12%
10.12.2013
this number, consider the devices per capita rather than the total number. In 2010 we had 1.84 devices per person, which is easy to see: At the moment, you have a phone, maybe a couple of tablets, a laptop
12%
12.03.2014
In an age when laptops are more powerful and offer more features than high-performance servers of only a few years ago, whole groups of developers are discovering new opportunities in their data
12%
04.11.2011
Recent trends in computing are toward more cores doing more tasks at once. These days, you are likely to have a dual- or quad-core CPU in your laptop, and perhaps 4, 6, 12, or 16 cores in your
12%
21.08.2014
security elements], smart cards, and NFC). Today, you can even see it working with supported devices such as the Lenovo Laptop fingerprint reader and the Samsung Galaxy S3.
FIDO alliance's efforts to build
12%
07.10.2014
also enables FIDO Ready authentication on many Lenovo laptops. In an email interview, McDowell of FIDO Alliance detailed this promising deployment: "The first deployment of FIDO Ready authentication
12%
11.02.2016
for a developer in a container on their laptop will probably also work on a server, but any administrator hosting that container could be taking an incalculable risk – a fact that is often ignored. The Core
12%
14.03.2018
thoughtfully attempts to open a window in a web browser to show the results of your tests, so you need to be a non-root user to install Scout2 (on my Linux Mint laptop, at least). I'm quite happy navigating
12%
09.04.2019
location.
Env != Sane
Gitrob needs at least Go v1.8; my Linux Mint laptop (based on Ubuntu 18.04) carries version 1.6 in its package manager. To remedy this, I installed version 1.8 manually [6], which
12%
20.03.2014
In an age when laptops are more powerful and offer more features than high-performance servers of only a few years ago, whole groups of developers are discovering new opportunities in their data
12%
06.10.2019
, then an old laptop is probably better suited than a VM, because it avoids the virtualization layer between Kali and the network.
Three Applications
Once Kali is running, the tools can be divided roughly