Language Selection

English French German Italian Portuguese Spanish

August 2018

Limiting Free Licences and New FUD From Veracode/CA

Filed under
OSS
Security
Legal
  • ​Javascript Tool Maker Relents After Mixing Immigration Politics with Open Source Licensing

    In very short order, Lerna, a company that offers some Javascript tooling, has learned the hard way not to mess with the integrity of an open source license. In other words, don’t decide you’re going to take an existing OSI-certified open source license, modify it to suit your agenda, license your code under the newly derived license, and still continue to refer to your offering as "open source.”

    First, this analysis piece is really just a follow up to my previous post about why it’s time to reject the latest attack on open source software (OSS). The main point of that post was to point out that all of us who have experienced the benefits of open source (ok, that’s nearly all human beings) should play a role in defending it. Otherwise, it will whither and so too will the benefits most of us have come to enjoy, blind to the fact that open source is playing such an important role in our lives.

  • Does Redis' Commons Clause threaten open-source software?
  • Get a Jump on Reducing Your Open Source Software Security Risks [Ed: Anti-FOSS firm Veracode/CA pays IDG for spam which stigmatises FOSS as lacking security]

Software: gPodder, Puppet Bolt and Last howtos for the Week

Filed under
Software
HowTos
  • gPodder – podcast client written in Python

    gPodder is an open source tool that downloads and manages free audio and video content (“podcasts”) for you. The software is written in Python and sports a simple GTK interface. The software package also includes a command-line interface which is called gpo. It lets you listen to podcasts on your computer or on mobile devices. The software is very mature; it’s been in development since 2005.

  • FOSS Project Spotlight: Run Remote Tasks on Linux and Windows with Puppet Bolt

    Puppet, the company that makes automation software for managing systems and delivering software, has introduced Puppet Bolt, an open-source, agentless multiplatform tool for running commands, scripts, tasks and orchestrated workflows on remote Linux and Windows systems.

    The tool, which is freely available as a Linux package, Ruby gem and macOS or Windows installer, is ideal for sysadmins and others who want to perform a wide range of automation tasks on remote bare-metal servers, VMs or cloud instances without the need for any prerequisites. Puppet Bolt doesn't require any previous Puppet know-how. Nor does it require a Puppet agent or Puppet master. It uses only SSH and WinRM (or can piggyback Puppet transports) to communicate and execute tasks on remote nodes.

    Despite its simplicity, Puppet Bolt can execute all your existing scripts written in Bash, PowerShell, Python or any other language, stop and start Linux or Windows services, gather information about packages and system facts, or deploy procedural orchestrated workflows, otherwise known as plans. You can do all this right from your workstation or laptop.

  • How to install MediaWiki on Ubuntu 18.04 LTS
  • How to Install MyWebSQL 3.7 on CentOS 7
  • Fix GTK File Chooser Cannot Add/Remove Bookmarks
  • Docker Guide: Deploying Ghost Blog with MySQL and Traefik with Docker
  • Move the Ubuntu Launcher to Bottom or Right

Linux Kernel up to 4.15-rc3 Crypto Subsystem memory corruption

Filed under
Linux
Security
  • Linux Kernel up to 4.15-rc3 Crypto Subsystem memory corruption

    The weakness was shared 08/30/2018 as bug report (Bugzilla). The advisory is available at bugzilla.redhat.com. This vulnerability is traded as CVE-2018-14619 since 07/27/2018. Local access is required to approach this attack. A single authentication is needed for exploitation. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $5k-$25k at the moment (estimation calculated on 08/31/2018).

  • CVE-2018-14619: New Critical Linux Kernel Vulnerability

    A new Linux kernel vulnerability identified as CVE-2018-14619 has been discovered by Red Hat Engineering researchers Florian Weimer and Ondrej Mosnacek. More particularly, the flaw was found in the crypto subsystem of the Linux kernel.

Security: Alexa Holes, Zemlin on CII, and Apache Struts Patches

Filed under
Security
  • Amazon Alexa Security Risk Allows Hackers to Take Over Voice Commands, Steal Private Information

    The world is changing and in the modern era, we are becoming reliant on our Internet of Things devices by the day. But this reliances could cost us everything, it could allow someone to steal our identity, bank information, medical history, and what not.

    Amazon Alexa has been criticised for having a number of security flaws but Amazon has been quick to deal with them. However, this new security flaw may not have a fix at all. And this could be the most dangerous security threat yet.

    According to research conducted by the University of Illinois at Urbana-Champaign (UIUC), Amazon Alexa’s idiosyncrasies can be exploited through voice-commands to route users to malicious websites. Hackers are targeting the loopholes in machine learning algorithms to access private information.

