Language Selection

English French German Italian Portuguese Spanish


Syndicate content
The Linux Portal Site
Updated: 14 min 48 sec ago

Excellent Free Tutorials to Learn Vala

11 hours 14 min ago

Vala is an object-oriented programming language with a self-hosting compiler that generates C code and uses the GObject system. Here's our recommended free tutorials to learn Vala.

The post Excellent Free Tutorials to Learn Vala appeared first on LinuxLinks.

Stretchly – reminder to take breaks

Monday 3rd of August 2020 12:52:00 PM

Stretchly is a cross-platform Electron program that reminds you to take breaks when working on your computer. Stretchly is free and open source software.

The post Stretchly – reminder to take breaks appeared first on LinuxLinks.

23 Best Free Linux Window Managers

Saturday 1st of August 2020 01:44:17 PM

A window manager manages the windows that applications bring up. We recommend the best c.ompositing, stacking, tiling, and dynamic window managers.

The post 23 Best Free Linux Window Managers appeared first on LinuxLinks.

Linux Candy: Buoh – online strips comics reader

Friday 31st of July 2020 04:28:49 AM

Buoh is a reader for online strips comics. It's free and open source software.

The post Linux Candy: Buoh – online strips comics reader appeared first on LinuxLinks.

7 Best Free Compositing Window Managers

Thursday 30th of July 2020 09:34:09 AM

A compositing window manager, or compositor, is a window manager that provides applications with an off-screen buffer for each window. The window manager composites the window buffers into an image representing the screen and writes the result into the display memory.

The post 7 Best Free Compositing Window Managers appeared first on LinuxLinks.

AWOW AK41 Mini Desktop PC – Multiple Operating Systems – Week 4

Wednesday 29th of July 2020 12:48:07 PM

In this week's blog, I look at some of the ways you can run programs from different operating systems on the AWOW AK41. I examine hardware virtualization, dual booting, as well as using a compatibility layer.

The post AWOW AK41 Mini Desktop PC – Multiple Operating Systems – Week 4 appeared first on LinuxLinks.

3 Free Books to Learn Vala

Tuesday 28th of July 2020 07:57:24 AM

Vala is an object-oriented programming language with a self-hosting compiler that generates C code and uses the GObject system. Here's our recommended books to learn Vala.

The post 3 Free Books to Learn Vala appeared first on LinuxLinks.

Excellent System Utilities: Glances – CLI curses-based monitoring tool

Monday 27th of July 2020 11:54:22 AM

Glances is a system administration tool that replaces a whole host of command-line utilities. Here's our review of Glances.

The post Excellent System Utilities: Glances – CLI curses-based monitoring tool appeared first on LinuxLinks.

Linux Candy: Boxes – command line ASCII boxes

Friday 24th of July 2020 01:18:33 PM

Boxes is a text filter which can draw ASCII art boxes around its input text. It can spice up news posting, emails, documenting files, and much more.

The post Linux Candy: Boxes – command line ASCII boxes appeared first on LinuxLinks.

6 Best Free Dynamic Window Managers

Thursday 23rd of July 2020 07:56:11 AM

A dynamic window manager is a tiling window manager where windows are tiled based on preset layouts between which the user can switch. Here's our recommended free dynamic window managers.

The post 6 Best Free Dynamic Window Managers appeared first on LinuxLinks.

AWOW AK41 Mini Desktop PC – Video and Audio – Week 3

Wednesday 22nd of July 2020 06:57:14 AM

A weekly blog about the AWOW AK41 Mini Desktop PC. This week examines multimedia on this tiny PC including video, audio, and more.

The post AWOW AK41 Mini Desktop PC – Video and Audio – Week 3 appeared first on LinuxLinks.

Excellent Free Tutorials to Learn XML

Tuesday 21st of July 2020 11:11:56 AM

XML is a set of rules for defining semantic tags that describe the structure and meaning of a document. Here's our recommended free tutorials to learn XML

The post Excellent Free Tutorials to Learn XML appeared first on LinuxLinks.

ExifCleaner – image metadata tool

Monday 20th of July 2020 08:46:26 AM

ExifCleaner lets you remove privacy-invading information from your photos. It's a cross-platform tool that runs on Linux, Mac OS X, and Windows.

