Language Selection

English French German Italian Portuguese Spanish

My Favorite Linux Podcasts

Filed under

In the recent years, podcasting has been gaining momentum and today we have a multitude of podcasts for almost every topic, including my favorite (and yours, I hope), GNU/Linux. Instead of listening to the same song over and over, why not educate yourself about the latest in open source technology?

Here’s a list of my favorite podcasts, along with a short description. Some of them are recorded by normal Linux users, and others have some hard-core Linux hackers on board - what all these shows have in common though, is that they’re both fun and interesting.

The Bad Apples Linux Cast

Klaatu, the show-host of TBA, has been a Mac user for a long time. While this may not be a show for most newbie users, Klaatu’s Bad Apples provides a wealth of information about Linux on, and compared to the Macintosh OS X, with some focus on Slackware and Fedora. The new season started just a while ago.

What makes it special: Klaatu does the show alone, but somehow still manages to keep it dynamic and interesting. Also, the podcast features some cool sci-fi music which I enjoy listening to.

Linux Outlaws

More Here

More in Tux Machines

Latest Security and FUD

  • Userdir URLs like are dangerous

    I would like to point out a security problem with a classic variant of web space hosting. While this issue should be obvious to anyone knowing basic web security, I have never seen it being discussed publicly. Some server operators allow every user on the system to have a personal web space where they can place files in a directory (often ~/public_html) and they will appear on the host under a URL with a tilde and their username (e.g. The Apache web server provides such a function in the mod_userdir module. While this concept is rather old, it is still used by some and is often used by universities and Linux distributions. From a web security perspective there is a very obvious problem with such setups that stems from the same origin policy, which is a core principle of Javascript security. While there are many subtleties about it, the key principle is that a piece of Javascript running on one web host is isolated from other web hosts. To put this into a practical example: If you read your emails on a web interface on then a script running on should not be able to read your mails, change your password or mess in any other way with the application running on a different host. However if an attacker can place a script on, which is called a Cross Site Scripting or XSS vulnerability, the attacker may be able to do all that.

  • FOSSID and BearingPoint Enter Strategic Partnership Around Open Source Software Governance

    FOSSID, a leader in open source software compliance and security, and BearingPoint, a leader in open source management services, today announced their strategic partnership around free and open source software governance. After successfully cooperating in selected projects for more than two years, BearingPoint decided to choose FOSSID as its strategic provider of open source analysis tools. FOSSID’s technology provides high performance and accuracy in the code analysis services performed by BearingPoint. [...] BearingPoint’s modular FOSS services provide companies with streamlined processes and infrastructure to deploy, manage, and govern their software throughout the product lifecycle, helping them to manage open source compliance and security. BearingPoint’s FOSS analysis services provide a timely and confidential analysis of the customers’ code base, including comprehensive compliance and security reports for their business decisions.

  • 5 ways to secure your applications from open-source vulnerabilities [Ed: Interesting, Proprietary software programs/code have no vulnerabilities? This is only an Open Source thing?]
  • How to make open source success less of a crapshoot [Ed: Typical Asay]

Devices/Embedded With GNU/Linux

  • Open source near ubiquitous in IoT, report finds

    Open provide is an growing variety of regular working course of in software, nonetheless nowhere is that this more true than Net of Points building. In keeping with a model new VisionMobile survey of three,700 IoT builders, 91% of respondents use open provide software in a minimal of 1 area in their software stack. This is good news for IoT because of best open provide ensures to chop again or put off the potential of lock-in imposed by way of proprietary “necessities.” What’s in all chance most attention-grabbing on this affection for open provide, then again, is that concurrently endeavor builders have eschewed the politics of open provide licensing, IoT builders seem to need open provide because of “it’s free as in freedom.”

  • MIOTY Silicon Vendor Agnostic, Scalable LPWAN Standard to Take on LoRaWAN, NB-IoT

    There are plenty of LPWAN (Low Power Wide Area Networks) standards designed for low power, low bitrate and long-range connectivity with the most popular currently being NB-IoT and LoRaWAN. But Texas Instruments has joined other smaller companies (Fraunhofer, Ragsol, STACKFORCE, WIKA…) to form the MIOTY alliance in order to develop and promote a new LPWAN standard operating in the sub-GHz range called MIOTY.

