Language Selection

English French German Italian Portuguese Spanish

A Week with Gentoo 2006.1: Day 2

Filed under
Gentoo

Operating on the assumption that I was using a bad DVD burn, I downloaded the Gentoo 2006.1 LiveCD x86, Gentoo 2006.1 LiveCD AMD64, and the manual installation mini disc. I plan on getting this bad boy installed!

First up, the x86 LiveCD. I followed the same path I went down on day 1: boot the LiveCD, and try the GTK+ installer first. The one difference is that I decided to use a Stage3 tarball from an internet mirror, not the one on the CD. I chose the Georgia Tech mirror, since I have downloaded from there before, and know it to be fast and problem free.

And then the system hardlocked.Ok, so that isn't going to work.

Full Story.

More in Tux Machines

8 Linux Security Improvements In 8 Years

At a time when faith in open source code has been rocked by an outbreak of attacks based on the Shellshock and Heartbleed vulnerabilities, it's time to revisit what we know about Linux security. Linux is so widely used in enterprise IT, and deep inside Internet apps and operations, that any surprises related to Linux security would have painful ramifications. In 2007, Andrew Morton, a no-nonsense colleague of Linus Torvalds known as the "colonel of the kernel," called for developers to spend time removing defects and vulnerabilities. "I would like to see people spend more time fixing bugs and less time on new features. That's my personal opinion," he said in an interview at the time. Read more

Linux from Square One

Despite the fact I have a different view of which distros are best for kids — Qimo (pronounced “kim-o,” as in the last part of eskimo, not “chemo”) tops the list, as it should, but the French distro Doudou (add your own joke here) is unfortunately left out — the link there is informative. So for those who are just getting their proverbial feet wet in Linux, this is a godsend. Read more

Explaining Security Lingo

This post is aimed to clarify certain terms often used in the security community. Let’s start with the easiest one: vulnerability. A vulnerability is a flaw in a selected system that allows an attacker to compromise the security of that particular system. The consequence of such a compromise can impact the confidentiality, integrity, or availability of the attacked system (these three aspects are also the base metrics of the CVSS v2 scoring system that are used to rate vulnerabilities). ISO/IEC 27000, IETF RFC 2828, NIST, and others have very specific definitions of the term vulnerability, each differing slightly. A vulnerability’s attack vector is the actual method of using the discovered flaw to cause harm to the affected software; it can be thought of as the entry point to the system or application. A vulnerability without an attack vector is normally not assigned a CVE number. Read more

​EMC partners with Canonical, Mirantis, and Red Hat for OpenStack

Do you want to use OpenStack, but you're afraid of the headaches of getting its architecture just right? Well, EMC is here to help with OpenStack reference architectures for three leading OpenStack vendors: Canonical, Mirantis, and Red Hat. Read more