Language Selection

English French German Italian Portuguese Spanish

Blogs

Nettop, the command not the hardware is not just for OSX..

Filed under
Linux

I found this article on the osxdaily website, the article refers to running nettop on OSX however it’s a *nix command so will also be in the package repository (if not preinstalled) on your favorite distro. I’ve tested all of the command options on Sabayon and they work fine..

Read More

Using dual factor authentication on Linux..

Filed under
Linux

I’m really starting to appreciate the benifits of dual factor authentication across the board, so this Howtoforge article is of interest to anyone who wants to secure SSH access on thier Linux systems. I previously posted about using your mobile phone as the something you have bit, well this is another method.

Read More

HOW TO DO MASS ENROLLING OF YUBIKEY WITH LINOTP

Filed under
Linux

While you may have your Ubuntu install locked down with Full disk encryption incase you loose the laptop, UFW locking down the network with a firewall, there is no point if you have a poor password. Dual factor authentication using One Time Passwords may be an option for you, if they are this great howtoforge article might point you in the right direction.

Read More

Why is PRISM so shocking? Everyone is reading our data

Filed under
Just talk

With prism being the story of the week, I'm just asking a simple question

Read More

Half-Life

Filed under
Linux

I've been playing Half-Life recently, something to which I've looked forward for quite some time. I did get it playing under Wine years ago, but I thought I only got a little ways. I'm stuck In the Rails right now, but I remember this level.

Setting up a serial console

This is a bit old school however if you are a Sysadmin you might need to get a console up for a Cisco or other device. I hope this helps

Read More

Getting Squid3 on Debian 6.x to work with Active Directory, Security Groups and Websense

Filed under
Linux

I’ve had a need to get a local squid proxy to perform local filtering based on AD Security groups because it’s not something websense can do. I found this wonderful howtofoge guide online and Used it to setup the base system. This howto is a work in progress as the next stage is to get it working with DansGuardian or SquidGuard.

Prerequisites
Client Internet Explorer Browsers need to have “Enable Integrated Windows Authentication” ticked in Internet Options :: Advanced settings as well as Proxy Auto detection enabled – google these if not sure. All modern web browsers will support proxy auto detection. Firefox and Chrome also support Windows Authentication.

Read more

Enabling Dual Factor Authentication on Linux SSH logins..

Filed under
Linux

A couple of weeks ago I wrote a post on using a Chromebook to develop on a cloud platform. Its based on a Digital Ocean remote server and like most people who wish to attach to the command line interface on a remote server I use SSH. It’s an encrypted connection over the network/internet from end to end. However being a cloud server I was wondering if it was possible to secure this a little bit more?

A chat with a friend on the way into work provided me with a solution.

The solution is Two Factor authentication a system beased on a simple premise, something you know (the SSH password in this case) and something you have (your mobile phone in this case, but it could be a secure token) which will deliver a random number.

Read More

Ubuntu 13.04 raring to go on Acer C7 Chromebook

Filed under
Linux

Most of the guides you will see using this utility mine included cover how to get Ubuntu 12.04 the LTS version working, however there is also scope within the command line to get the latest and greatest up and running. specifically the -r switch. Issuing the following command will provide you with a bare bones Ubuntu 13.04 install

Read How

Using a Chromebook to develop in the cloud…

Filed under
Linux

Being a few months in with my Acer C7 Chromebook as my only laptop i’ve very pleased with what it does, I do have the Crouton Ubuntu chroot installed and upgraded the device to 16Gb of Ram, however there is one core thing I miss with this setup. VMWare/Virtualbox. I find i’m often building virtual machines, usually Ubuntu to test bsh scripts or build LAMP Environments to test some PHP out with. That isn’t something i’m able to do even on the CHROOT Ubuntu environment.

All however is not lost, and i’ve found a way to get round this..

Read my ChromeOS virtual soluton

Desktop era

Filed under
Linux

Will the believers in the desktops ever stop making this year is the year of Linux on the desktop...

There’s something Ubuntu needs to do if the phone is going to work..

Filed under
Linux

They say a week in politics is a long time, well a year in the mobile phone industry is an eternity and what huge changes the industry is going through. A year ago the roost was ruled by Apple and Google, 3G was the fastest we can go and handsets were finding a stock size at 4.5″.. The world however of the mobile device is now a very different place and very much in a positive state of change..

What does the Ubuntu Phone need to succeed?

Casual Programming and Linux Screen-Recorders

Filed under
Linux

After being retired (for four years) from teaching high school Computer Science, I decided to get back into programming again. I once taught a beginning programming class using the Ruby language, and I thought that would be a good way to get back into programming. So, I decided I needed a “Ruby refresher”, and I wanted to learn more about that language than I taught in the classroom.

