Rescue systems play a particularly important role for desktops because they cannot simply be reinstalled on the fly. We look at venerable but outdated Knoppix and three still in development: Grml, SystemRescue, and Finnix.
File I/O is a limiting factor for many applications and can become a bottleneck for data-intensive computing. We analyze different file access functions and present a script that visualizes and optimizes inefficient file I/O.
Netdata relies on easy commissioning and a hosted cloud service to simplify monitoring, alerting, and trending. More than 300 services can be monitored in addition to basic system parameters.
The Flipper Zero mobile hacking tool, a highly portable device that looks like a kiddy toy at first glance, can check a wide range of wireless connections for vulnerabilities. We take a look at potential applications in pentesting scenarios.
Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.