After 22 years with the same company, my job was eliminated this summer. I have 2 decades+ of Unix/Linux/Networking/Security/Hardware experience, but not any current certifications. I worked in 4 different OS's (HP/UX, AIX, Solaris, RedHat) on 6-8 different hardware platforms. So, getting certifications wasn't something my employer cared anything about because we were all over the IT map and just needed us to know how to do our jobs. Now that I am on the hunt again I am needing to backfill the certifications and I am curious what you all see as the most popular certifications.
Thanks.submitted by /u/sigep174
softpedia: Debian GNU/Linux 8.6 "Jessie" is here to add various important improvements to almost 80 packages, as well as to integrate all the security updates that have been released
I work at a company that has a triple boot iMac environment that uses refind as its boot manger, as I understand refind is only a boot manger and not a boot loader, so I am just wondering how did refind become so popular for macs over say grub?
It seems like an extra step of having to use a boot manger to load a boot loader to boot the system, why not just a boot loader?submitted by /u/aaranaw
A new stable release of the PPSSPP free, cross-platform, and open-source PSP (PlayStation Portable) emulator application has been made available for download, version 1.3.
PPSSPP 1.3 is here seven months since the release of the previous maintenance update, namely PPSSPP 1.2, and adds various interesting additions, such as better support for Android-based Samsung Galaxy S7 smartphones, as well as any device running Apple's iOS 9 or later mobile operating system.
There's also improved support for 64-bit Android TV platforms, a memory leak patch for Raspberry Pi single-board computers, the implementation of the latest FFmpeg multimedia backend, and a workaround for some rendering issues on Tegra K1 and Tegra X1 mobile processors.
The developer of Devil Daggers [Official Site] has teased a Linux version to come soon, exciting, as it looks great and has very positive reviews overall.
We have published many tutorials for hackers and security researchers. You may have noticed that most tutorials are based on Linux operating systems. Even the hacking tools out there are based on Linux barring a few which are written for Windows and Mac. The moot question here is that why do hackers prefer Linux over Mac or Windows?
Today we look at the reason why hackers always prefer Linux over Mac, Windows, and other operating systems. You may have your own reasons for choosing Linux but what do hackers really look forward to while working with Linux.
Most of the research on this infection has been done by Marinho, who says that his company was called in to investigate and fix a massive infection at a multi-national company that affected computers in its Brazil, India, and US subsidiaries.
In the complicated world of networking, problems happen. But determining the exact cause of a novel issue in the heat of the moment gets dicey. In these cases, even otherwise competent engineers may be forced to rely on trial and error once Google-fu gives out.
Luckily, there’s a secret weapon waiting for willing engineers to deploy—the protocol analyzer. This tool allows you to definitively determine the source of nearly any error, provided you educate yourself on the underlying protocol. The only catch for now? Many engineers avoid it entirely due to (totally unwarranted) dread.
A potential solution to the growing pains of Bitcoin is the use of proof-of-stake rather than proof-of-work. An attacker which has a stake in the history already on the blockchain is unlikely to jeopardize it. In proof-of-stake, the cryptocurrency is paid by the miners into the bets of the next block to win. If an attacker bets on multiple chains, then they're guaranteed to lose money. This, combined with the fact that buying a lot of currency is more expensive than a lot of computer power, makes proof-of-stake practical. We will cover Peercoin later, which does proof of stake and has other mitigations for certain attacks.
An interesting idea is vote tattling. When an attacker votes on one block with a predecessor, and then votes on another with the same predecessor, peers can observe this. They can report double voting by using the votes as cryptographically-verified evidence, and taking the attacker's vote-money.