  • Researchers show Alexa “skill squatting” could hijack voice commands

    The success of Internet of Things devices such as Amazon's Echo and Google Home have created an opportunity for developers to build voice-activated applications that connect ever deeper—into customers' homes and personal lives. And—according to research by a team from the University of Illinois at Urbana-Champaign (UIUC)—the potential to exploit some of the idiosyncrasies of voice-recognition machine-learning systems for malicious purposes has grown as well.

    Called "skill squatting," the attack method (described in a paper presented at USENIX Security Symposium in Baltimore this month) is currently limited to the Amazon Alexa platform—but it reveals a weakness that other voice platforms will have to resolve as they widen support for third-party applications. Ars met with the UIUC team (which is comprised of Deepak Kumar, Riccardo Paccagnella, Paul Murley, Eric Hennenfent, Joshua Mason, Assistant Professor Adam Bates, and Professor Michael Bailey) at USENIX Security. We talked about their research and the potential for other threats posed by voice-based input to information systems.

  • The Linux Foundation Set to Improve Open-Source Code Security

    CII is now working on further trying to identify which projects matter to the security of the internet as a whole, rather than taking a broader approach of looking at every single open-source project, he said. In his view, by prioritizing the projects that are the most critical to the operation of the internet and modern IT infrastructure, the CII can be more effective in improving security.

    "You'll see in the next three months or so, additional activity coming out of CII," Zemlin said.

    Among the new activities coming from the CII, will be additional human resources as well as new funding. The Linux Foundation had raised $5.8 million from contributors to help fund CII efforts, which Zemlin said has now all been spent. Zemlin that CII's money was used to fund development work for OpenSSL, NTP (Network Time Protocol) and conducting audits.

  • Apache Struts 2.3.25 and 2.5.17 resolve Cryptojacking Exploit Vulnerability

    Information regarding a severe vulnerability found in Apache Struts was revealed last week. A proof of concept of the vulnerability was also published publicly along with the vulnerability’s details. Since then, it seems that malicious attackers have set out to repeatedly exploit the vulnerability to remotely install a cryptocurrency mining software on users’ devices and steal cryptocurrency through the exploit. The vulnerability has been allotted the CVE identification label CVE-2018-11776.

    This behavior was first spotted by the security and data protection IT company, Volexity, and since its discovery, the rate of exploits has been increasing rapidly, drawing attention to the critical severity of the Apache Struts vulnerability. The company released the following statement on the issue: “Volexity has observed at least one threat actor attempting to exploit CVE-2018-11776 en masse in order to install the CNRig cryptocurrency miner. The initial observed scanning originated from the Russian and French IP addresses 95.161.225.94 and 167.114.171.27.”

Gnome 3 & best extensions

Filed under
GNOME

There you go. Writing this article got me thinking. Gnome 3 is like Firefox 57. It brought about a radical change, made a lot of what made the original version great redundant, and hid options from users, making customization difficult. Gnome 3 also fights hard against extensions. But these are the bread and butter of what makes it useful, practical and appealing to users. The same is also true of Cinnamon, which has also partially been afflicted the same way. Technically, one may claim that extensions are a poor excuse for bad design, but then, in general, history has shown that they do make products more engaging in the long run. Collective intelligence can be a good thing, especially when harvested for free.

I am still convinced that Gnome 3 is doing it wrong, and that Plasma, Unity or even MATE are much better solutions on all levels. But then, if you do want to use this desktop environment, there are several handy extensions that can truly transform the experience. The must-have set, and then a sweetening of five nice little extras, which help make the desktop more useful and fun. If you have any other suggestions, this is a good time to use your email sending skills. And we're done.

Read more

Games: Scarecrow Studio, RAZED, XCOM 2

Filed under
Gaming
  • Colourful comedy adventure '3 Minutes to Midnight' planned to release for Linux

    Scarecrow Studio [Official Site] have officially announced that their colourful comedy adventure 3 Minutes to Midnight with a trailer and it's coming to Linux.

  • RAZED will bring lightning-fast platformer racing to Linux on September 14th

    Soaked in some vibrant colours, lightning-fast platformer RAZED will requiring a good pair of running shoes when it releases with Linux support on September 14th.

    Developed by Warpfish Games with a sprinkle of publishing from PQube Limited, RAZED is promising an exciting speedrunning experience across the 60 levels being included at release. These levels are spreadout across six different worlds, each of them having their own unique flavour. Each world will also come with an ability to unlock, along with a boss battle.

  • XCOM 2 to possibly get another expansion with 'TLE'

    There's rumours circling around about XCOM 2 getting a new expansion and it seems whatever it turns out to be that Linux support should be there.

