Got an ancient laptop or desktop lying around? We tell you how to transform an old PC into an NAS, experiment with a new OS, build your own security cam, and more.
The open-source software underlying critical infrastructure — from financial systems to public utilities to emergency services and electronic health records — is vulnerable to malicious cyberattacks.