Language Selection

English French German Italian Portuguese Spanish

FOSS Force

Syndicate content
FOSS Force News Wire
Updated: 2 hours 32 min ago

Linux Troubleshooting – netstat command not found in CentOS 7/8 And RHEL 7/8

Monday 10th of February 2020 07:44:32 PM
netstat command not found in CentOS 7, 8 and RHEL 7, 8. Here is how to get the netstat command working in CentOS 7/8 and RHEL 7/8 systems.

Install Apache, MariaDB, PHP (LAMP Stack) In CentOS 8

Monday 10th of February 2020 07:44:32 PM
This step by step guide explains how to install Apache, MariaDB, PHP (LAMP Stack) in CentOS 8 minimal server.

Microsoft Excel gets powerful XLOOKUP function

Monday 10th of February 2020 07:24:42 PM
When people ask me what my favorite software of all time is, my answer is always Microsoft Excel. True, I am a proponent of both Linux and LibreOffice, but the fact is, nothing compares to Microsoft Office. If I have to do some serious data analysis and need to work with spreadsheets, I want real Excel. Can I get by with LibreOffice Calc? I mean, yes, but I'd rather not. When looking to tell stories with data, I often turn to the VLOOKUP function -- one of the most important and powerful tools found in Microsoft Excel. Believe it or… [Continue Reading]

Contribute at the Fedora Test Week for Kernel 5.5

Monday 10th of February 2020 07:14:34 PM
The kernel team is working on final integration for kernel 5.5. This version was just recently released, and will arrive soon in Fedora. This version has many security fixes included. As a result, the Fedora kernel and QA teams have organized a test week from Monday, February 10, 2020 through Monday, February 17, 2020. Refer […]

6 open educational resources for learning Spanish

Monday 10th of February 2020 07:14:34 PM
My goal for 2020 is to improve my Spanish, and I intend to use the open educational resources described below to help me along my long path towards fluency. These suggestions are by no means an exhaustive list of resources for learning Spanish. The items included are all open resources, which means they are either shared under an open license or are in the public domain.

Bash Sequence Expression (Range)

Monday 10th of February 2020 07:14:34 PM
The Bash sequence expression generates a range of integers or characters by defining a start and the end point of the range.

Distribution Release: SparkyLinux 2020.02

Monday 10th of February 2020 07:05:59 PM
The SparkyLinux team has published a new snapshot of the distribution's rolling release platform. The new media is based on Debian's Testing branch and features several key package updates. "Sparky 2020.02 'Po Tolo' of the (semi-)rolling line is out. It is based on the testing branch of Debian....

Ruby Team: Ruby Team Sprint 2020 in Paris - Day Five - We’ve brok^done it

Monday 10th of February 2020 07:03:01 PM
On our last day we met as every day, working on our packages, fixing and uploading them. The transitions went on. Antonio, Utkarsh, Lucas, David and Cédric took some time to examine the gem2deb bug reports. We uploaded the last missing Kali Ruby package. And we had our last discussion, covering the future of the team and an evaluation of the sprint: Last discussion round of the Ruby Team Sprint 2020 in Paris As a result: We will examine ways to find leaf packages. We plan to organize another sprint next year right before the release freeze, probably again about FOSDEM time. We tend to have it in Berlin but will explore the locations available and the costs. We will have monthly IRC meetings. We think the sprint was a success. Some stuff got (intentionally and less intentionally) broken on the way. And also a lot of stuff got fixed. We made our step towards a successful Ruby 2.7 transition. So we want to thank the Debian project and our DPL Sam for sponsoring the event, Offensive Security for sponsoring the event too, Sorbonne Université and LPSM for hosting us, Cédric Boutillier for organizing the sprint and kindly hosting us, and really everyone who attended, making this a success: Antonio, Abhijith, Georg, Utkarsh, Balu, Praveen, Sruthi, Marc, Lucas, Cédric, Sebastien, Deivid, Daniel. In the evening we finally closed the venue which hosted us for 5 days, cleaned up, and went for a last beer together (at least for now). Some of use will stay in Paris a few days longer and finally get to see the city. Eiffel Tower Paris (February 2020) Goodbye Paris and save travels to everyone. It was a pleasure.

Vantage Deploys $2B War Chest to Expand into Europe’s Hyperscale Markets

Monday 10th of February 2020 06:54:00 PM
The Digital Colony-backed wholesale developer acquires Etix, plus four large sites in EU markets.

China's To Blame For The Equifax Hack. But It Shouldn't Let Equifax, Or US Regulators, Off The Hook.

