Language Selection

English French German Italian Portuguese Spanish

today's leftovers

Filed under
Misc

     

  • Tempted But the Truth is Discovered | LINUX Unplugged 394

    After all these years, what's made us stick with Linux?

    Plus the commitment just made by the GNOME team, and some new tools that are changing our game.

  •   

  • mintCast 355 – Deferred Update

    First up, in our Wanderings, Mike shreds a new axe, I’m more and more impressed by Proton, Joe has frozen joints, Moss is going to be rich someday, Tony Hughes gets immunities, and Josh panics with a crowbar. 

    Then, in the News, so much controversy, Linux on Mars, VLC on the moon, Mint and mintCast make the cut, and more

  • Tetrate Says Its Istio Distribution Is Easier to Use Than the Upstream Version

    The startup, one of Istio's top contributors, has also launched an online community for Istio and Envoy enthusiasts to surface problems, brainstorm solutions.

  •  

  • New service: https://debuginfod.debian.net

    Hello there,

    I would like to announce a new service that I have just configured for
    Debian: https://debuginfod.debian.net.

    debuginfod is a new-ish project whose purpose is to serve
    ELF/DWARF/source-code information over HTTP.  It is developed under the
    elfutils umbrella.  You can find more information about it here:

      https://sourceware.org/elfutils/Debuginfod.html

    In a nutshell, by using a debuginfod service you will not need to
    install debuginfo (a.k.a. dbgsym) files anymore; the symbols will be
    served to GDB (or any other debuginfo consumer that supports debuginfod)
    over the network.  Ultimately, this makes the debugging experience much
    smoother (I myself never remember the full URL of our debuginfo
    repository when I need it).

    If you would like to use the service, and if the service supports the
    Debian distribution you are using (see below), all you have to do is
    make sure that the following environment variable is set in your shell:

      DEBUGINFOD_URLS="https://debuginfod.debian.net";

    Currently, the elfutils and GDB packages in unstable and testing have
    native support for using debuginfod.  I will soon propose a change to
    the elfutils package in order to make it be configured with our
    debuginfod instance by default, so that users will be able to use the
    service transparently.

    For now, debuginfod.debian.net is serving debug information symbols for
    the following Debian distributions:

      - unstable

      - testing
      - testing-proposed-updates

      - stable
      - stable-backports
      - proposed-updates

    In the near future I intend to expand this list and include the
    debuginfo stored at snapshot.debian.org as well.

    Setting up a debuginfod service for Debian has been on my TODO list for
    some time now, and I finally got enough time & resources to do it.  I
    would like to thank a few people for their feedback and help:

      - Héctor Orón (zumbi)
      - Jonathan Carter (highvoltage)
      - Paul Wise (pabs)

    Last, but not least, you can find a wiki page about our service here:

      https://wiki.debian.org/Debuginfod

    Thanks,

  • Debian Launches A Debuginfod Server For Smoother Debugging Experience

    Debian is the latest major Linux distribution deploying a Debuginfod web server so that ELF/DWARF/source-code information can be supplied via HTTP to clients on-demand when debugging. 

    Introduced last year was Debuginfod with GNU Binutils 2.34 for distributing debugging information / source code on demand. Readelf and objdump utilities can query connected Debuginfod servers for source files / data based on a build ID. Debuginfod support was later integrated into the GNU Debugger too (GDB 10.1). The effort was led by Red Hat engineers while now Debian is getting in on this practical feature too. 

  •  

  • Introducing veb(4) - a new Virtual Ethernet Bridge

                     

                       

    In this commit, David Gwynne (dlg@) adds a new veb(4) driver to the tree. David's goal is to replace the old bridge(4) driver: [...]

  •                

     

  • GNU poke 0.91 pre-released in alpha.gnu.org

    GNU poke (http://www.jemarch.net/poke) is an interactive, extensible editor for binary data.  Not limited to editing basic entities such as bits and bytes, it provides a full-fledged procedural, interactive programming language designed to describe data structures and to operate on them. 

  • Null MX - We do not accept email here!

