Language Selection

English French German Italian Portuguese Spanish

Linux.com

Syndicate content
Updated: 27 min 4 sec ago

Finding Interesting Documents with grep

0 sec ago
Title: Finding Interesting Documents with grep19 JulLearn more

Viewing Linux Logs from the Command Line

Wednesday 18th of July 2018 12:31:02 PM
Title: Viewing Linux Logs from the Command Line18 JulLearn more

Tips for Success with Open Source Certification

Tuesday 17th of July 2018 02:16:24 PM
Title: Tips for Success with Open Source Certification17 JulLearn more

Xen Project Hypervisor Power Management: Suspend-to-RAM on Arm Architectures

Tuesday 17th of July 2018 01:36:39 PM
Title: Xen Project Hypervisor Power Management: Suspend-to-RAM on Arm Architectures17 JulLearn more

Users, Groups and Other Linux Beasts: Part 2

Monday 16th of July 2018 02:08:07 PM
Title: Users, Groups and Other Linux Beasts: Part 216 JulLearn more

Clear Linux Makes a Strong Case for Your Next Cloud Platform

Friday 13th of July 2018 02:04:34 PM
Title: Clear Linux Makes a Strong Case for Your Next Cloud Platform13 JulLearn more

5 Reasons Open Source Certification Matters More Than Ever

Thursday 12th of July 2018 02:01:22 PM
Title: 5 Reasons Open Source Certification Matters More Than Ever 12 JulLearn more

SBC Clusters — Beyond Raspberry Pi

Thursday 12th of July 2018 12:39:30 PM
Title: SBC Clusters — Beyond Raspberry Pi 12 JulLearn more

Certification Plays Big Role in Open Source Hiring

Wednesday 11th of July 2018 02:00:29 PM
Title: Certification Plays Big Role in Open Source Hiring11 JulLearn more

Users, Groups, and Other Linux Beasts

Tuesday 10th of July 2018 02:32:20 PM
Title: Users, Groups, and Other Linux Beasts10 JulLearn more

Xen Project Hypervisor: Virtualization and Power Management are Coalescing into an Energy-Aware Hypervisor

Tuesday 10th of July 2018 02:07:10 PM
Title: Xen Project Hypervisor: Virtualization and Power Management are Coalescing into an Energy-Aware Hypervisor 10 JulLearn more

Open Collaboration in Practice at Open Source Summit

Monday 9th of July 2018 02:00:35 PM
Title: Open Collaboration in Practice at Open Source Summit9 JulLearn more

Robolinux Lets You Easily Run Linux and Windows Without Dual Booting

Friday 6th of July 2018 02:03:30 PM
Title: Robolinux Lets You Easily Run Linux and Windows Without Dual Booting6 JulLearn more

New Training Options Address Demand for Blockchain Skills

Thursday 5th of July 2018 02:00:55 PM
Title: New Training Options Address Demand for Blockchain Skills5 JulLearn more

AGL Outlines Virtualization Scheme for the Software Defined Vehicle

Tuesday 3rd of July 2018 03:34:50 PM
Title: AGL Outlines Virtualization Scheme for the Software Defined Vehicle 3 JulLearn more

Decreasing Vulnerabilities Seen in Red Hat Linux

Tuesday 3rd of July 2018 01:35:17 PM
Title: Decreasing Vulnerabilities Seen in Red Hat Linux 3 JulLearn more

4MLinux: More Than Just Another Lightweight Distro

Friday 29th of June 2018 02:00:11 PM
Title: 4MLinux: More Than Just Another Lightweight Distro29 JunLearn more

Raspberry Pi 3 B+ Tops Hacker Board Survey

Friday 29th of June 2018 01:48:44 PM
Title: Raspberry Pi 3 B+ Tops Hacker Board Survey29 JunLearn more

CIP: Keeping the Lights On with Linux

Wednesday 27th of June 2018 02:02:16 PM
Title: CIP: Keeping the Lights On with Linux27 JunLearn more

How to Check Disk Space on Linux from the Command Line

Friday 22nd of June 2018 02:07:41 PM
Title: How to Check Disk Space on Linux from the Command Line22 JunLearn more