Monday 10th of February 2020 06:45:58 PM
The Department of Justice this morning formally announced that it has identified the Chinese government as the culprit behind the historic Equifax hack. If you've forgotten, the 2017 hack involved hackers making off with the personal financial data of more than 147 million Americans. Those victims were then forced to stumble through an embarrassing FTC settlement that promised them all manner of financial compensation that mysteriously evaporated once they went to collect it. According to the FTC's press release and the indictment (pdf), the four Chinese government employees responsible for the hack were all members of the People’s Liberation Army's 54th Research Institute, an extension of the Chinese military. The four exploited a vulnerability in the Apache Struts Web Framework software used by Equifax’s online dispute portal to first gain access to Equifax's systems, then ran more than 9,000 queries before managing to offload both consumer financial data and "proprietary Equifax info" (mostly related to databases) to a Dutch server. In a statement, Equifax was happy to see the onus shifted entirely onto the backs of the Chinese: "Cybercrime is one of the greatest threats facing our nation today, and it is an ongoing battle that every company will continue to face as attackers grow more sophisticated. Combating this challenge from well-financed nation-state actors that operate outside the rule of law is increasingly difficult. Fighting this cyberwar will require the type of open cooperation and partnership between government, law enforcement and private business that we have experienced firsthand." That rhetoric was mirrored in the DOJ's announcement and Bill Barr's speech, which repeatedly framed the entire Equifax saga as largely a victory for U.S. national security: "The size and scope of this investigation — affecting nearly half of the U.S. population, demonstrates the importance of the FBI’s mission and our enduring partnerships with the Justice Department and the U.S. Attorney’s Office. This is not the end of our investigation; to all who seek to disrupt the safety, security and confidence of the global citizenry in this digitally connected world, this is a day of reckoning." Except there are a few things both Equifax and Bill Barr forget to mention. One, the vulnerability that allowed the hackers to gain access to this data was known about by Equifax months before the attack and the company did nothing about it. Two, that this data wouldn't be available to steal if companies like Equifax hadn't made an industry out of collecting this sort of data -- without consumer consent and with no way for consumers to opt out -- in the process creating such a delicious target. A target they then failed to adequately secure and protect. So yes, while it's certainly great we've identified the hackers (who'll never see the inside of a jail cell), this entire mess could have been avoided. A few lawmakers, like Senator Mark Warner, were quick to applaud the investigation while highlighting how it shouldn't distract from Equifax's failures: "The indictment does not detract from the myriad of vulnerabilities and process deficiencies that we saw in Equifax’s systems and response to the hack,” Senator Mark Warner said in a statement provided to Motherboard. “A company in the business of collecting and retaining massive amounts of Americans’ sensitive personal information must act with the utmost care – and face any consequences that arise from that failure." Another thing neither Equifax or Bill Barr likely want to highlight is that the penalty for Equifax -- and the FTC settlement for consumers -- was little more than a cruel joke. While the $575 million FTC settlement was bandied about for being a "record" deal, like most hack/breaches, the final penalty was a far cry from the money made from collecting and selling access to this data for decades. And the consumer "compensation" aspect of the deal involved both useless "free" credit reporting software and $125 cash payouts that mysteriously disappeared when victims went to collect them, adding insult to injury. A lack of any meaningful US privacy law for the internet era means there's repeatedly no real punishment for companies that fail to secure the vast troves of data they're now collecting on your every waking moment. Nor is there any real compensation for consumers who may not have wanted this data collected, stored, and sold to every nitwit with a nickel. There are so many points of failure here -- from corporations that treat privacy and security as an afterthought to captured regulators too feckless to do anything about it -- that focusing too extensively on national security risks us learning absolutely nothing from the experience. Permalink | Comments | Email This Story

How To Ping Specific Port Number

Monday 10th of February 2020 06:44:28 PM
Used by system administrators on a daily basis, the ping command, relying on the ICMP protocol, retrieves operational information about remote hosts.However, pinging hosts is not always sufficient : you may need to ping a specific port on your server. This specific port might be related to a database, or to an Apache web server or even to a proxy server on your network.

How to Undo and Redo in Vim / Vi

Monday 10th of February 2020 06:44:28 PM
Vim keeps track of all the changes you made in the current session. The undo command undoes one or more changes in the order in which they were made.

