Hackers Can Listen In on Your Skype Calls

Mark Zuckerberg covers up his laptop’s camera with a little piece of tape. After he posted a photo of himself at a desk this summer celebrating Instagram’s growing popularity, online commenters seized on the little…


How to stop brute force attacks against xmlrpc.php

According to Wikipedia, XML-RPC is a remote procedure call (RPC) protocol which uses XML to encode its calls and HTTP as a transport mechanism. “XML-RPC” also refers generically to the use of XML for remote…


Ubuntu 16.10

Canonical has announced the release of a new version of its popular Ubuntu operating system. The latest version, Ubuntu 16.10, offers users many updated packages, a preview session of the Unity 8 desktop environment and…


Explore the All-New Apple Music [Video]

Apple has posted a video highlighting the new design of Apple Music released with iOS 10. Listen anywhere—even offline. Over 40 million songs. Thousands of handpicked playlists. Exclusive music and video premieres. Shows from the…


Efficient commands

I cringe anytime I see someone code inefficiently. Here are three of the most common mistakes, followed by a better way to do the same thing. Bad: cat somefile | grep something Better: grep something…


A Look at the BIND Vulnerability: CVE-2016-2776

On September 27, the Internet Systems Consortium (ISC) announced the release of patches for a critical vulnerability that would allow attackers to launch denial-of-service (DoS) attacks using the Berkeley Internet Name Domain (BIND) exploits. The…



Bash Hotkeys

Bash provides many hot keys to ease use. ctrl-l — clear screen ctrl-r — does a search in the previously given commands so that you don’t have to repeat long command. ctrl-u — clears the…