Language Selection

English French German Italian Portuguese Spanish

LXer

Syndicate content
Linux and Open Source news headlines
Updated: 1 hour 18 min ago

An Introduction to Text Editors -- Get to Know nano and vim

Thursday 22nd of December 2016 09:23:47 PM
At some point in your Linux administration career, you are going to edit a configuration file, write a Bash script, code, take a note, or any given task associated with text editors. When you do, you will turn to one of the popular text editors available to the Linux platform.

Red Hat stock drops by more than 10%.

Thursday 22nd of December 2016 08:15:10 PM
Red Hat dropped after beating earnings but missing on revenue. Then their CFO announced that he's leaving to take a position as the CEO of another company.

Wget (Command Line Downloader) command examples

Thursday 22nd of December 2016 07:06:33 PM
Wget handle download pretty much good compared with other tools, even it doesn't support multi-threading.

Top open source creative tools in 2016

Thursday 22nd of December 2016 05:57:56 PM
A few years ago, I gave a lightning talk at Red Hat Summit that took attendees on a tour of the 2012 open source creative tools landscape. Open source tools have evolved a lot in the past few years, so let's take a tour of 2016 landscape.read more

IPFire 2.19 Updated to Enable Asynchronous Logging by Default, Add Tor 0.2.8.10

Thursday 22nd of December 2016 04:49:19 PM
IPFire Project, through Michael Tremer, announced the general availability of a new maintenance update to the IPFire 2.19 stable series of the professional and hardened Linux-based firewall distribution.

5 Essential Linux Holiday Amusements

Thursday 22nd of December 2016 03:40:42 PM
Yes, my fellow penguins, it is time for the annual ritual of having fun with silly Linux holiday commands! The fun of being a grownup is you get to make your own observances, and Linux silliness is one of mine. Without further ado let us plunge into our maelstrom of Linux holiday delights.

6 great monospaced fonts for code and terminal in Fedora

Thursday 22nd of December 2016 02:32:05 PM
Because they spend most of their days looking at them, most sysadmins and developers are pretty choosy when it comes to picking a monospaced font for use in terminal emulators or text editors. Here are six great monospace fonts that... Continue Reading →

OpenShot 2.2 Open-Source Video Editor Released with 4K Video Editing, More

Thursday 22nd of December 2016 01:23:28 PM
Just in time for the Christmas holidays that some of you are celebrating around the world, a new stable version of the popular OpenShot open-source video editor software arrived with numerous goodies.

Vulnerability scanning of Docker images on OpenPower Systems

Thursday 22nd of December 2016 12:14:51 PM
This article explains how to configure and set up Clair vulnerability scanner for Docker images on OpenPOWER servers.

A Holiday Gift From Conexant: an ALSA Driver For Recent Cherry Trail SOC Based Devices

Thursday 22nd of December 2016 11:06:14 AM
The machines where sound has been a problem have Intel SST sound on the SOC which uses the Conexant codec. On those systems the "sound card" is simply not detected.This is good news for owners of many recent tablets and notebooks running on recent Intel Atom (Cherry Trail) based SOCs. These include systems by Acer, ASUS, HP, Toshiba and probably others.

Debian-Based Raspbian GNU/Linux OS with PIXEL Desktop Out Now for PC and Mac

Thursday 22nd of December 2016 09:57:37 AM
Raspberry Pi Founder Eben Upton proudly announced the availability of the Debian-based Raspbian GNU/Linux distribution with the recently introduced PIXEL desktop environment for PC and Mac.

How to Quickly Clear Your System Cache in Ubuntu

Thursday 22nd of December 2016 08:48:59 AM
If left unchecked, your system cache might take up a big chunk of your storage and memory. Here’s how you can quickly clear the system cache in Ubuntu.

How to find network card driver name and version on Linux

Thursday 22nd of December 2016 07:40:22 AM
For network interface card (NIC) hardware to operate properly, you need a suitable device driver for the NIC hardware. A NIC device driver implements a hardware-independent common interface between the Linux kernel and the NIC, so that packets can be moved between the kernel and the NIC. While some drivers may be statically built in the kernel, most drivers for modern NICs are dynamically loaded as kernel modules.

BlackArch Linux 2016.12.20 released

Thursday 22nd of December 2016 06:31:45 AM
Just some hours back BlackArch team announced the new release of ArchLinux 2016.12.20. With this new release more new tools and updated list of packages with updated system files are welcomed as well.So, What's New In BlackArch Linux 2016.12.20?[....]

2016 Hacktoberfest ignites open source participation

Thursday 22nd of December 2016 05:23:08 AM
DigitalOcean launched Hacktoberfest in 2014 to encourage contribution to open source projects. The event was a clear success, and in terms of attendance and participation goals reached, it[he]#039[/he]s also clear that Hacktoberfest has become a powerful force in driving contributions to open source. The lure of a t-shirt and specific, time-limited goals help new contributors get started and encourage existing contributors to rededicate themselves and their efforts.