Daily Deal: The Data Analytics Expert Bundle

Monday 10th of February 2020 06:40:31 PM
The Data Analytics Expert Bundle will help you learn how analytics, data visualization, and data science methodologies can be used to drive better business decisions. You will gain an understanding of the complete data analytics lifecycle, from problem definition to solution deployment. You will learn how to build visualizations, organize data, and design dashboards with Tableau, how to use Python to help with Data Science analytics techniques, how to install, configure & maintain a MongoDB environment, and how to use Excel to help you devise insights from available data. It's on sale for $49. Note: The Techdirt Deals Store is powered and curated by StackCommerce. A portion of all sales from Techdirt Deals helps support Techdirt. The products featured do not reflect endorsements by our editorial team. Permalink | Comments | Email This Story

Ken Stark’s Reglue Has Moving Blues

Monday 10th of February 2020 06:36:26 PM
Reglue, which refurbishes used computers and installs Linux on them for use by school students who can't afford a computer, has to move to new digs. [...] Continue reading Ken Stark’s Reglue Has Moving Blues The post Ken Stark’s Reglue Has Moving Blues appeared first on FOSS Force.

OpenShot 2.5 Open-Source Video Editor Adds Hardware Acceleration

Monday 10th of February 2020 06:34:48 PM

OpenShot 2.5 is here two and a half years after the OpenShot 2.4 release, and almost a year after the OpenShot 2.4.4 point release. It’s a major update that introduces experimental hardware acceleration (encoding and decoding) support, which should greatly improve the performance of the video editor.

If you’re installing OpenShot 2.5 on a powerful computer with a capable graphics card, you should notice up to 40% performance increase. However, please keep in mind that hardware encoding and decoding is still under development, so it may not work as expected all the time.

read more

SparkyLinux 2020.02 Brings More Goodies from Debian GNU/Linux 11 “Bullseye”

Monday 10th of February 2020 06:32:33 PM

Using the Linux 5.4.13 kernel by default, SparkyLinux 2020.02 comes with up-to-date packages from the software repositories of the upcoming Debian GNU/Linux 11 “Bullseye” operating system. The entire system was synced with the Debian Testing repos as of February 9th, 2020.

If they want a newer kernel, users will also be able to install the latest and most advanced Linux 5.5.2 kernel, as well as the first RC (Release Candidate) of the upcoming Linux 5.6 kernel. Both kernels are available in SparkyLinux’s unstable repositories.

Included in the SparkyLinux 2020.02 release, there’s also the Calamares 3.2.18 graphical installer, Mozilla Firefox 72.0.2 web browser, Mozilla Thunderbird 68.4.2 email and news client, LibreOffice 6.4 office suite, VLC 3.0.8 media player, and Exaile 4.0.2 audio player.

read more

OpenShot 2.5 Open-Source Video Editor Adds Hardware Acceleration

Monday 10th of February 2020 06:19:28 PM
OpenShot 2.5 open-source video editor is now available for download with hardware acceleration, keyframe performance improvements, and much more. The post OpenShot 2.5 Open-Source Video Editor Adds Hardware Acceleration appeared first on 9to5Linux.

WinTile For GNOME Shell: Windows 10 Like Quarter Tiling (Snapping) With Super/Win + Arrow Keys Or Mouse

Monday 10th of February 2020 06:14:18 PM
If you like the Microsoft Windows 10 tiling style, you can easily get your GNOME Shell desktop to support it with the help of an extension called WinTile. The extension brings quarter tiling functionality to GNOME Shell, using the Super/Win + Arrow keys or using the mouse (with previews and snapping when dragging the windows to the edges).

Linux uniq Command Usage and How It Differs from Sort -u

Monday 10th of February 2020 06:14:18 PM
In this article we discuss using the uniq command to print or remove adjacent duplicated lines. We also discuss the different between uniq and sort -u, which are often compared as having the same functionality.

More in Tux Machines

Antitrust Laws and Open Collaboration

If you participate in standards development organizations, open source foundations, trade associations, or the like (Organizations), you already know that you’re required to comply with antitrust laws. The risks of noncompliance are not theoretical – violations can result in severe criminal and civil penalties, both for your organization and the individuals involved. The U.S. Department of Justice (DOJ) has in fact opened investigations into several standards organizations in recent years. Maybe you’ve had a training session at your company, or at least are aware that there’s an antitrust policy you’re supposed to read and comply with. But what if you’re a working group chair, or even an executive director, and therefore responsible for actually making sure nothing happens that’s not supposed to? Beyond paying attention, posting or reviewing an antitrust statement at meetings, and perhaps calling your attorney when member discussions drift into grey zones, what do you actually do to keep antitrust risk in check? Well, the good news is that regulators recognize that standards and other collaboration deliverables are good for consumers. The challenge is knowing where the boundaries of appropriate conduct can be found, whether you’re hosting, leading or just participating in activity involving competitors. Once you know the rules, you can forge ahead, expecting to navigate those risks, and knowing the benefits of collaboration can be powerful and procompetitive. We don’t often get glimpses into the specific criteria regulators use to evaluate potential antitrust violations, particularly as applicable to collaborative organizations. But when we do, it can help consortia and other collaborative foundations focus their efforts and take concrete steps to ensure compliance. In July 2019, the DOJ Antitrust Division (Division) provided a new glimpse, in its Evaluation of Corporate Compliance Programs in Criminal Antitrust Investigations (Guidance). Although the Guidance is specifically intended to assist Division prosecutors evaluating corporate compliance programs when charging and sentencing, it provides valuable insights for building or improving an Organization’s antitrust compliance program (Program). At a high level, the Guidance suggests that an effective Program will be one that is well designed, is applied earnestly and in good faith by management, and includes adequate procedures to maximize effectiveness through efficiency, leadership, training, education, information and due diligence. This is important because organizations that detect violations and self-report to the Division’s Corporate Leniency program may receive credit (e.g. lower charges or penalties) for having an effective antitrust compliance program in place. Read more

