Language Selection

English French German Italian Portuguese Spanish

LXer

Syndicate content
Linux and Open Source news headlines
Updated: 49 min 36 sec ago

Resetter – Simple Way To Reset Ubuntu/Linux Mint To Factory Defaults

Friday 26th of May 2017 02:41:23 AM
Resetter is an application built with python and pyqt that will help users to reset an Ubuntu, Linux Mint and few other Linux distributions to factory defaults alike back to its factory settings.

5 laws every aspiring DevOps engineer should know

Friday 26th of May 2017 01:27:02 AM
"A good engineer is a lazy engineer," some will say. And to a certain extent, it's true: Laziness is a great quality if you're automating repetitive tasks. But laziness flies in the face of learning new technologies and getting new work done. Somewhere between Junior Systems Administrator and Senior DevOps Engineer, laziness no longer becomes an advantage.Let's discuss the five laws aspiring DevOps engineers should follow if they want to become great DevOps engineers.read more

Skylake industrial PC offers DDR4 and front facing I/O

Friday 26th of May 2017 12:12:42 AM
Adlink launched a rugged, Linux-ready “MVP-5000” industrial PV with 6th Gen Core processors, up to 32GB DDR4 RAM, and mini-PCIe based wireless options. The MVP-5000 is a close cousin to last year’s MVP-6000, the first in Adlink’s “value line” series of rugged, fanless MVP computers, which offer much of the functionality of its MXE line […]

FreeFileSync The Best Backup And File Synchronization Tool For All Platforms

Thursday 25th of May 2017 10:58:22 PM
?We all have our precious data stored on our PC that we love very much, such as pics, office documents, important files and other stuff. We all try to make a backup of this in mostly one of our external hard disks as the Internet isn’t that fast all the time. But haven’t you felt tired to create exact same folders with same permissions, icons, date and time and many other things to maintain while copying files from one disk to another? Especially copying permissions is not an easy task for us. ??This is why today we are going to discuss an awesome file syncing software called FreeFileSync.

Which tools do you depend on for your DevOps workflow?

Thursday 25th of May 2017 09:44:02 PM
DevOps is mostly about culture change. Being successful is all about finding ways to bridge the gap between the builders and the maintainers, bringing projects to fruition and updating them in shorter cycles to maintain a competitive advantage. But at the end of the day, you need the right tooling to make it all work.read more

Distro watch for Ubuntu lovers: What's ahead in Linux land

Thursday 25th of May 2017 08:29:42 PM
Elementary OS, my dear penguin?With the death of Unity, Canonical will focus more attention on Ubuntu servers, Ubuntu in the cloud and Ubuntu in the so-called Internet of Things.…

How to Install Spotify On Fedora Linux

Thursday 25th of May 2017 07:15:22 PM
Spotify is probably the most popular streaming music service in the world right now, and it does have a native Linux client. Unfortunately, that client isn't available in the official Fedora repositories or the Spotify Linux repositories. The community has come to the rescue, though, and it is available from a popular third party Fedora repository that is even recommended by the Fedora Project.

How to Build a Custom Kernel on Ubuntu

Thursday 25th of May 2017 02:01:44 PM
Building a custom Linux kernel sounds terrifyingly difficult, but it’s really not that hard. Learn how to build and package your own kernels on Ubuntu.

More in Tux Machines

XOD: A New And Open Source Visual Programming Language For Arduino, Raspberry Pi, Etc.

However, when it comes to hardware tinkering, programming knowledge is a must. To take care of this issue, developers have been trying to create what’s called visual programming languages. Many of them are already popular, including the likes of Node-Red and NoFlo, and others are budding. One such new visual programming language for Raspberry Pi, Arduino, and other development boards is XOD. In an email sent to Fossbytes, the creators of XOD programming language told that they’ve added graphical functionality and functional reactive principles. XOD language, XOD IDE, and library sources will be open sourced and published on GitHub once it’s launched. Read more

8 ways to contribute to open source when you have no time

One of the most common reasons people give for not contributing (or not contributing more) to open source is a lack of time. I get it; life is challenging, and there are so many priorities vying for your limited attention. So how can you find the time in your busy life to contribute to the open source projects you care about? In the interest of full disclosure, I should warn you that I was late getting this article to the editors because I couldn't find the time to work on it. Take my advice at your own risk. Read more

Norway register shares dataset tools as open source

Norway’ Brønnøysundregistrene (Brønnøysund Register Centre), the government agency managing many of the country’s public registers and digital information exchange systems, is developing a semantic catalogue which it will make available as open source software in autumn. The tools are intended for Norway’s public sector, that can use them to for task involving public and not-public datasets. Read more

Security: Brutal Kangaroo Targets Windows, Linux Updates Available, Reproducible Builds, and Patching Stack Clash

  • Brutal Kangaroo
    Today, June 22nd 2017, WikiLeaks publishes documents from the Brutal Kangaroo project of the CIA. Brutal Kangaroo is a tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumbdrives. Brutal Kangaroo components create a custom covert network within the target closed network and providing functionality for executing surveys, directory listings, and arbitrary executables. The documents describe how a CIA operation can infiltrate a closed network (or a single air-gapped computer) within an organization or enterprise without direct access. It first infects a Internet-connected computer within the organization (referred to as "primary host") and installs the BrutalKangaroo malware on it. When a user is using the primary host and inserts a USB stick into it, the thumbdrive itself is infected with a separate malware. If this thumbdrive is used to copy data between the closed network and the LAN/WAN, the user will sooner or later plug the USB disk into a computer on the closed network. By browsing the USB drive with Windows Explorer on such a protected computer, it also gets infected with exfiltration/survey malware. If multiple computers on the closed network are under CIA control, they form a covert network to coordinate tasks and data exchange. Although not explicitly stated in the documents, this method of compromising closed networks is very similar to how Stuxnet worked. The Brutal Kangaroo project consists of the following components: Drifting Deadline is the thumbdrive infection tool, Shattered Assurance is a server tool that handles automated infection of thumbdrives (as the primary mode of propagation for the Brutal Kangaroo suite), Broken Promise is the Brutal Kangaroo postprocessor (to evaluate collected information) and Shadow is the primary persistence mechanism (a stage 2 tool that is distributed across a closed network and acts as a covert command-and-control network; once multiple Shadow instances are installed and share drives, tasking and payloads can be sent back-and-forth).
  • Security updates for Wednesday
  • Reproducible Builds: week 112 in Stretch cycle
  • 5 things you need to know about Stack Clash to secure your shared Linux environment
    The vulnerability is present in Unix-based systems on i386 and amd64 architectures. Affected Linux distributions include Red Hat, Debian, Ubuntu, SUSE, CentOS and Gentoo. Solaris is owned by Oracle. FreeBSD, OpenBSD and NetBSD are also impacted. Qualys has been working with distributions and vendors since May to get the vulnerabilities fixed, and the updates are just beginning to be released. Administrators need to act promptly to update affected machines with the security updates.