Language Selection

English French German Italian Portuguese Spanish

LXer

Syndicate content
Linux and Open Source news headlines
Updated: 1 hour 45 min ago

Top 5: Perl hashes and arrays, landing a Linux day job, and more

1 hour 49 min ago
In this week's top 5, we take a look at Perl, wikis, what the Grateful Dead has to do with Creative Commons, and more.read more

Ubuntu Linux and Bash as a Windows Program!

3 hours 49 min ago
An Ubuntu Bash shell as a Windows app? Fantastic! Here's how toproceed.

Docker has a business plan headache

5 hours 49 min ago
Docker is the container technology of choice, but that doesn[he]#039[/he]t translate into Docker the successful business. Whatever Docker the business' future, Docker the technology is both open source and a standard. Docker could close up shop today, and you'd still be using Docker containers tomorrow.

Mycroft Widget, Atos and Red Hat's New Cloud Container Solution, npm Bug and More

7 hours 49 min ago
News updates for February 23, 2018.

Overview Of tcpdump With Examples

Saturday 24th of February 2018 06:54:07 AM
You can view information about traffic coming and going from a given network interface using tcpdump. This diagnostic tool allows you to see packet information, that is where incoming packets come from and where outgoing packets are heading to on an interface, with some extra information. You can even save the output to a file to inspect later on. This article will demonstrate the simple examples of tcpdump.

Linux command history: Choosing what to remember and how

Saturday 24th of February 2018 04:54:02 AM
Linux command history is not just about repeating commands. You can selectively decide what to remember and whether to record the date and time your commands were used.

Spectre and Meltdown Mitigations Now Available for FreeBSD and OpenBSD Systems

Saturday 24th of February 2018 02:53:57 AM
More than a month since their public discloser the nasty Meltdown and Spectre security vulnerability have now been fixed for various BSD operating systems including FreeBSD and OpenBSD.

IBM's Phil Estes on the Turbulent Waters of Container History

Saturday 24th of February 2018 01:22:27 AM
Phil Estes painted a different picture of container history at Open Source 101 in Raleigh last weekend, speaking from the perspective of someone who had a front row seat. To hear him tell it, this rise and success is a story filled with intrigue, and enough drama to keep a daytime soap opera going for a season or two.

SUNY math professor makes the case for free and open educational resources

Friday 23rd of February 2018 11:50:58 PM
The open educational resources (OER) movement has been gaining momentum over the past few years, as educators—from kindergarten classes to graduate schools—turn to free and open source educational content to counter the high cost of textbooks.

Useful FFMPEG Commands for Managing Audio and Video Files

Friday 23rd of February 2018 10:19:28 PM
FFMPEG is a powerful command-line tool for manipulating your media files. Here are some of the FFMPEG commands you should know for managing your audio and video files.

Show-stopping bug appears in npm Node.js package manager

Friday 23rd of February 2018 08:47:59 PM
A new release of the JavaScript and Node.js package manager, npm, fatally changes file permissions. While that[he]#039[/he]s been fixed, the entire messy process revealed more fundamental problems. Are you a developer who uses npm as the package manager for your JavaScript or Node.js code? If so, do not -- I repeat do not -- upgrade to npm 5.7.0. Nothing good can come of it.

Get started with IoT: How to build a DIY Blynk Board

Friday 23rd of February 2018 07:16:30 PM
This tutorial is for those with some DIY hardware experience, though advanced beginners may find it a fun challenge. Also, experienced users might find it fun to set this up for beginners to learn from.

Set Up A Python Django Development Environment on Debian 9 Stretch Linux

Friday 23rd of February 2018 06:07:53 PM
Django is the top Python web development framework and for good reason. It's powerful, flexible, and doesn't get in the way of developers. It also scales incredibly well, powering sites like Instagram.