The post ExifCleaner – image metadata tool appeared first on LinuxLinks.

tint2 – simple and light open source taskbar

Friday 17th of July 2020 06:13:29 AM

tint2 is a simple panel/taskbar made for window managers. It was specifically made for Openbox, a popular stacking window manager.

The post tint2 – simple and light open source taskbar appeared first on LinuxLinks.

10 Best Free Tiling Window Managers

Thursday 16th of July 2020 07:34:47 AM

There are a few different types of window managers. This article recommends the best tiling window managers. They automate the common task of arranging windows.

The post 10 Best Free Tiling Window Managers appeared first on LinuxLinks.

AWOW AK41 Mini Desktop PC – Running Linux – Benchmarks – Week 2

Wednesday 15th of July 2020 08:49:05 AM

This article benchmarks the AWOW AK41 Mini PC with three other systems to put the results into context. All the tests use the Phoronix Test Suite unless stated. This is the second article in a series focusing on the AWOW AK41 Mini Desktop PC.

The post AWOW AK41 Mini Desktop PC – Running Linux – Benchmarks – Week 2 appeared first on LinuxLinks.

10 Excellent Free Books to Learn XML

Tuesday 14th of July 2020 02:53:24 PM

XML is a set of rules for defining semantic tags that describe the structure and meaning of a document. Here's our recommended free XML books.

The post 10 Excellent Free Books to Learn XML appeared first on LinuxLinks.

Introduction to Python for Data Science

Monday 13th of July 2020 07:42:00 AM

This is a short introductory training session on the use of Python in data science using Jupyter, pandas library and plotnine package. We focus on a common task in data science: import a data set, manipulate its structure, and then visualise the data. We shall use Python and a Jupyter Notebook to accomplish this task.

The post Introduction to Python for Data Science appeared first on LinuxLinks.

20 Best Free Stacking Window Managers

Thursday 9th of July 2020 09:12:04 AM

Stacking window managers (also known as floating window managers) that draws all windows in a specific order, allowing them to overlap.

The post 20 Best Free Stacking Window Managers appeared first on LinuxLinks.

AWOW AK41 Mini Desktop PC – Running Linux – Week 1

Wednesday 8th of July 2020 09:53:49 AM

In the first of a weekly series, Luke puts the AWOW AK41 Mini Desktop PC under the microscope. This tiny PC sports a Celeron J4115 processor, 8GB DDR4 RAM, triple display 4K@60Hz and NVMe SSD. The AWOW Mini PC has its Windows installation wiped and replaced with Linux.

The post AWOW AK41 Mini Desktop PC – Running Linux – Week 1 appeared first on LinuxLinks.

More in Tux Machines

Hardware Freedom: 3D Printing, RasPi and RPi CM3 Module

  • Can 3D Printing Really Solve PPE Shortage in COVID-19 Crisis? The Myth, and The Facts!

    Amid COVID-19 crisis, we see severe shortage of Personal Protective Equipment (PPE) worldwide, to the point that a strict organization like FDA is making exceptions for PPE usage, and there are volunteer effors to try to alleviate this shortage like GetUsPPE. Also, Centers for Disease Control and Prevention (CDC) provides an Excel spreadsheet file to help calculate the PPE Burn Rate. There are many blog posts, video tutorials, and guides that teach people how to print their face shields and masks.

  • Raspberry Pi won’t let your watched pot boil
  • Growing fresh veggies with Rpi and Mender

    Some time ago my wife and I decided to teach our kids how to grow plants. We both have experience as we were raised in small towns where it was common to own a piece of land where you could plant home-grown fresh veggies. The upbringing of our kids is very different compared to ours, and we realized we never showed our kids how to grow our own veggies. We wanted them to learn and to understand that “the vegetables do not grow on the shop-shelf”, and that there is work (and fun) involved to grow those. The fact that we are gone for most of the summer and to start our own garden just to see it die when we returned seemed to be pointless. This was a challenge. Luckily, me being a hands-on engineer I promised my wife to take care of it. There were two options: we could buy something that will water our plants when we are gone, or I could do it myself (with a little help from our kids). Obviously I chose the more fun solution…

  • Comfile Launches 15-inch Industrial Raspberry Pi Touch Panel PC Powered by RPi CM3 Module

    Three years ago, we noted Comfile has made 7-inch and 10.2-inch touch panel PC’s powered by Raspberry Pi 3 Compute Module. The company has recently introduced a new model with a very similar design except for a larger 15-inch touchscreen display with 1024×768 resolution. ComfilePi CPi-A150WR 15-inch industrial Raspberry Pi touch panel PC still features the CM3 module, and the same ports including Ethernet, USB ports, RS232, RS485, and I2C interfaces accessible via terminal blocks, and a 40-pin I/O header.

