In this article I describe step by step how to use the Trusted Platform Module to decrypt LUKS system partitions.
In this article, I’ll show you how to convert an existing Windows installation into a virtual machine and how to make it ready for use under Linux.
Google’s “Home” devices are openly accessible on the local subnet. Some basic functions can read and written. The information extracted from them could be interesting in the hands of an intruder.
Sharing a folder between a host and a guest can be a bit of a headache in Fedora or Red Hat Linux. In this article I demonstrate how to set up a shared folder with SELinux enabled.
The tools to monitor your calls are already built into your wireless router, and whoever has access to it can breach your privacy.
The cyberjack card readers are very easy to install in Fedora Linux 29. You can even use your German ID card.
In this article I will show how to set up Google’s DNS-over-TLS on Fedora Linux (29) using the Stubby DNS resolver.
Want to pair or unpair your Logitech device to a “Unifying Receiver” on Linux? Here is how to do it.
I have experienced problems connecting my Bluetooth mouse with Linux. The problem was that after the first pair through the Gnome Settings UI, the Comfort Mouse was not able to reconnect to the PC.
Kali Linux is a wonderful choice to be used within a virtual machine. While most Windows users might prefer to run it in VMware or VirtualBox (or Hypervisor), Linux users have the choice to use QEMU/KVM.