Forgot your Ubuntu Password? All is not lost.

Filed under
Howtos

It’s always a pain when you forget your password, and i’ve often done it on an Ubuntu install. All however is not lost as a stock Ubuntu install its quite easy to reset your password

Read More

Maybe it's time to think about LTSP?

Filed under
Linux

With austerity being the watchword of our times being able to get as much out of that IT hardware you have is as important as ever, more so when the industry is in shift at an OS level and maybe the hardware you have isn’t quite up to the task of Windows 8?

Ubuntu Phone, Good idea?

Filed under
Linux

In a bold move today Ubuntu have announced plans to move forward with an Ubuntu Phone which it is touting the interface is the difference here. This is a big statement in a marketplace which has been owned by Apple and Google for the last 3 to 4 years.

The EE Nokia Lumia 920

Filed under
Just talk

The UK got its first 4G network this month and the choices for 4G phones are thin on the ground at the moment the iPhone 5 and the Samsung Galaxy S3 were there at launch however as a long time Android and IOS user i’m finding both operating systems at that stage of their life when they ar about features not innovation. This may well change in the future however, and you must understand these words are hard for me to say, Microsoft seem to be innovating quite a bit in the OS market, pushing the boat out and taking some risks.

My phone of choice on EE is the Nokia Lumia 920, Nokias last bi breath attempt at staying alive as a company it would seem however this is a phone developed for Windows Phone 8 in Microsoft. It is the phone Microsoft were happy to share the stage with at launch and it’s got generally good reviews.

Lets start this with the two important things the phone and the 4G..

Read More

Building your own cloud using OwnCloud on Ubuntu.

Filed under
Linux

Unless you’ve been under a rock or are the type of Luddite who thinks the pen and paper is modern hi tech, you cannot fail to have heard about the most miss used expression on the Internet, the cloud. It’s a buzzword which every ill equipped marketing goon has latched his crayon’s onto and will mention in every presentation ever.

Put simply the cloud is the image used when tech people wanted to display the Internet outside their own network, this turned into a location firstly where data could be stored and more recently where “Big Data” is stored.. Honestly I have no idea who comes up with this stuff.

Read More

The 3 Wise Smartphones this christmas

Filed under
Just talk

The busiest period of the year for consumer technology purchases is reaching us quickly December is Thanksgiving and Christmas and January Sales time Cash is going to be spent and the smartphone market is a huge slice of that cash which will be spent.

Following a week of announcements what state is this market segment in?

Read More

Ubuntu 12.04 the Macbook Pro Post Install

Filed under
Linux

While this post states its the post install for the Macbook Pro it will cover any 64bit Nvidia Ubuntu 12.10 post install...

Read More

Syndicate content

More in Tux Machines

Security: Linux, Docker and Guix

  • Unpatched Linux bug may open devices to serious attacks over Wi-Fi

    The flaw is located in the RTLWIFI driver, which is used to support Realtek Wi-Fi chips in Linux devices. The vulnerability triggers a buffer overflow in the Linux kernel when a machine with a Realtek Wi-Fi chip is within radio range of a malicious device. At a minimum, exploits would cause an operating-system crash and could possibly allow a hacker to gain complete control of the computer. The flaw dates back to version 3.10.1 of the Linux kernel released in 2013.

  • Docker Attack Worm Mines for Monero
  • Insecure permissions on profile directory (CVE-2019-18192)

    We have become aware of a security issue for Guix on multi-user systems that we have just fixed (CVE-2019-18192). Anyone running Guix on a multi-user system is encouraged to upgrade guix-daemon—see below for instructions. Context The default user profile, ~/.guix-profile, points to /var/guix/profiles/per-user/$USER. Until now, /var/guix/profiles/per-user was world-writable, allowing the guix command to create the $USER sub-directory. On a multi-user system, this allowed a malicious user to create and populate that $USER sub-directory for another user that had not yet logged in. Since /var/…/$USER is in $PATH, the target user could end up running attacker-provided code. See the bug report for more information. This issue was initially reported by Michael Orlitzky for Nix (CVE-2019-17365).

In 2019, multiple open source companies changed course—is it the right move?