Programming: Vala, Perl and Python

  • Excellent Free Tutorials to Learn Vala

    Vala is an object-oriented programming language with a self-hosting compiler that generates C code and uses the GObject system. Vala combines the high-level build-time performance of scripting languages with the run-time performance of low-level programming languages. Vala is syntactically similar to C# and includes notable features such as anonymous functions, signals, properties, generics, assisted memory management, exception handling, type inference, and foreach statements. Its developers, Jürg Billeter and Raffaele Sandrini, wanted to bring these features to the plain C runtime with little overhead and no special runtime support by targeting the GObject object system. Rather than compiling directly to machine code or assembly language, it compiles to a lower-level intermediate language. It source-to-source compiles to C, which is then compiled with a C compiler for a given platform, such as GCC. Did you always want to write GTK+ or GNOME programs, but hate C with a passion? Learn Vala with these free tutorials! Vala is published under the GNU Lesser General Public License v2.1+.

  • Supporting Perl-related creators via Patreon

    Yesterday I posted about this in the Perl Weekly newsletter and both Mohammad and myself got 10 new supporters. This is awesome. There are not many ways to express the fact that you really value the work of someone. You can send them postcards or thank-you notes, but when was the last time you remembered to do that? Right, I also keep forgetting to thank the people who create all the free and awesome stuff I use. Giving money as a way to express your thanks is frowned upon by many people, but trust me, the people who open an account on Patreon to make it easy to donate them money will appreciate it. In any case it is way better than not saying anything.

  • 2020.31 TwentyTwenty

    JJ Merelo kicked off the special 20-day Advent Blog cycle in honour of the publication of the first RFC that would lay the foundation for the Raku Programming Language as we now know it. After that, 3 blog posts got already published:

  • Supporting The Full Lifecycle Of Machine Learning Projects With Metaflow

    Netflix uses machine learning to power every aspect of their business. To do this effectively they have had to build extensive expertise and tooling to support their engineers. In this episode Savin Goyal discusses the work that he and his team are doing on the open source machine learning operations platform Metaflow. He shares the inspiration for building an opinionated framework for the full lifecycle of machine learning projects, how it is implemented, and how they have designed it to be extensible to allow for easy adoption by users inside and outside of Netflix. This was a great conversation about the challenges of building machine learning projects and the work being done to make it more achievable.

  • Django 3.1 Released

    The Django team is happy to announce the release of Django 3.1.

  • Awesome Python Applications: buku

    buku: Browser-independent bookmark manager with CLI and web server frontends, with integrations for browsers, cloud-based bookmark managers, and emacs.

  • PSF GSoC students blogs: Week 9 Check-in

DRM and Proprietary Software Leftovers

  • Some Photoshop users can try Adobe’s anti-misinformation system later this year

    Adobe pitched the CAI last year as a general anti-misinformation and pro-attribution tool, but many details remained in flux. A newly released white paper makes its scope clearer. The CAI is primarily a more persistent, verifiable type of image metadata. It’s similar to the standard EXIF tags that show the location or date of a photograph, but with cryptographic signatures that let you verify the tags haven’t been changed or falsely applied to a manipulated photo.

    People can still download and edit the image, take a screenshot of it, or interact the way they would any picture. Any CAI metadata tags will show that the image was manipulated, however. Adobe is basically encouraging adding valuable context and viewing any untagged photos with suspicion, rather than trying to literally stop plagiarism or fakery. “There will always be bad actors,” says Adobe community products VP Will Allen. “What we want to do is provide consumers a way to go a layer deeper — to actually see what happened to that asset, who it came from, where it came from, and what happened to it.”