A Look At DragonFlyBSD's Kernel Tuning Performance On The AMD Threadripper 2990WX

Filed under
Graphics/Benchmarks
BSD

Last week I posted some initial tests and benchmarks of DragonFlyBSD/FreeBSD on the AMD Threadripper 2990WX. While that went well and the BSDs scale with this 32-core / 64-thread processor better than Windows, lead DragonFly developer Matthew Dillon had picked up a 2990WX system and has been tuning the kernel ever since. Here are some benchmarks looking at some of his recent optimizations.

Hours after that BSD Threadripper testing ended last week, Matthew Dillon landed some more performance tuning/optimizations to benefit the Threadripper 2990WX design. Here are some benchmarks of that original 2990WX support on DragonFlyBSD 5.3-DEVELOPMENT compared to the later daily snapshot.

Read more

SharkLinux Distro: Open Source in Action

Filed under
Linux
OSS

Every so often I run into a Linux distribution that reminds me of the power of open source software. SharkLinux is one such distribution. With a single developer creating this project, it attempts to change things up a bit. Some of those changes will be gladly welcomed by new users, while scoffed at by the Linux faithful. In the end, however, thanks to open source software, the developer of SharkLinux has created a distribution exactly how he would want it to be. And that my friends, is one amazing aspect of open source. We get to do it our way.

But what is SharkLinux and what makes it stand out? I could make one statement about SharkLinux and end this now. The developer of SharkLinux reportedly developed the entire distribution using only an Android phone. That, alone, should have you wanting to give SharkLinux a go.

Read more

Linux hacker board features new Allwinner SoC with analytics accelerator

Filed under
Linux

The open-spec, camera-oriented “Lindenis V5” SBC runs Linux on a new quad -A7 Allwinner V5 V100 with a visual analytics accelerator, and offers dual MIPI-CSI, GbE, and a 40-pin expansion header.

A Shenzhen, China startup called Lindenis Tech. Ltd., staffed by former Allwinner employees, has launched an open spec, 139 x 85mm single board computer that debuts a 1.5GHz Allwinner camera SoC called the V5 V100. Like the Allwinner A33, H2+, and H3 SoCs, the Allwinner V5 V100 (PDF) runs on 4x Cortex-A7 cores. However, instead of an Arm Mali GPU, there’s a custom VPU, a dual ISP, and an “AIE” acceleration engine for visual analytics, with support for motion detection, perimeter defense, video diagnosis, face detection, flow statistics, and binocular depth maps.

Read more

More in Tux Machines

today's howtos

  • How to install MySQL server on CentOS 8 Linux - nixCraft

    How do I install MySQL server 8.0 on CentOS 8 Linux server running on Linode and AWS cloud? How do I add and set up a new MySQL user and database account on the newly created CentOS server? Oracle MySQL server version 8.0 is a free and open-source free database server. It is one of the most popular database system used in web apps and websites on the Internet. Typically MySQL is part of the LAMP (Linux, Apache/Nginx, MySQL, Perl/Python/PHP) stack. Popular open-source software such as WordPress, MediaWiki, and others profoundly used by MySQL as a database storage engine. Let us see how to install MySQL server version 8.x on CentOS 8 Linux server.

  • Linux Fu: VPN For Free With SSH | Hackaday

    If you see a lot of banner ads on certain websites, you know that without a Virtual Private Network (VPN), hackers will quickly ravage your computer and burn down your house. Well, that seems to be what they imply. In reality, though, there are two main reasons you might want a VPN connection. You can pay for a service, of course, but if you have ssh access to a computer somewhere on the public Internet, you can set up your own VPN service for no additional cost. The basic idea is that you connect to a remote computer on another network and it makes it look like all your network traffic is local to that network. The first case for this is to sidestep or enhance security. For example, you might want to print to a network printer without exposing that printer to the public Internet. While you are at the coffee shop you can VPN to your network and print just like you were a meter away from the printer at your desk. Your traffic on the shop’s WiFi will also be encrypted.

  • YANUB: yet another (nearly) useless blog: QSoas tips and tricks: using meta-data, first level

    By essence, QSoas works with \(y = f(x)\) datasets. However, in practice, when working with experimental data (or data generated from simulations), one has often more than one experimental parameter (\(x\)). For instance, one could record series of spectra (\(A = f(\lambda)\)) for different pH values, so that the absorbance is in fact a function of both the pH and \(\lambda\). QSoas has different ways to deal with such situations, and we'll describe one today, using meta-data. [...] QSoas is a powerful open source data analysis program that focuses on flexibility and powerful fitting capacities. It is released under the GNU General Public License. It is described in Fourmond, Anal. Chem., 2016, 88 (10), pp 5050–5052. Current version is 2.2. You can download its source code there (or clone from the GitHub repository) and compile it yourself, or buy precompiled versions for MacOS and Windows there.