Free and open source software enables the world as we know it in 2019. From Web servers to kiosks to the big data algorithms mining your Facebook feed, nearly every computer system you interact with runs, at least in part, on free software. And in the larger tech industry, free software has given rise to a galaxy of startups and enabled the largest software acquisition in the history of the world. Free software is a gift, a gift that made the world as we know it possible. And from the start, it seemed like an astounding gift to give. So astounding in fact that it initially made businesses unaccustomed to this kind of generosity uncomfortable. These companies weren't unwilling to use free software, it was simply too radical and by extension too political. It had to be renamed: "open source." Once that happened, open source software took over the world. Recently, though, there's been a disturbance in the open source force. Within the last year, companies like Redis Labs, MongoDB, and Confluent all changed their software licenses, moving away from open source licenses to more restrictive terms that limit what can be done with the software, making it no longer open source software. Read more Also: Network Time Foundation Joins Open Source Initiative

Red Hat: OpenShift, RHEL, Dependency Analytics, vDPA and More

  • Red Hat Expands the Kubernetes Developer Experience with Newest Version of Red Hat OpenShift 4

    Red Hat, Inc., the world's leading provider of open source solutions, today announced Red Hat OpenShift 4.2, the latest version of Red Hat’s trusted enterprise Kubernetes platform designed to deliver a more powerful developer experience. Red Hat OpenShift 4.2 extends Red Hat’s commitment to simplifying and automating enterprise-grade services across the hybrid cloud while empowering developers to innovate and enhance business value through cloud-native applications.

  • RHEL and Insights combo illuminates threats and spotlights performance for Red Hat systems

    When Red Hat Inc. officially rolled out its Red Hat Enterprise Linux 8, or RHEL 8, operating system in May, the open-source software company also included Red Hat Insights with every subscription for the new release. Based on data supplied by one of the company’s top executives, that has proven to be a wise decision. Insights is a software as a service product that works from a rules-based engine to offer continuous connected analysis of registered Red Hat-based systems. “We’ve seen an 87% increase since May in the number of systems that are linked in,” said Stefanie Chiras (pictured), vice president and general manager of the RHEL Business Unit at Red Hat. “We’re seeing a 33% increase in coverage of rules-based and a 152% increase in customers who are using it. That creates a community of people using and getting value from it, but also giving value back because the more data we have the better the rules get.”

  • What’s new in Red Hat Dependency Analytics

    We are excited to announce a new release of Red Hat Dependency Analytics, a solution that enables developers to create better applications by evaluating and adding high-quality open source components, directly from their IDE. Red Hat Dependency Analytics helps your development team avoid security and licensing issues when building your applications. It plugs into the developer’s IDE, automatically analyzes your software composition, and provides recommendations to address security holes and licensing problems that your team may be missing. Without further ado, let’s jump into the new capabilities offered in this release. This release includes a new version of the IDE plugin and the server-side analysis service hosted by Red Hat.

  • Breaking cloud native network performance barriers

    Up until now we have covered virtio-networking and its usage in VMs. We started with the original vhost-net/virtio-net architecture, moved on to the vhost-user/virito-pmd architecture and continued to vDPA (vHost Data Path Acceleration) where the virtio ring layout was pushed all the way into the NIC providing wiresspeed/wirelatency to VMs. We now turn our attention to using vDPA for providing wirespeed/wirelatency L2 interfaces to containers leveraging kubernetes to orchestrate the overall solution. We will demonstrate how Containerized Network Functions (CNFs) can be accelerated using a combination of vDPA interfaces and DPDK libraries. The vDPA interfaces are added as a secondary interface to containers using the Multus CNI plugin. This post is a high level solution overview describing the main building blocks and how they fit together. We assume that the reader has an overall understanding of Kubernetes, the Container Network Interface (CNI) and NFV terminology such as VNFs and CNFs.

  • Top 5 stress reliefs for sysadmins

Purism shows off more pictures of Librem 5 Phone and PureOS UI

As the first batch of the Librem 5 phones starts reaching its respectful owners, we can now have a better look at the product from its pictures taken by the customers. Before we check them out, let’s get to know a bit more about these phones. The Librem 5 smartphones are powered by PureOS, which is a Linux-based mobile operating system. The brains behind this product, namely Purism, have made it their top priority to offer such phones that provide security, privacy, and freedom to the customers. Accordingly, this product has been made for people who want to have complete control over their phones. You should check out this article if you want to know more about the Librem 5 smartphones. Now coming back to the news, people who have ordered this phone are in for a treat as the Librem 5 comes with a black anodized aluminum case. Not only it’s stylish, but it also maintains high radio reception quality – thanks to its non-metal backing. It accompanies easier-to-slide, flush hardware kill switches. Read more Also: Nathan Wolf: New Life to Rock Candy Gamepad for PS3 | Another Repair