If your disk is encrypted, the investigators cannot tell how much disk space is being used in the first place.
The Windows Integrity Controls are a bit different than what is found on UNIX systems. The MAC systems on Linux (especially SELinux) follow the...
Cracking a 128 bit key by brute force would take longer than the age of the Sun even if using all the computers on earth. So, yeah, his "several...
Rootkits are not new and have been around for decades on Unix (the term "rootkit" actually refers to Unix's root account). For years most...
You won't see a performance increase by restoring an image. Linux is not Windows, it has no "Windows rot."
SSL MiTM attacks are possible and Tor doesn't really have anything to do with it. Combating a MiTM attack would be the same whether using Tor or...
I don't see this as a big deal. EFF has to pay its bills somehow.
Wow, it's refreshing to see someone who authored a tool like this to admit that schemes that have been peer reviewed by professionals for 20 years...
The first comment in the article wins the Internet. He said: "Ubuntu, (not exclusively) for human beings."
Another issue with Gentoo is they do not digitally sign the tarballs in the repository. I shouldn't have to explain why this is horrible for...
That's crazy talk! We all know from the Windows world that AV software is a sure-fire way to have a 100% computer!
Only problem with that is you have to exchange a key securely beforehand. This is the entire reason public-key schemes were invented back in the...
Jitsi is supposed to be good, but it's a VOIP client and didn't really fit into the OP's description of what he was looking for.
And it's also the only one you listed that is 100% closed-source. I never trust or use closed-source software that is security related. Your...
OTR is your best bet (Pidgin is the most popular client for using OTR). But it doesn't solve the issue of anonymity. For that you will need Tor...
Windows XP does not have ASLR.
If you encrypt the entire drive, it will encrypt everything. I have no experience with tokens like Yubikey so I cannot answer this. When...
I just answered you on the Ubuntu forums, but will answer here too. You can't. Truecrypt does not support encrypting Linux OS's (only...
Use Truecrypt. If you've had "failures" it probably means you have done something wrong.
It will require you to compile your own kernel, but that is really sort of the point of distros like Slack and Gentoo. The MAC systems pretty...
Oracle has stopped working on OpenOffice all together and have said they are going to leave it to the community, so that might be why you notice...
You shouldn't have to do that. The original account created by the system is a limited account. I think it only means that the packages are...
Any Linux LiveCD will do. Just put the CD in, open up a root terminal and type: dd if=/dev/zero of=/dev/sda bs=1M (where sda is the name of...
I recommend going to the Truecrypt forums and asking there. http://forums.truecrypt.org/
The problem with the general tech media is they don't understand cryptography (at all) and thus exaggerate claims of cracking algorithms and...
Separate names with a comma.