today's howtos

Events: SUSECON, OpenShift Troubleshooting Workshop and Kubernetes Contributor Summit Amsterdam

  • Get Expert Guided Hands-On Experience at the SUSECON 2020 Pre-Conference Workshops

    Are you ready for SUSECON 2020? It’s coming up fast! Join us in Dublin Ireland from March 23 – 27 for a week packed with learning and networking.

  • Get Certified During SUSECON 2020

    Working in IT is not for the feint of heart; the work is demanding, and change is constant. Right now, your organization is undoubtedly seeking new ways to extend the value of their investment in IT and get more done faster.

  • The OpenShift Troubleshooting Workshop

    The first workshop in our Customer Empathy Workshop series was held October 28, 2019 during the AI/ML (Artificial Intelligence and Machine Learning) OpenShift Commons event in San Francisco. We collaborated with 5 Red Hat OpenShift customers for 2 hours on the topic of troubleshooting. We learned about the challenges faced by operations and development teams in the field and together brainstormed ways to reduce blockers and increase efficiency for users. The open source spirit was very much alive in this workshop. We came together with customers to work as a team so that we can better understand their unique challenges with troubleshooting. Here are some highlights from the experience.

  • [Kubernetes] Contributor Summit Amsterdam Schedule Announced

Security: Patches, Bugs, RMS Talk and NG Firewall 15.0

  • Security updates for Wednesday

    Security updates have been issued by CentOS (firefox, java-1.7.0-openjdk, ksh, and sudo), Debian (php7.0 and python-django), Fedora (cacti, cacti-spine, mbedtls, and thunderbird), openSUSE (chromium, re2), Oracle (firefox, java-1.7.0-openjdk, and sudo), Red Hat (openjpeg2 and sudo), Scientific Linux (java-1.7.0-openjdk and sudo), SUSE (dbus-1, dpdk, enigmail, fontforge, gcc9, ImageMagick, ipmitool, php72, sudo, and wicked), and Ubuntu (clamav, linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-oracle-5.0, linux-azure, linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3, linux-lts-xenial, linux-aws, and qemu).

  • Certificate validity and a y2k20 bug

    One of the standard fields of an SSL certificate is the validity period. This field includes notBefore and notAfter dates which, according to RFC5280 section 4.1.2.5, indicates the interval "during which the CA warrants that it will maintain information about the status of the certificate" This is one of the fields that should be inspected when accepting new or unknown certificates. When creating certificates, there are a number of theories on how long to set that period of validity. A short period reduces risk if a private key is compromised. The certificate expires soon after and can no longer be used. On the other hand, if the keys are well protected, then there is a need to regularly renew those short-lived certificates.

  • Free Software is protecting your data – 2014 TEDx Richard Stallman Free Software Windows and the NSA

    Libre booted (BIOS with Linux overwritten) Thinkpad T400s running Trisquel GNU/Linux OS. (src: https://stallman.org/stallman-computing.html) LibreBooting the BIOS? Yes! It is possible to overwrite the BIOS of some Lenovo laptops (why only some?) with a minimal version of Linux.

  • NG Firewall 15.0 is here with better protection for SMB assets

    Here comes the release of NG Firewall 15.0 by Untangle with the creators claiming top-notch security for SMB assets. Let’s thoroughly discuss the latest NG Firewall update. With that being said, it only makes sense to first introduce this software to the readers who aren’t familiar with it. As the name ‘NG Firewall’ suggests, it is indeed a firewall but a very powerful one. It is a Debian-based and network gateway designed for small to medium-sized enterprises. If you want to be up-to-date with the latest firewall technology, your best bet would be to opt for this third-generation firewall. Another factor that distinguishes the NG Firewall from other such products in the market is that it combines network device filtering functions and traditional firewall technology.