Unlucky Linux boxes trampled by NPM code update, patch zapped

Friday 23rd of February 2018 04:59:16 PM
Devs stumble into pre-release beta by using command they didn't understandNPM – the biz behind the Node.js package management software used to wrangle JavaScript code and various related frameworks – on Thursday undid a code update less than 24 hours after it was issued because the software was messing with Linux file permissions.…

Tackling the most important issue in a DevOps transformation

Friday 23rd of February 2018 03:50:38 PM
You've been appointed the DevOps champion in your organisation: congratulations. So, what's the most important issue that you need to address?It's the technology—tools and the toolchain—right? Everybody knows that unless you get the right tools for the job, you're never going to make things work.

Iridium Browser: A Browser for the Privacy Conscious

Friday 23rd of February 2018 02:42:01 PM
Iridium is a web browser based on Chromium project. It has been customized to not share your data and thus keeping your privacy intact.

How to Install NEOS CMS on CentOS 7

Friday 23rd of February 2018 01:33:24 PM
Neos is a free and open source content management system written in PHP and uses its own framework flow. Neos CMS provides a customizable, extensible and easy to use web interface to edit web content easily.

4 cool new projects to try in COPR for February

Friday 23rd of February 2018 12:24:47 PM
COPR is a collection of personal repositories for software that isn’t carried in Fedora. Some software doesn’t conform to standards that allow easy packaging. Or it may not meet other Fedora standards, despite being free and open source. COPR can offer these projects outside the Fedora set of packages. Software in COPR isn’t supported by Fedora infrastructure or signed by the project. However, it can be a neat way to try new or experimental software.

Linux Means Business – Best Free Business Apps

Friday 23rd of February 2018 11:16:10 AM
The best business applications help an organization to improve how they run their operations, minimize costs, and improve workplace productivity. Sometimes business applications are thought to relate to office software suites which offer word processing, spreadsheet, database, presentation, and email applications. While office suites are very common, business applications extend far further afield.

You Can Now Turn Your Old Moto G2 "Titan" Phone Into an Ubuntu Phone, Here's How

Friday 23rd of February 2018 10:00:51 AM
If you still have a Moto G Gen 2 (a.k.a Moto G 2014) around, it looks like you can install the Ubuntu Touch mobile OS from UBports on it, thanks to an effort by an XDA community member.

More in Tux Machines

today's howtos

Today in Techrights

Security Leftovers

  • One-stop counterfeit certificate shops for all your malware-signing needs

    The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.

  • How did OurMine hackers use DNS poisoning to attack WikiLeaks? [Ed: False. They did not attack Wikileaks; they attacked the DNS servers/framework. The corporate media misreported this at the time.
    The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from expert Nick Lewis.
  • Intel didn't give government advance notice on chip flaws

    Google researchers informed Intel of flaws in its chips in June. The company explained in its own letter to lawmakers that it left up to Intel informing the government of the flaws.

    Intel said that it did not notify the government at the time because it had “no indication of any exploitation by malicious actors,” and wanted to keep knowledge of the breach limited while it and other companies worked to patch the issue.

    The company let some Chinese technology companies know about the vulnerabilities, which government officials fear may mean the information was passed along to the Chinese government, according to The Wall Street Journal.

  • Intel hid CPU bugs info from govt 'until public disclosure'

    As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws and before they became public.

  • Intel did not tell U.S. cyber officials about chip flaws until made public [iophk: "yeah right"]

    Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers [sic] had not exploited the vulnerabilities.

  • LA Times serving cryptocurrency mining script [iophk: "JS"]

    The S3 bucket used by the LA Times is apparently world-writable and an ethical hacker [sic] appears to have left a warning in the repository, warning of possible misuse and asking the owner to secure the bucket.

  • Facebook's Mandatory Malware Scan Is an Intrusive Mess

    When an Oregon science fiction writer named Charity tried to log onto Facebook on February 11, she found herself completely locked out of her account. A message appeared saying she needed to download Facebook’s malware scanner if she wanted to get back in. Charity couldn’t use Facebook until she completed the scan, but the file the company provided was for a Windows device—Charity uses a Mac.

  • Tinder plugs flaw that enabled account takeover using just a phone number

    As Tinder uses Facebook profile pics for its users to lure in a mate or several, the 'dating' app is somewhat tied to the social network. When a swipe-hungry Tinder user comes to login to their account they can either do so via Facebook or use their mobile number.

  • `

Android Leftovers