    The white paper makes clear that Adobe will need lots of hardware and software support for the system to work effectively. CAI-enabled cameras (including both basic smartphones and high-end professional cameras) would need to securely add tags for dates, locations, and other details. Photo editing tools would record how an image has been altered — showing that a journalist adjusted the light balance but didn’t erase or add any details. And social networks or other sites would need to display the information and explain why users should care about it.

  • EFF and ACLU Tell Federal Court that Forensic Software Source Code Must Be Disclosed

    Can secret software be used to generate key evidence against a criminal defendant? In an amicus filed ten days ago with the United States District Court of the Western District of Pennsylvania, EFF and the ACLU of Pennsylvania explain that secret forensic technology is inconsistent with criminal defendants’ constitutional rights and the public’s right to oversee the criminal trial process. Our amicus in the case of United States v. Ellis also explains why source code, and other aspects of forensic software programs used in a criminal prosecution, must be disclosed in order to ensure that innocent people do not end up behind bars, or worse—on death row.


    The Constitution guarantees anyone accused of a crime due process and a fair trial. Embedded in those foundational ideals is the Sixth Amendment right to confront the evidence used against you. As the Supreme Court has recognized, the Confrontation Clause’s central purpose was to ensure that evidence of a crime was reliable by subjecting it to rigorous testing and challenges. This means that defendants must be given enough information to allow them to examine and challenge the accuracy of evidence relied on by the government.

  • Powershell Bot with Multiple C2 Protocols

    I spotted another interesting Powershell script. It's a bot and is delivered through a VBA macro that spawns an instance of msbuild.exe This Windows tool is often used to compile/execute malicious on the fly (I already wrote a diary about this technique[1]). I don’t have the original document but based on a technique used in the macro, it is part of a Word document. It calls Document_ContentControlOnEnter[2]: [...]

  • FBI Used Information From An Online Forum Hacking To Track Down One Of The Hackers Behind The Massive Twitter Attack

    As Mike reported last week, the DOJ rounded up three alleged participants in the massive Twitter hack that saw dozens of verified accounts start tweeting out promises to double the bitcoin holdings of anyone who sent bitcoin to a certain account.

  • Twitter Expects to Pay 9-Figure Fine for Violating FTC Agreement

    That means that the complaint is not related to last month’s high-profile [cr]ack of prominent accounts on the service. That security incident saw accounts from the likes of Joe Biden and Elon Musk ask followers to send them bitcoin. A suspect was arrested in the incident last month.

  • Twitter Expects to Pay Up to $250 Million in FTC Fine Over Alleged Privacy Violations

    Twitter disclosed that it anticipates being forced to pay an FTC fine of $150 million to $250 million related to alleged violations over the social network’s use of private data for advertising.


    The company revealed the expected scope of the fine in a 10-Q filing with the SEC. Twitter said that on July 28 it received a draft complaint from the Federal Trade Commission alleging the company violated a 2011 consent order, which required Twitter to establish an information-security program designed to “protect non-public consumer information.”


    “The allegations relate to the Company’s use of phone number and/or email address data provided for safety and security purposes for targeted advertising during periods between 2013 and 2019,” Twitter said in the filing.

  • Apple removes more than 26,000 games from China app store

    Apple pulled 29,800 apps from its China app store on Saturday, including more than 26,000 games, according to Qimai Research Institute.


    The removals are in response to Beijing's crackdown on unlicensed games, which started in June and intensified in July, Bloomberg reported. This brings an end to the unofficial practice of letting games be published while awaiting approval from Chinese censors.

  • Intuit Agrees to Buy Singapore Inventory Software Maker

    Intuit will pay more than $80 million for TradeGecko, according to people familiar with the matter, marking one of the biggest exits in Singapore since the Covid-19 pandemic. TradeGecko has raised more than $20 million to date from investors including Wavemaker Partners, Openspace Ventures and Jungle Ventures.

  • Justice Department Is Scrutinizing Takeover of Credit Karma by Intuit, Maker of TurboTax

    The probe comes after ProPublica first reported in February that antitrust experts viewed the deal as concerning because it could allow a dominant firm to eliminate a competitor with an innovative business model. Intuit already dominates online tax preparation, with a 67% market share last year. The article sparked letters from Sen. Ron Wyden, D-Ore., and Rep. David Cicilline, D-R.I., urging the DOJ to investigate further. Cicilline is chair of the House Judiciary Committee’s antitrust subcommittee.

