

FSSTND and FHS: How do They Compare?
Release History Let’s compare The Filesystem Standard (FSSTND) FHS of old with the Filesystem Hierarchy Standard (FHS) of today. Linux...
Deny My Services Will Ya?
Ga day mate (s): Harry Nasty Hacker here (incognito) and up to my old tricks again. Today I am going to get that boss man for being so...


Linux OS and Hardware Driver Issues
Hello, and welcome once again to “Backyard Blog”. This trip we will be discovering two known hardware/Linux issues; what the fixes are;...


Linux OS Comparisons
Howdy again. Today we are going to discover Linux OS Comparisons. I found a wonderful article called 10 of the most popular...


Hacking Tool Review: John the Ripper
John the Ripper wins the award for having the coolest name. John the Ripper, mostly just referred to as simply, ‘John’ is a popular...
Don't Be A Brute!
Don’t Be a Brute! Well, hello again and welcome back. This afternoon’s adventure is about…you guessed it, brute-force attacks; what they...


Mobile Device Recommendation
Howdy and good morning. At least I believe it is morning. After this past weekend, I’m not totally sure. Anyway, this time the boss man...
Mobile Device Encryption
Mobile Device Encryption: Hello again. Today boss man is confused about the different types of encryption available to mobile device...
Wardriving & Warchalking: What are they?
Wardriving and Warchalking: What are they? Wardriving or warwalking is an old art of driving or walking around a business or residential...


Mobile Devices Management Plan
Now that we know which Mobile Device Managements applications are out there, let’s examine how to correctly use them. Boss man wants a...