Language Selection

English French German Italian Portuguese Spanish

Gentoo News

Syndicate content
News and information from Gentoo Linux
Updated: 1 hour 21 min ago

Github Gentoo organization hacked - resolved

Thursday 28th of June 2018 12:00:00 AM
2018-07-04 14:00 UTC

We believe this incident is now resolved. Please see the incident report for details about the incident, its impact, and resolution.

2018-06-29 15:15 UTC

The community raised questions about the provenance of Gentoo packages. Gentoo development is performed on hardware run by the Gentoo Infrastructure team (not github). The Gentoo hardware was unaffected by this incident. Users using the default Gentoo mirroring infrastructure should not be affected.

If you are still concerned about provenance or are unsure what solution you are using, please consult https://wiki.gentoo.org/wiki/Project:Portage/Repository_Verification. This will instruct you on how to verify your repository.

2018-06-29 06:45 UTC

The gentoo GitHub organization remains temporarily locked down by GitHub support, pending fixes to pull-request content.

For ongoing status, please see the Gentoo infra-status incident page.

For later followup, please see the Gentoo Wiki page for GitHub 2018-06-28. An incident post-mortem will follow on the wiki.

More in Tux Machines

Software: Latte Dock, Emacs, Ick, REAPER

  • Latte Dock 0.8 Released with Widget Separators, Setup Sharing, More
    A new version of Latte Dock, an icon-based task bar for the KDE desktop, is available to download. Latte Dock 0.8 is the first stable release of the app switching software in almost a year and is the third stable release overall.
  • 3 Emacs modes for taking notes
    No matter what line of work you're in, it's inevitable you have to take a few notes. Often, more than a few. If you're like many people in this day and age, you take your notes digitally. Open source enthusiasts have a variety of options for jotting down their ideas, thoughts, and research in electronic format. You might use a web-based tool. You might go for a desktop application. Or, you might turn to the command line. If you use Emacs, that wonderful operating system disguised as a text editor, there are modes that can help you take notes more efficiently. Let's look at three of them.
  • Ick version 0.53 released: CI engine
    I have just made a new release of ick, my CI system. The new version number is 0.53, and a summary of the changes is below. The source code is pushed to my git server (git.liw.fi), and Debian packages to my APT repository (code.liw.fi/debian). See https://ick.liw.fi/download/ for instructions.
  • REAPER 5.93 Brings New Linux-Native Builds
    Since 2016 we have been looking forward to the REAPER digital audio workstation software for Linux while with this week's v5.93 release, the experimental Linux-native builds are now officially available.
  • Digital Audio Workstation REAPER Adds Experimental Native Linux Builds
    REAPER, a popular music production tool, added experimental native Linux builds to its download page with the latest 5.93 release. Initially released in 2005, REAPER (Rapid Environment for Audio Production, Engineering, and Recording) is a powerful digital audio workstation (DAW) and MIDI sequencer, available for Windows, macOS and Linux. Cockos, the company that develops REAPER, was founded by Justin Frankel of Winamp and Gnutella peer-to-peer network fame. The application uses a proprietary license and you can evaluate it for free for 60 days without having to provide any personal details or register. After the free trial ends, you can continue to use it but a nag screen will show up for a few seconds when the application starts. A license costs $225 for commercial use, or $60 for a discounted license (details here).

today's howtos

Red Hat News

At Rest Encryption

There are many steps you can take to harden a computer, and a common recommendation you'll see in hardening guides is to enable disk encryption. Disk encryption also often is referred to as "at rest encryption", especially in security compliance guides, and many compliance regimes, such as PCI, mandate the use of at rest encryption. This term refers to the fact that data is encrypted "at rest" or when the disk is unmounted and not in use. At rest encryption can be an important part of system-hardening, yet many administrators who enable it, whether on workstations or servers, may end up with a false sense of security if they don't understand not only what disk encryption protects you from, but also, and more important, what it doesn't. Read more