Another laptop, another SSD revival, plus a dash of Linux

Remember my old Lenovo G50 laptop? Well, it’s still around, still working reasonably well. As you may recall, it’s got a fabulous eight-boot setup, and I’ve used it for dozens if not hundreds of distro tests. Currently, the machine runs Windows 10 (which I’ve not used on this box in three-four years), CentOS 7 and 8, Rocky Linux 8, Manjaro, MX Linux, Fedora, and Ubuntu 20.04.

How to Hash a File on Linux

Hashing files is a critical process in the realm of data integrity and security. In this article, we will discuss how to hash a specific file, linuxconfig.txt, using various hashing algorithms available in Linux. Additionally, we will explore how to restore the file based on its hash, ensuring you can verify its integrity over time.

Torizon and Texas Instruments Collaborate on Cybersecurity Compliance for Embedded Systems

Torizon and Texas Instruments have announced a collaboration aimed at simplifying cybersecurity compliance and development for industrial and medical embedded systems. The partnership integrates Torizon’s software platform with TI’s Arm-based, Linux-capable processors, addressing increasing security requirements such as those outlined in the EU Cyber Resilience Act.