More in Tux Machines

OSS Leftovers

  • Four top open source SIEM tools you should know
    With open source SIEM tools, organizations can test out certain capabilities and reduce cost barriers before expanding their product investments. Depending on what functions you're interested in, there is a variety of software to choose from. [...] Another choice for open source SIEM tools is Apache Metron. ELK Stack is a general purpose log and data parsing tool; Apache Metron focuses squarely on security. Apache Metron provides four main capabilities. First, it offers long-term, cost-effective storage of telemetry data through its security data lake feature. Second, it features an extensible framework that collects data from a variety of sources and supports any future endpoints. Third, Metron performs normal SIEM tasks, such as data ingest and threat alerts. The fourth capability is threat intelligence driven by machine learning-based anomaly detection.
  • Open Your Own Front Page Using Firefox New Tab
    Did you know Firefox has a unique page full of great links and ideas curated just for you? In one simple click, we’ve made it faster and easier for you to find things that are important to you whenever you open a new tab in Firefox.
  • pfSense Gold Free with 2.4.4-RELEASE
    Starting with the upcoming release of pfSense® 2.4.4, all of the services previously offered under “pfSense Gold” will continue, but will be free to all pfSense users. Read on for more detail.
  • Google Fined by EU for Antitrust Violations, Qt Creator 4.7.0 Now Available, New ownCloud Version 10.0.9, pfSense Gold to Be Free with the 2.4.4 Release, Kobol Relaunches Helios4
    Netgate announces that pfSense Gold will be free with the 2.4.4 release, including all services previously offered under the pfSense Gold subscription, such as the pfSense Book and monthly online Hangouts (video conferences). In addition, AutoConfigBackup (ACB) also will be free and will conform to GDPR best practices. The 2.4.4 release is planned for September 2018.
  • Emacs & TLS
    A recent query about the status of network security (TLS settings in particular) in Emacs led to a long thread in the emacs-devel mailing list. That thread touched on a number of different areas, including using OpenSSL (or other TLS libraries) rather than GnuTLS, what kinds of problems should lead to complaints out of the box, what settings should be the default, and when those settings could change for Emacs so as not to discombobulate users. The latter issue is one that lots of projects struggle with: what kinds of changes are appropriate for a bug-fix release versus a feature release. For Emacs, its lengthy development cycle, coupled with the perceived urgency of security changes, makes that question even more difficult.
  • nanotime 0.2.2
    A new maintenance release of the nanotime package for working with nanosecond timestamps just arrived on CRAN.

Openwashing Latest

Security: Spectre V1, Gentoo, Google’s Servers and Denuvo DRM

  • Spectre V1 defense in GCC
  • Signing and distributing Gentoo
    The compromise of the Gentoo's GitHub mirror was certainly embarrassing, but its overall impact on Gentoo users was likely fairly limited. Gentoo and GitHub responded quickly and forcefully to the breach, which greatly limited the damage that could be done; the fact that it was a mirror and not the master copy of Gentoo's repositories made it relatively straightforward to recover from. But the black eye that it gave the project has led some to consider ways to make it even harder for an attacker to add malicious content to Gentoo—even if the distribution's own infrastructure were to be compromised. Unlike other distributions, Gentoo is focused on each user building the software packages they want using the Portage software-management tool. This is done by using the emerge tool, which is the usual interface to Portage. Software "packages" are stored as ebuilds, which are sets of files that contain the information and code needed by Portage to build the software. The GitHub compromise altered the ebuilds for three packages to add malicious content so that users who pulled from those repositories would get it. Ebuilds are stored in the /usr/portage directory on each system. That local repository is updated using emerge --sync (which uses rsync under the hood), either from Gentoo's infrastructure or one of its mirrors. Alternatively, users can use emerge-webrsync to get snapshots of the Gentoo repository, which are updated daily. Snapshots are individually signed by the Gentoo infrastructure OpenPGP keys, while the /usr/portage tree is signed by way of Manifest files that list the hash of each file in a directory. The top-level Manifest is signed by the infrastructure team, so following and verifying the chain of hashes down to a particular file (while also making sure there are no unlisted files) ensures that the right files are present in the tree.
  • Here’s How Hackers Are Using Google’s Servers To Host Malware For Free
  • Pirates Punish Denuvo-Protected Games With Poor Ratings

    Denuvo's anti-piracy technology is a thorn in the side of game pirates. While it has been defeated on several occasions recently, the strict anti-piracy measures have not been without consequence. According to new research, Denuvo has frustrated pirates to a point where they sabotage reviews on Metacritic, leading to significantly lower ratings for protected games.

Games: EXAPUNKS, Minecraft, The Station, Chicken Assassin: Reloaded, Stack Gun Heroes