Guide to the Open Cloud: The State of Virtualization

Thursday 22nd of December 2016 04:14:31 AM
Is virtualization still as strategically important as it was now that we are in the age of containers? According to a Red Hat survey of 900 enterprise IT administrators, systems architects, and IT managers across geographic regions and industries, the answer is a resounding yes. Virtualization adoption remains on the rise, and is integrated with many cloud deployments and platforms.

Quad-core, 64-bit ARM hacker SBC has onboard wireless and eMMC

Thursday 22nd of December 2016 03:05:54 AM
The tiny, open-spec, Kodi-oriented “Khadas Vim” SBC has a quad-core, Cortex-A53 Amlogic S905X, plus WiFi, BT, 2GB RAM, and 8GB ($50) or 16GB ($65) eMMC. A Chinese startup called Khadas has launched an open source Khadas Vim single board computer that runs on the Amlogic S905X, a lower-cost upgrade to the quad-core, Cortex-A53 Amlogic S905 found on Hardkernel’s Odroid-C2 hacker SBC.

Swift Is Old, Why Should I Use it?

Thursday 22nd of December 2016 01:57:16 AM
With emerging technology, there can be the thought that old is not good. It could lack the features and performance the business requires. Cloud technology changes so much, do we still need something like Swift that predates OpenStack?

Linux Mint, please stop discouraging users from upgrading

Thursday 22nd of December 2016 12:48:39 AM
Security is not an “If it ain’t broke, don’t fix it” problem.

Enforcing cluster-wide policies for a Kubernetes-based Docker cluster

Wednesday 21st of December 2016 11:40:02 PM
This article explains how cluster-level policies can be enforced for Kubernetes by using PodSecurityPolicy.

More in Tux Machines

Debian News (manpages and TeX Live)

  • manpages.debian.org has been modernized (2017-01-18)
    https://manpages.debian.org has been modernized! We have just launched a major update to our manpage repository. What used to be served via a CGI script is now a statically generated website, and therefore blazingly fast. While we were at it, we have restructured the paths so that we can serve all manpages, even those whose name conflicts with other binary packages (e.g. crontab(5) from cron, bcron or systemd-cron). Don’t worry: the old URLs are redirected correctly.
  • Debian/TeX Live January 2017
    As the freeze of the next release is closing in, I have updated a bunch of packages around TeX: All of the TeX Live packages (binaries and arch independent ones) and tex-common. I might see whether I get some updates of ConTeXt out, too.

Security News

  • Wednesday's security updates
  • Secure your Elasticsearch cluster and avoid ransomware
    Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Protecting access to Elasticsearch by a firewall is not always possible. But even in environments where it is possible, many admins are not protecting their databases. Even if you cannot use a firewall, you can secure connection to Elasticsearch by using encryption. Elasticsearch by itself does not provide any authentication or encryption possibilities. Still, there are many third-party solutions available, each with its own drawbacks and advantages.
  • Resolve to Follow These 8 Steps for Better Data Security in 2017
    Getting physically fit is a typical New Year's resolution. Given that most of us spend more time online than in a gym, the start of the new year also might be a great time to improve your security “fitness.” As with physical fitness challenges, the biggest issue with digital security is always stagnation. That is, if you don't move and don't change, atrophy sets in. In physical fitness, atrophy is a function of muscles not being exercised. In digital fitness, security risks increase when you fail to change passwords, update network systems and adopt improved security technology. Before long, your IT systems literally become a “sitting duck.” Given the volume of data breaches that occurred in 2016, it is highly likely that everyone reading this has had at least one breach of their accounts compromised in some way, such as their Yahoo data account. Hackers somewhere may have one of the passwords you’ve used at one point to access a particular site or service. If you're still using that same password somewhere, in a way that can connect that account to you, that's a non-trivial risk. Changing passwords is the first of eight security resolutions that can help to improve your online security fitness in 2017. Click through this eWEEK slide show to discover the rest.
  • Pwn2Own 2017 Takes Aim at Linux, Servers and Web Browsers
    10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual Machines, servers, enterprise applications and web browsers. Over the last decade, the Zero Day Initiative's (ZDI) annual Pwn2Own competition has emerged to become one of the premiere events on the information security calendar and the 2017 edition does not look to be any different. For the tenth anniversary of the Pwn2Own contest, ZDI, now owned and operated by Trend Micro, is going farther than ever before, with more targets and more prize money available for security researchers to claim by successfully executing zero-day exploits.
  • 'Factorio' is another game that was being hit by key scammers
    In another case of scammers trying to buy keys with often stolen credit cards to sell on websites like G2A, the developers of 'Factorio' have written about their experience with it (and other stuff too).

Red Hat News

Development News: LLVM, New Releases, and GCC