Security Leftovers

  • DNS configuration recommendations for IPFire users

    If you are familiar with IPFire, you might have noticed DNSSEC validation is mandatory, since it defeats entire classes of attacks. We receive questions like "where is the switch to turn off DNSSEC" on a regular basis, and to say it once and for all: There is none, and there will never be one. If you are running IPFire, you will be validating DNSSEC. Period. Another question frequently asked is why IPFire does not support filtering DNS replies for certain FQDNs, commonly referred to as a Response Policy Zone (RPZ). This is because an RPZ does what DNSSEC attempts to secure users against: Tamper with DNS responses. From the perspective of a DNSSEC-validating system, a RPZ will just look like an attacker (if the queried FQDN is DNSSEC-signed, which is what we strive for as much of them as possible), thus creating a considerable amount of background noise. Obviously, this makes detecting ongoing attacks very hard, most times even impossible - the haystack to search just becomes too big. Further, it does not cover direct connections to hardcoded IP addresses, which is what some devices and attackers usually do, as it does not rely on DNS to be operational and does not leave any traces. Using an RPZ will not make your network more secure, it just attempts to cover up the fact that certain devices within it cannot be trusted. Back to DNSSEC: In case the queried FQDNs are signed, forged DNS replies are detected since they do not match the RRSIG records retrieved for that domain. Instead of being transparently redirected to a fradulent web server, the client will only display a error message to its user, indicating a DNS lookup failure. Large-scale attacks by returning forged DNS replies are frequently observed in the wild (the DNSChanger trojan is a well-known example), which is why you want to benefit from validating DNSSEC and more and more domains being signed with it.

  • Security updates for Tuesday

    Security updates have been issued by Debian (libx11, webkit2gtk, and zabbix), Fedora (webkit2gtk3), openSUSE (claws-mail, ghostscript, and targetcli-fb), Red Hat (dbus, kpatch-patch, postgresql-jdbc, and python-pillow), Scientific Linux (libvncserver and postgresql-jdbc), SUSE (kernel and python-rtslib-fb), and Ubuntu (ghostscript, sqlite3, squid3, and webkit2gtk). 

  • Official 1Password Linux App is Available for Testing

    An official 1Password Linux app is on the way, and brave testers are invited to try an early development preview. 1Password is a user-friendly (and rather popular) cross-platform password manager. It provides mobile apps and browser extensions for Windows, macOS, Android, iOS, Google Chrome, Edge, Firefox — and now a dedicated desktop app for Linux, too.

  • FBI Warns of Increased DDoS Attacks

    The Federal Bureau of Investigation warned in a “private industry notification” last week that attackers are increasingly using amplification techniques in distributed denial-of-service attacks. There has been an uptick in attack attempts since February, the agency’s Cyber Division said in the alert. An amplification attack occurs when attackers send a small number of requests to a server and the server responds with numerous responses. The attackers spoof the IP address to make it look like the requests are coming from a specific victim, and the resulting responses overwhelms the victim’s network. “Cyber actors have exploited built-in network protocols, designed to reduce computation overhead of day-to-day system and operational functions to conduct larger and more destructive distributed denial-of-service amplification attacks against US networks,” the FBI alert said. Copies of the alert were posted online by several recipients, including threat intelligence company Bad Packets.

  • NSA issues BootHole mitigation guidance

    Following the disclosure of a widespread buffer-flow vulnerability that could affect potentially billions of Linux and Windows-based devices, the National Security Agency issued a follow-up cybersecurity advisory highlighting the bug and offering steps for mitigation. The vulnerability -- dubbed BootHole -- impacts devices and operating systems that use signed versions of the open-source GRUB2 bootloader software found in most Linux systems. It also affects any system or device using Secure Boot -- a root firmware interface responsible for validating the booting process -- with Microsoft's standard third party certificate authority. The vulnerability enables attackers to bypass Secure Boot to allow arbitrary code execution and “could be used to install persistent and stealthy bootkits,” NSA said in a press statement.