  • Many ways to sort file content on Linux

    The Linux sort command can arrange command output or file content in a lot more ways than you might realize--alphabetically, numerically, by month and randomly are only some of the more interesting choices. In this post, we take a look at some of the more useful sorting options and explain how they differ.

  • How to install Luminance HDR

    Luminance HDR is an open-source GUI tool that provides an easy to use toolkit for HDR imaging. It is available on all major Linux operating systems and is excellent for photographers. In this guide, we will go over how to install Luminance HDR on Linux.

  • How to add a WordPress user sign up - Anto Online

    Adding an external user sign up page on a website allows users to register for different roles. Once registered, they can perform tasks such as adding new articles, new comments, and even performing other actions such as designing. Allowing a user to sign up is a common thing for bloggers and companies that accept guest posts. However, this feature can also be used to offer premium content for your members. But, this may require more custom fields and branding. The default WordPress sign up page contains fixed fields and a WordPress logo.

  • How to install Lyrebird on a Chromebook - a Discord Voice Changer

    Today we are looking at how to install Lyrebird, a voice changer for Discord on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • How to play Brawlhalla on Linux

    Brawlhalla is a free-to-play 2D fighting game. It was developed by Blue Mammoth Games, published by Ubisoft, and released on Nintendo Switch, Xbox One, PS4, and PC. In this guide, we’ll show you how to play it on Linux.

Games: RetroArch, PulseAudio, Anarch

  • You can now try the RetroArch Playtest on Steam for Linux | GamingOnLinux

    With the awesome RetroArch application for running emulators and all sorts coming to Steam, they now have a Playtest available you can opt into to try it out. Using the new dedicated Steam Playtest feature announced by Valve in early November, developers can have a banner on their Steam store page letting users request access. So the Libretro team have put this up, and as of today it also has Linux builds available for testing.

  • PulseAudio 14.0 Released With Better USB Gaming Headset Support - Phoronix

    While in 2021 we might begin to see PipeWire replacing PulseAudio by default at least on bleeding-edge distributions like Fedora, for now PulseAudio still is the dominant sound server used by desktop Linux distributions. Rolling out today is PulseAudio 14.0. PulseAudio 14.0 comes with many changes compared to PulseAudio 13.0 that shipped all the way back in September of 2019.

  • "Anarch", a new, public-domain Doom-like game coded from scratch in <256K

    I've argued that the video-game "Doom" is a sort of cultural version of Turing Completeness. Given that we're jamming computers and screens into just about any device these days, inevitably (and delightfully) someone gets it to run Doom: Watches, digital cameras, ATMs, pregnancy sticks. But you know what's even cooler? Creating your own new, original game in the exactly style of Doom, and making it so wildly resource-efficient that it fits in under 256K and will run on just about any computational device around. That's what the programmer Miloslav Číž has done, with his new game "Anarch". You can play it in your browser here or download it here; I just blasted away in it for a while, and it's a hoot — he neatly channels the mechanics and twitchy low-rez aesthetics of the original. Gameplay trailer is here; he put it in the public domain, and the code is all here on Gitlab.

Announcing Istio 1.6.14

This release contains bug fixes to improve robustness. This release note describes what’s different between Istio 1.6.13 and Istio 1.6.14 Read more More:

  • ISTIO-SECURITY-2020-011
  • Support for Istio 1.6 has ended

    As previously announced, support for Istio 1.6 has now officially ended. At this point we will no longer back-port fixes for security issues and critical bugs to 1.6, so we heartily encourage you to upgrade to the latest version of Istio (1.8) if you haven’t already.

Moving into the future with the FSF tech team

The FSF is well-known for spearheading the advocacy and support of free software, not just by recommending it in the face of pervasive proprietary options, but also by condemning nonfree software altogether. Following this recommendation is hard, even for us, because of the ever-increasing dependency on software and computer networks that we are all subject to. To follow through with our commitment, our tech team maintains a large list of services that many other offices our size would have long ago been wrongly pressured into transferring to one of the handful of gigantic corporations that monopolize those services. Your work email account is most likely implemented through Gmail or Outlook; your office's software is likely to be served by Amazon Web Services, along with all the data backups; your company's customer service is likely to be managed through Salesforce or SAP, and so on. Make no mistake, this is true for your local government and school networks, too! In contrast, at the FSF, we never jumped on the outsourcing wagon, and we don't use any Service as a Software Substitute (SaaSS) in our operations. We run our own email servers, telephony and fax service, print shop, full server stack, backups, networking, systems monitoring, accounting, customer relationship management (CRM) software, and a long list of other tasks and software development projects, with a team of just four extremely dedicated technicians. And we implement this on hardware that has been carefully evaluated to meet very high ethical standards, criteria that we push for vendors to achieve through our "Respects Your Freedom" certification program. Read more