Language Selection

English French German Italian Portuguese Spanish

Today's Howtos:

Filed under
HowTos

Network security is an ever growing need these days. You never know what you’re going to find when you step out into the wild world of the internet. Luckily we’re all using Ubuntu so we’re much more protected than most of the world, but there still is reason to protect our computers and networks.

For those of you that are not behind a hardware router (if you don’t know this might be you) you definitely want to install a firewall for your system.

Setup a Desktop Firewall with Firestarter : Ubuntu (5.10 / 6.06.1 / 6.10)

And: Using Firestarter


Skype is a little piece of software that lets you make free calls to anyone else on Skype, anywhere in the world. And even though the calls are free, they are really excellent quality. If you and your friends, family or business contacts are using webcams, you can also make free video calls. You can even call landlines and mobile phones at really cheap per minute rates (and there’s no setup or subscription fee).

Install skype in ubuntu

First you need to download the latest .deb package from here using the following command:

Install Skype Instant messenger


As part of my work on Xen I've been playing with Xephyr (a replacement for Xnest). My plan is to use Xen instances for running different versions of desktop environments. You can't just ssh -X to a Xen image and run things. One problem is that some programs such as Firefox do strange things to try and ensure that you only have one instance running. Another problem is with security, the X11 security extensions don't seem to do much good. A quick test indicates that a ssh -X session can't copy the window contents of a ssh -Y session, but can copy the contents of all windows run in the KDE environment. So this extension to X (and the matching ssh support) seem to do little good.

One thing I want to do is to have a Xen image for running Firefox with risky extenstions such as Flash and keep it separate from my main desktop for security and managability.

Xephyr


This article is to guide you thru the installation and system preparation for FreeBSD 6.1. This article is not intended to produce a working system, but is the foundation for the progression to either a desktop system or a server. Once this document has been followed to completion, you may either choose to follow the Server or Workstation documents for your system deployment.

installing_freebsd_6_1


When you install a dual-boot of Ubuntu, one of the frustrating things that you’ll immediately notice is that Ubuntu is now set as the default operating system in the Grub loader. There’s an easy way to switch back to using Windows as the default.

To make this change, you’ll first have to boot into Ubuntu, and then run the following command:


Set Windows as Default OS when Dual Booting Ubuntu


This article is about resizing ext3 partitions without losing data. It shows how to shrink and enlarge existing ext3 partitions and how to merge two ext3 partitions. This can be quite useful if you do not use LVM and you realize that your existing partitioning does not meet your actual needs anymore.

How To Resize ext3 Partitions Without Losing Data


I have mp3 music file all over my file system. I’d like to move them onto specific directory called /mnt/mp3. So how do you find and move all mp3 files to /mnt/mp3 directory?

Simply use find command. It locates all files and then executes a command to move them to /mnt/mp3 (any other directory).

Finding all .mp3 files and move to new directory from shell prompt


A quick note for anyone wondering how to enable core dumps from within most Linux distributions.

1. First, make sure debug symbol are enabled in your project’s configuration (in configure.ac if you’re using autoconf).

HOWTO enable coredumps


Staying in front of your computer for hours and hours with the default fonts can be a challenge on Linux/Unix. I, for one, can't work properly without the Windows fonts comfort Smile

Having the windows fonts working on Unix systems is fairly easy, but on Red Hat-based operating systems such as CentOS or Fedora, can be a real nightmare. The most critical aspect of having the Microsoft fonts to display properly on CentOS in compiling freetype with bytecode interpreter enabled. Let's go through this procedure.

How to display Microsoft fonts like in Windows in CentOS?


More in Tux Machines

CoreOS Linux 899.17.0 Released with OpenSSL 1.0.2h, NTPd 4.2.8p7, and Git 2.7.3

The CoreOS developers have released a new version of the Linux kernel-based operating system engineered for massive server deployments, CoreOS 899.17.0. Powered by Linux kernel 4.3.6, CoreOS 899.17.0 arrived on May 3, 2016, as an upgrade to the previous release of the GNU/Linux operating system, which system administrators can use for creating and maintaining open-source projects for Linux Containers, version 899.15.0. Read more

Black Lab Brings Real-Time Kernel Patching to Its Enterprise Desktop 8 Linux OS

A few moments ago, Softpedia has been informed by Black Lab Software about the general availability of the sixth DP (Developer Preview) build of the upcoming Black Lab Linux Enterprise Desktop 8 OS. Sporting a new kernel from the Linux kernel from the 4.2 series, Black Lab Linux Enterprise Desktop 8 Developer Preview 6 arrives today for early adopters and public beta testers with real-time kernel patching, which means that you won't have to reboot your Black Lab Linux Enterprise OS after kernel upgrades. "DP6 offers you a window into what's new and whats coming when Black Lab Enterprise Desktop and Black Lab Enterprise Desktop for Education is released. As with our other developer previews it also aids in porting your applications to the new environment," said Roberto J. Dohnert, CEO, Black Lab Software. Read more

USB stick brings neural computing functions to devices

Movidius unveiled a “Fathom” USB stick and software framework for integrating accelerated neural networking processing into embedded and mobile devices. On April 28, Movidius announced availability of the USB-interfaced “Fathom Neural Compute Stick,” along with an underlying Fathom deep learning software framework. The device is billed as “the world’s first embedded neural network accelerator,” capable of allowing “powerful neural networks to be moved out of the cloud, and deployed natively in end-user devices.” Read more

ImageMagick Security Bug Puts Sites at Risk

  • Open Source ImageMagick Security Bug Puts Sites at Risk
    ImageMagick, an open source suite of tools for working with graphic images used by a large number of websites, has been found to contain a serious security vulnerability that puts sites using the software at risk for malicious code to be executed onsite. Security experts consider exploitation to be so easy they’re calling it “trivial,” and exploits are already circulating in the wild. The biggest risk is to sites that allows users to upload their own image files. Information about the vulnerability was made public Tuesday afternoon by Ryan Huber, a developer and security researcher, who wrote that he had little choice but to post about the exploit.
  • Huge number of sites imperiled by critical image-processing vulnerability
    A large number of websites are vulnerable to a simple attack that allows hackers to execute malicious code hidden inside booby-trapped images. The vulnerability resides in ImageMagick, a widely used image-processing library that's supported by PHP, Ruby, NodeJS, Python, and about a dozen other languages. Many social media and blogging sites, as well as a large number of content management systems, directly or indirectly rely on ImageMagick-based processing so they can resize images uploaded by end users.
  • Extreme photo-bombing: Bad ImageMagick bug puts countless websites at risk of hijacking
    A wildly popular software tool used by websites to process people's photos can be exploited to execute malicious code on servers and leak server-side files. Security bugs in the software are apparently being exploited in the wild right now to compromise at-risk systems. Patches to address the vulnerabilities are available in the latest source code – but are incomplete and have not been officially released, we're told.