  • ESP32-Vaquita-DSPG Board and SDK Support Alexa Integration and AWS IoT Core Cloud Service
  • Rugged embedded PC supports Linux on Apollo Lake

    Nexcom’s rugged, Linux-ready “NISE 108” embedded computer has an Apollo Lake Celeron, triple display support with dual DP, 2x GbE, 4x USB, 3x COM, and M.2 and mini-PCIe expansion. [...] Designed for rugged industrial automation applications in factory, agricultural, and service settings, with special suitability for agro-industrial jobs, the aluminum and metal constructed NISE 108 supports -5 to 55°C operation with ambient air flow. The IEC60068-2-27 compliant shock protection is listed as 20G (HDD) or 50G (SSD) at half-sine, 11ms. Random vibration resistance is rated at 0.5Grms @ 5~500 Hz per IEC60068-2-64 for an HDD and 2Grms with SSD. There’s also 10% to 95% (non-condensing) relative humidity tolerance. The NISE 108 supports up to 8GB DDR3L-1866 via a single socket. There’s a 2.5-inch storage bay and an M.2 2242 socket, both with the older SATA 2.0 support. A mini-PCIe slot supports WiFi and cellular connections with the help of dual antenna holes.

Linux Exec Should Be Less Deadlock Prone In Future Kernels

Ongoing work around Linux's exec() code should make it less deadlock prone in future kernel versions. The current exec functionality within the kernel is "extremely deadlock prone" but Eric Biederman and others have been working to clean up that code and put it in a better state to avoid potential deadlocks. Sent in for the Linux 5.7 kernel was the first part of the exec rework that makes trickier cases easier to spot and the hope is for Linux 5.8 the code to solve exec deadlocks might be ready. Read more

Server: Rosetta@Home, MariaDB SkySQL, and Kubernetes

  • Rosetta@Home Now Supports 64-bit Arm SBC’s and Servers in the Fight against COVID-19

    As explained in an article on miniNodes, you’ll need a board with at least 2GB RAM and running a 64-bit operating system. That means Raspbian will not work since it’s only 32-bit, and instead you can use Ubuntu 18.04 / 19.04 server 64-bit for Raspberry Pi. On other SBC’s, people have been using Armbian successfully.

  • MariaDB SkySQL enables cloud-native database as a service

    Howard: It's more than just X4, it's a very interesting amalgamation of power. Yes, it does have X4, whose primary distinction in the marketplace is to have analytic and transactional processing all in the same database. X4 is also more than that, with the way in which data is propagated from the row store to the columnar store in an approach we call smart transactions. Typically what has to happen is that data has to be propagated to a separate data warehousing instance, like a Redshift or Snowflake. Here it's part and parcel of the same database. So that's unique, and that's manifested in SkySQL. That's no easy task to do and we automate things like block storage as well. On top of that is Kubernetes. We spent a lot of time optimizing the Kubernetes footprint to really handle a persistent technology like a database. [...] Howard: We tried many different techniques. We started off with a physical instantiation. But it was about two years ago when we saw the opportunity with Kubernetes. Because of MariaDB's community and global footprint it was clear to me that we would have to be multi-cloud. Doing that physically and having a portal on each of the clouds was just an unnecessary evil. So after starting with using virtual machines and physical instantiation methods, we moved to the Kubernetes method.

  • Is Kubernetes becoming the driving force of enterprise IT?

    Now and again, enterprise technology comes along that seems like a beautifully simple solution to a complicated problem. Take Kubernetes—the open source platform that automates Linux container operations, eliminating many of the manual processes involved in deploying and scaling containerised applications. It is exciting to see how Kubernetes is evolving to meet the challenge of running mission critical workloads at scale. Container use will only continue to increase. A recent Red Hat survey found that 62% of organisations have minimal (less than 10%) container use today, but only 20% say that will still be the case in two years’ time. Meanwhile, the percentage with more than half their workloads containerised is expected to almost triple—to 28%—over the same period.