Explore >> Select a destination


You are here

neroteam.com
| | www.stavros.io
4.4 parsecs away

Travel
| | [AI summary] The author explains how to configure OpenSSH 8.2 to securely authenticate using FIDO2 hardware USB keys via terminal commands.
| | blog.lewman.com
4.5 parsecs away

Travel
| | If you're involved in computer security and authentication,you might know about the...
| | educatedguesswork.org
4.7 parsecs away

Travel
| | [AI summary] This technical article explains the fundamentals of the Domain Name System (DNS), its resolution process, privacy concerns, and the need for security improvements like DoH and DNSSEC.
| | gabevenberg.com
13.8 parsecs away

Travel
| I've been using Arch Linux for several years now. Of course, my first installs were... blunderous, as i wanted to do full disk encryption from the get-go, and I didn't know what I was doing. After those first one or two installs, I generally settled on LVM on LUKS with a GRUB bootloader and my swap on an LVM volume, mostly because it makes it much easier to setup hibernation/suspend to disk vs, say, a swap file.