Language Selection

English French German Italian Portuguese Spanish

Free and Proprietary Software: FAI.me, Aptdaemon, Justmd, TeamViewer, Vivaldi

Filed under
Software
  • FAI.me build server improvements

    Only one week ago, I've announced the FAI.me build service for creating your own installation images.

  • Aptdaemon

    I am glad to announce aptdaemon: It is a DBus controlled and PolicyKit using package management daemon build on python-apt.

    If the above description reminds you of PackageKit you won't be completely wrong. Aptdaemon reuses some design concepts and code from PackageKit. As the author of the PackageKit apt backend I run into some policy problems: PackageKit only allows non-interactive actions. So there is no support for debconf, CDROMs and configuration conflict handling. Nevertheless thanks to Richard Hughes for his efforts on making package management less of a pain.

  • Justmd – A Lightweight Cross-Platform Markdown Editor

    We have written on a couple of Markdown editors so far but not on this one, and I don’t think you have heard about it yet because it is pretty much a new project so read on.

    Justmd is a simple, lightweight, cross-platform, and electron-based application with a focus on creating and managing smart documents. Its best features include its live preview mode which comes along with synchronized scrolling as well as smart copying and pasting of images, words and HTML.

  • TeamViewer 13 Now Available For Linux As A Native 64-bit Port

    -
    The latest version of the TeamViewer remote control / desktop sharing / web conferencing software is now available for Linux with a number of improvements.

    TeamViewer 13 is now available for Linux, currently in preview form. Besides the iOS screen sharing with remote support, better file transfer abilities, and other key improvements, there are also a number of Linux-specific improvements too.

    This Linux build of TeamViewer 13 is now "native" for Linux in that it no longer depends upon Wine. TeamViewer 13 for Linux is also now a native 64-bit package without requiring 32-bit dependencies. Additionally, TeamViewer for Linux is now available in DEB and RPM package form.

  • Vivaldi Browser Now Available For Raspberry Pi And ARM Based Linux Hardware

    Raspberry Pi enthusiasts and those of you using ARM based Linux devices, may be interested to know that Vivaldi has this week released an experimental build of the Vivaldi browser which is now available to download for Linux on ARM devices, including the awesome Pi mini PC. In addition to the Windows, macOS and Linux (x86/x86-64), operating systems. The Vivaldi browser is now available for a range of ARM based Linux devices and is now supported by the Raspberry Pi Zero, Raspberry Pi 2 and Raspberry Pi 3 systems as well as CubieBoard, ASUS Tinker Board and more. Jon von Tetzchner, CEO at Vivaldi Technologies explains :

  • Vivaldi Web Browser Now Available For Linux ARM / Raspberry Pi

    Are you still using the Vivaldi web browser? If so, you can now use it on ARM devices like the Raspberry Pi.

    Vivaldi certainly hasn't been generating the attention these days like it did when it was first released last year to much fanfare by former Opera users and developers. This Blink-powered browser is now available for Linux on ARM as the project's latest news.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

Today in Techrights

Security Leftovers

  • One-stop counterfeit certificate shops for all your malware-signing needs

    The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.

  • How did OurMine hackers use DNS poisoning to attack WikiLeaks? [Ed: False. They did not attack Wikileaks; they attacked the DNS servers/framework. The corporate media misreported this at the time.
    The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from expert Nick Lewis.
  • Intel didn't give government advance notice on chip flaws

    Google researchers informed Intel of flaws in its chips in June. The company explained in its own letter to lawmakers that it left up to Intel informing the government of the flaws.

    Intel said that it did not notify the government at the time because it had “no indication of any exploitation by malicious actors,” and wanted to keep knowledge of the breach limited while it and other companies worked to patch the issue.

    The company let some Chinese technology companies know about the vulnerabilities, which government officials fear may mean the information was passed along to the Chinese government, according to The Wall Street Journal.

  • Intel hid CPU bugs info from govt 'until public disclosure'

    As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws and before they became public.

  • Intel did not tell U.S. cyber officials about chip flaws until made public [iophk: "yeah right"]

    Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers [sic] had not exploited the vulnerabilities.

  • LA Times serving cryptocurrency mining script [iophk: "JS"]

    The S3 bucket used by the LA Times is apparently world-writable and an ethical hacker [sic] appears to have left a warning in the repository, warning of possible misuse and asking the owner to secure the bucket.

  • Facebook's Mandatory Malware Scan Is an Intrusive Mess

    When an Oregon science fiction writer named Charity tried to log onto Facebook on February 11, she found herself completely locked out of her account. A message appeared saying she needed to download Facebook’s malware scanner if she wanted to get back in. Charity couldn’t use Facebook until she completed the scan, but the file the company provided was for a Windows device—Charity uses a Mac.

  • Tinder plugs flaw that enabled account takeover using just a phone number

    As Tinder uses Facebook profile pics for its users to lure in a mate or several, the 'dating' app is somewhat tied to the social network. When a swipe-hungry Tinder user comes to login to their account they can either do so via Facebook or use their mobile number.

  • `

Android Leftovers