows RT also offer a “device encryption” feature. It works similarly to the feature that made its way over to the desktop version of Windows with Windows 8.1.
Ever since the first person wrote out 5318008 on a calculator, nerds have been hiding secret numbers inside of your PC, and using them to negotiate secret handshakes between applications and files. Today we take a quick look at some of the more entertaining examples.
Ever hear a quote or piece of dialog in a movie or favorite TV show and wish you could set it as a ringtone or notification on your smartphone? You can actually, with the free, open-source application Avidemux.
Chromebooks aren’t the ideal Minecraft laptops, that’s for sure. There’s no web-based or Chrome app version of Minecraft, which is written in Java. But Chromebook owners aren’t completely out-of-luck if they want to play Minecraft.
If you’re a keyboard person, a lot of things can be accomplished simply using the command line. For example, there are a few easy-to-use methods for creating text files, should you need to do so.
Minecraft runs just fine on Linux, but it’s probably not available for easy installation in your Linux distribution’s package manager. Here’s how to get your Linux system ready for Minecraft.
It’s always a good idea to know some basics about the operating system you’re running on your computer. For example, you may need to know whether you’re running a 64-bit or 32-bit system so you know which file to download for a program you want to install.
You may like using the Unity Launcher in Ubuntu 14.04, but you may not like it taking up room on your desktop. However, there is a way to have the Unity Launcher automatically hide when you’re not using it.
If you use Windows, you are probably familiar with the Add/Remove Programs tool in the Windows control panel. It lists the programs currently installed on your system and provides an easy method for uninstalling them with only a few clicks.
Ubuntu asks you to choose a name for your computer — known as a “hostname” — when you install it. You can change this hostname later, but Ubuntu doesn’t provide a graphical interface for doing so.
You’ve protected a PDF file containing sensitive information with a long, secure password so only the intended party can open it. However, you don’t want to enter that password every time you access the document, so you want to remove the password from your copy.
Linux’s GRUB2 boot loader can boot Linux ISO files directly from your hard drive. Boot Linux live CDs or even install Linux on another hard drive partition without burning it to disc or booting from a USB drive.