    By creating a NULL MX RECORD for a domain name which isn't meant to receive email, the domain will clearly state that it doesn't accept any email, period. Anyone attempting to send email to that domain will then immediately received a notification saying you cannot send email to that domain.

  • RFC7505 Means Yes, Your Domain Can Refuse to Handle Mail. Please Leave Us a TXT If You Do.

    If you do not want a domain to receive any mail, there is a way to be at last somewhat civil about it. There's a different DNS trick for that.

More on debuginfod

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's howtos

  • Lukas "lzap" Zapletal: Crop and resize video to get rid of borders

    We stream our community demos on youtube via Google Meet and there are borders on each side which makes the content to be smaller and less readable. Luckily, it is in the middle of the screen, so the following command will crop the image to its 1/1.29 of the size, stretch it back to 720p and reencodes it for YouTube copying the audio stream.

  • Linux Logical Volume Manager (LVM) tutorial

    Logical Volume Manager (LVM) is used on Linux to manage hard drives and other storage devices. As the name implies, it can sort raw storage into logical volumes, making it easy to configure and use. In this guide, you'll learn how LVM works on Linux systems. There's no better way to learn about LVM than simply running through an example, which is exactly what we'll do in the steps below. LVM works the same on any Linux distribution, so you can use any of the commands below on your own system. Follow along with us as we use LVM to create partitions, physical volumes, a virtual group, logical volumes, and filesystems on a hard disk. We'll also show how to mount, extend, and remove our newly created logical volumes. By the end of this tutorial, you'll have a full understanding of how to use LVM and apply your own configurations.

  • How to Install LAMP in Ubuntu in 3 steps

    In this article we are going to install the famous Linux Apache PHP and MySQL web services. The article is going to use the tasksel Ubuntu app.

  • How to Access Another Computer on the Same Network with Linux?

    There are many reasons for accessing another computer on the home or office network from your laptop or desktop.

  • How To Install macOS in a Virtual Machine on Ubuntu Linux

    QEMU is a virtual machine emulator and virtualizer which is quite similar to VMware and VirtualBox on Windows. Users often use QEMU alongside KVM as it provides a natively implemented virtual machine on the Linux kernel. The major advantage of QEMU is that it is very easy to set up and manage. Also, creating virtual machines from the command line has never been simpler with QEMU. You can also use a GUI interface with QEMU/KVM, and the preferred GUI manager of choice is virt-manager. Running virtual machines will provide you so with many other benefits as well. After you have finished testing a QEMU/KVM virtual machine and no longer need it, you can easily delete the virtual disk file associated with the virtual machine.

  • Grep Exclude Term

    Global regular expression print is a versatile terminal-based utility. As the name shows that it helps in searching the text within the file with the help of regular expressions. Grep is firstly originated as a Unix utility to run on that operating platform. After Linux configuration, it can access many applications on this operating system. Most Grep functions are included in the matching of the text of the file present in the command. Exclude function is also as useful as matching any pattern and displaying it because it helps remove the particular match from the file. It helps to exclude the word or words from the lines in a file. We can get help from the man page in the system by applying the below-appended command.

  • How to install Docker containers via Cockpit on Ubuntu 20.04 LTS

    The Cockpit is an easy solution to manage server resources remotely using the graphical web interface. It is not only light in weight but also present to install in most of the Linux repositories such as in popular Ubuntu, RedHat, Fedora, and CentOS to install with just a single command. Well, if we talk about Docker container management in Cockpit, then this really helpful to easily manage virtual machines or containers graphically. Yes, we can install and delete containers using few mouse clicks. No need to go through the command line to manage them. However, in Ubuntu 20.04 the Docker package for Cockpit is not available to install but we can do that manually by directly installing its Deb file. Here, we let you know how to do that in this tutorial.

  • Vim Reload Vimrc Without Closing – Linux Hint

    Vim is a versatile, fully accessible text editor that is also Vi-compatible. It is being used to make changes to any form of document. It comes in handy when modifying C/Perl/Python programs. It can also be used to modify configuration documents in Linux/Unix systems. /.vimrc is a document that you can use to configure and launch Vim. This article will show you how to update and reload the vimrc document in Linux despite rebooting the Vim editor.

