Linux already does this. :) Most applications go in /usr/bin, shared libraries go under /usr/lib, various resources in /usr/share. Those folders...
For the most part I use ordinary old GNU bash, because it has the options I like and isn't confusing. I do like ksh and derivatives thereof,...
Hmm. I like the idea of using Windows native sandboxing features. But I don't know enough about the native API, and what can and can't be hooked...
No, though you could probably do that with the portable version easily enough using icalcs or such. Very good point though, Windows has...
If I had to go with one and only one, I'd say Qupzilla (the browser). Why? - Applications are always the first line of defense, browsers more than...
Depends heavily on what you're up against IMO. Uncommon software and weird security setups make you a narrower target for the usual malware dreck....
Something I just remembered: http://lars-lab.jpl.nasa.gov/JPL_Coding_Standard_C.pdf Especially interesting to me are: Rule 4 (recursion) There...
That not inadequate. If it's made RO through software, it can be made RW again by any malicious program running as admin... This is why having...
So I want to transfer some tools to a compromised machine, and CDs or DVDs are not an option. Or maybe I want to have a live Windows environment...
They ought to sic their lawyers on the NSA. ::)
What gets to me here is that pointing the finger at China might have worked before Snowden blew the NSA's corruption wide open, but *everyone*...
Separate names with a comma.