Security Leftovers

-
White House Meeting Explores Ways to Secure Software Supply Chain
The path forward will require collaboration from companies and organizations that consume and ship open source software, said Joe Brockmeier, Vice President Marketing & Publicity at Apache Software Foundation. “There's no single "silver bullet" to get there, and it will take all of our organizations working together to improve the open source supply chain.”
-
CISA Adds 13 Known Exploited Vulnerabilities to Catalog | CISA
CISA has added 13 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.
-
CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats
In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive malware on Ukrainian systems—CISA has published CISA Insights: Implement Cybersecurity Measures Now to Protect Against Potential Critical Threats.
-
Linux Lock Screen Policy Enables Consistent Device Governance
Every operating system should have security controls deployed, and Linux is no exception. Having a lock screen policy is even more of a consideration with a remote workforce where team members could be using a local coffee shop or other unsecured locations as an “office,” which increases the odds that bad actors could obtain physical access to devices. JumpCloud has created an easy-to-deploy policy to configure lock screen settings for Linux throughout your fleet, providing consistent governance and a scalable method for a secure OS configuration.
-
Oracle Releases January 2022 Critical Patch Update
Oracle has released its Critical Patch Update for January 2022 to address 497 vulnerabilities across multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.
-
- Login or register to post comments
Printer-friendly version
- 1388 reads
PDF version
More in Tux Machines
- Highlights
- Front Page
- Latest Headlines
- Archive
- Recent comments
- All-Time Popular Stories
- Hot Topics
- New Members
Programming Leftovers
| Emulate the VIC-20 home computer with Linux
Emulation is the practice of using a program (called an emulator) on a PC to mimic the behaviour of a home computer or a video game console, in order to play (usually retro) games on a computer.
Home computers were a class of microcomputers that entered the market in 1977 and became common during the 1980s. They were marketed to consumers as affordable and accessible computers that, for the first time, were intended for the use of a single non-technical user.
Back in the 1980s, home computers came to the forefront of teenagers’ minds. Specifically, the Amiga, ZX Spectrum, and Atari ST were extremely popular. They were hugely popular home computers targeted heavily towards games, but they also ran other types of software.
The Commodore VIC-20 is an 8-bit home computer that was released in 1980/1. It featured a MOS Technology 6502 CPU, with 20KB ROM and 5KB RAM although 1.5K of the RAM was used for the video display and aspects of the BASIC and kernal.
It offered limited low-resolution graphics (176 x 184) with storage provided by cassette and floppy disk.
|
PostgreSQL Anonymizer 1.0: Privacy By Design For Postgres
PostgreSQL Anonymizer is an extension that hides or replaces personally identifiable information (PII) or commercially sensitive data from a PostgreSQL database.
The extension supports 3 different anonymization strategies: Dynamic Masking, Static Masking and Anonymous Dumps. It also offers a large choice of Masking Functions such as Substitution, Randomization, Faking, Pseudonymization, Partial Scrambling, Shuffling, Noise Addition and Generalization.
| today's howtos
|
Recent comments
3 hours 50 min ago
4 hours 14 min ago
7 hours 22 min ago
7 hours 33 min ago
7 hours 35 min ago
15 hours 19 min ago
17 hours 4 min ago
18 hours 46 min ago
21 hours 6 min ago
1 day 1 hour ago