  • LFCA: Learn Classes of Network IP Addressing Range – Part 11

    In Part 10 of the LFCA series, we brushed over the classes of IP addresses and gave examples of the commonly used IP classes. However, that was just an overview and in this part, we will dive deeper and gain more understanding about IP addressing range and the number of hosts and networks each class of IP provides.

  • Cpufetch - Check CPU information on linux terminal
  • How to check if a port is open on remote Linux system

    When installing or configuring an application in the Linux system, the associated port should also be open which allows the application for external access. If the application port is not open, it will make the program throw errors and hence malfunction. For instance, when you configure the Apache Web server on Linux, you must open ports 80 and 443 that listens to incoming connections for Apache on the firewall, and that allows users to access websites hosted on your web server through the browser.

Best Clipboard Monitoring Apps for Linux

This article will cover a list of useful “clipboard monitoring” apps for Linux. Some desktop environments have built-in support for clipboard monitoring and they provide clipboard monitoring panel applets by default. The term “clipboard monitoring” refers to the practice of keeping a track / log of content copied on your desktop through keyboard shortcuts and mouse interactions. Since clipboard monitoring tools keep a history of copied content, you can review entries in the clipboard history and re-use / paste content that was copied earlier. Read more

Make Linux look like Windows - 2021 edition

Here we go again. Roughly three years ago, I showed you how to skin your Linux installation to look more like Windows, should your particular taste lean in that direction. It was an interesting little experiment. Also nerdy to the core. But apart from possible nostalgia and tech glamor, there might also be practical reasons for why someone would want to make their distro look more like a Microsoft product. And the answer is: entice non-techie people who expect the familiar. Say you install a distro for folks with zero Linux knowledge and some rudimentary Windows familiarity. Normally, this is a recipe for disaster. I call this The Grandma Gentoo Test (TGGT), AKA how likely is the ordinary person to master the subtleties of computer usage without your nerdy help? But this is true for all operating systems, except Windows had been around for a long time, and it's the primary desktop interface that most people somewhat know how to somewhat use. So then, can you make your chosen distro behave like Windows, and nonce the wiser? Read more

Security Patches and GNU/Linux Security

  • Security updates for Monday

    Security updates have been issued by CentOS (nettle, squid, and thunderbird), Debian (libebml, python-bleach, and python2.7), Fedora (batik, gnuchess, kernel-headers, kernel-tools, ruby, singularity, and xorg-x11-server), Mageia (clamav, kernel, kernel-linus, and python3), openSUSE (chromium, fluidsynth, opensc, python-bleach, and wpa_supplicant), Oracle (gnutls and nettle), Red Hat (dpdk, gnutls and nettle, mariadb:10.3 and mariadb-devel:10.3, and redhat-ds:11), and SUSE (kernel, qemu, and xen).

  • Openwall Releases LKRG 0.9.0 with a Long List of Major Changes, Improvements & Bug Fixes

    Openwall recently announced the release of LKRG (Linux Kernel Runtime Guard) 0.9.0, featuring a host of major changes and improvements, as well as fixes for multiple security bugs. LKRG is a kernel module that performs runtime integrity checking of the Linux kernel and detection of security vulnerability exploits against the kernel.

  • Can Linux Be Used To Offer More Security In A WFH World (On And Offline)?

    Operational security at least seemed so much easier back when traditional 9-to-5 office life was still dominant. Talk of professionals taking their work home with them was largely metaphorical, with only occasional instances of C-suite types dragging their laptops everywhere they went. Business hardware and systems would be shielded through physical security and isolated networks. One office (or office complex), one place to guard: entirely straightforward. Now, after a year that’s seen countless businesses (some eagerly and others reluctantly) adopt the working-from-home model, there are different challenges to overcome. Teams are scattered and must share sensitive data across the internet — data to which other companies and fraudsters would love to gain access. When information gets out, reputations are destroyed and businesses (particularly those working entirely online) struggle to survive.