Good news for Arma 3 [Steam] fans today, as Bohemia Interactive have released their next roadmap. They have stated work is going to continue on the Linux version! Not only that, but they are going to make Arma 3 64bit too.
If you hit up the Steam top sellers list, pretty much all the games from non-indies are Windows only. Which is understandable, given the economics of supporting Mac and Linux. So when a triple-A does take the effort to port its software, it often comes as a surprise. As is the case with Mad Max from Avalanche Studios, which came out yesterday with versions for these neglected platforms.
The announcement itself is nothing major, stating that if you already own the game, then the non-Windows versions are available immediately at no extra cost (which is expected, really).
What’s more interesting is the graphics hardware supported. On Mac, both NVIDIA and AMD are good, while those with Intel GPUs having a hard time of it. Fair enough.
An Intel developer has published testing patches for providing a SoundWire bus driver within the Linux kernel, which implements the MIPI SoundWire 1.1 specification.
For those unfamiliar with SoundWire as was I when coming across these patches, "The SoundWire protocol is a robust, scalable, low complexity, low power, low latency, two-pin (clock and data) multi-drop bus that allows for the transfer of multiple audio streams and embedded control/commands. SoundWire provides synchronization capabilities and supports both PCM and PDM, multichannel data, isochronous and asynchronous modes. SoundWire does borrow a number of concepts from existing interfaces such as HDAudio, AC97, SLIMbus, which already provide control/audio on the same wires, or legacy interfaces such as I2C/I2S, TDM, PDM."
The perf code for Linux 4.10 is set to receive a new "c2c" tool.
The C2C tool within the perf subsystem is aimed to track down cacheline contention and has already been used by developers in tracking down false sharing of large applications, readers/writes to cachelines, and related information to assist NUMA shared-memory applications.
Those building microservices at scale understand the role and importance of distributed tracing: after all, it’s the most direct way to understand how and why complex systems misbehave. When we deployed Dapper at Google in 2005, it was like someone finally turned the lights on: everything from ordinary programming errors to broken caches to bad network hardware to unknown dependencies came into plain view.
On October 20, 2016, Nvidia published a new Beta graphics driver for the Linux platform, adding support for some new GPUs the company launched recently, as well as various improvements and bug fixes.
The Nvidia 375.10 Beta is now available for early adopters, but we don't recommend installing it just yet if you're looking for a stable and reliable gaming experience, adding support for Nvidia's recently announced Nvidia GeForce GTX 1050 and GeForce GTX 1050 Ti graphics cards, as well as Nvidia Quadro P6000 and Nvidia Quadro P5000 GPUs.
Another interesting change implemented in the new Beta video driver, which should hit the stable channels next month, is the addition of two new X11 configuration options, namely ForceCompositionPipeline and ForceFullCompositionPipeline, overriding the MetaMode tokens with the same names.
After giving us Mad Max, today, October 21, 2016, UK-based video game publisher Feral Interactive made another awesome announcement for GNU/Linux gamers: Deus Ex: Mankind Divided is coming on the 3rd of November.
And we thought that Mad Max was the biggest news of the year for Linux gamers, right? Well, wrong, as in just two weeks from the moment of writing this article we'll be able to play the superb Deus Ex: Mankind Divided action role-playing stealth video game on our Linux-powered gaming rigs.
Seriously, what the heck Feral Interactive! First Dawn of War II, then Mad Max and very quickly after Deus Ex: Mankind Divided!
That's right, Deus Ex: Mankind Divided is launching on SteamOS & Linux on the 3rd of November!
New Releases: Budgie, Solus, SalentOS, and Slackel
Those making use of the promising Solus Linux distribution will soon find their BLAS-based workloads are faster.
Solus developer Peter O'Connor tweeted this week that he's found some issues with the BLAS linking on the distribution and he's made fixes for Solus. He also mentioned that he uncovered these BLAS issues by using our Phoronix Test Suite benchmarking software.
This release is available in both 32-bit and 64-bit architectures, while the 64-bit iso supports booting on UEFI systems.
The 64-bit iso images support booting on UEFI systems.
The 32-bit iso images support both i686 PAE SMP and i486, non-PAE capable systems.
Iso images are isohybrid.
Cisco's Talos team has developed an open-source tool that can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks.
The tool, called MBRFilter, functions as a signed system driver and puts the disk's sector 0 into a read-only state. It is available for both 32-bit and 64-bit Windows versions and its source code has been published on GitHub.
The master boot record (MBR) consists of executable code that's stored in the first sector (sector 0) of a hard disk drive and launches the operating system's boot loader. The MBR also contains information about the disk's partitions and their file systems.
Since the MBR code is executed before the OS itself, it can be abused by malware programs to increase their persistence and gain a head start before antivirus programs. Malware programs that infect the MBR to hide from antivirus programs have historically been known as bootkits -- boot-level rootkits.
Microsoft attempted to solve the bootkit problem by implementing cryptographic verification of the bootloader in Windows 8 and later. This feature is known as Secure Boot and is based on the Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.
I hope somebody's paying attention. There's been another big DDOS attack, this time against the infrastructure of the Internet. It began at 7:10 a.m. EDT today against Dyn, a major DNS host, and was brought under control at 9:36 a.m. According to Gizmodo, which was the first to report the story, at least 40 sites were made unreachable to users on the US East Coast. Many of the sites affected are among the most trafficed on the web, and included CNN, Twitter, PayPal, Pinterest and Reddit to name a few. The developer community was also touched, as GitHub was also made unreachable.
This event comes on the heels of a record breaking 620 Gbps DDOS attack about a month ago that brought down security expert Brian Krebs' website, KrebsonSecurity. In that attack, Krebs determined the attack had been launched by botnets that primarily utilized compromised IoT devices, and was seen by some as ushering in a new era of Internet security woes.
Twitter, Spotify and Reddit, and a huge swath of other websites were down or screwed up this morning. This was happening as hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s probably safe to assume that the two situations are related.
Attacks against DNS provider Dyn continued into Friday afternoon. Shortly before noon, the company said it began "monitoring and mitigating a DDoS attack" against its Dyn Managed DNS infrastructure. The attack may also have impacted Managed DNS advanced service "with possible delays in monitoring."
Friday morning is prime time for some casual news reading, tweeting, and general Internet browsing, but you may have had some trouble accessing your usual sites and services this morning and throughout the day, from Spotify and Reddit to the New York Times and even good ol’ WIRED.com. For that, you can thank a distributed denial of service attack (DDoS) that took down a big chunk of the Internet for most of the Eastern seaboard.
This morning’s attack started around 7 am ET and was aimed at Dyn, an Internet infrastructure company headquartered in New Hampshire. That first bout was resolved after about two hours; a second attack began just before noon. Dyn reported a third wave of attacks a little after 4 pm ET. In all cases, traffic to Dyn’s Internet directory servers throughout the US—primarily on the East Coast but later on the opposite end of the country as well—was stopped by a flood of malicious requests from tens of millions of IP addresses disrupting the system. Late in the day, Dyn described the events as a “very sophisticated and complex attack.” Still ongoing, the situation is a definite reminder of the fragility of the web, and the power of the forces that aim to disrupt it.
First things first a disclaimer. I neither like nor trust the National Security Agency (NSA). I believe them to be mainly engaged in economic spying for the corporate American empire. Glenn Greenwald has clearly proven that in his book No Place to Hide. At the NSA, profit and power come first and I have no fucking clue as to how high they prioritize national security. Having said that, the NSA should hack the Internet of (insecure) Things (IoT) to death. I know Homeland Security and the FBI are investigating where the DDoS of doomsday proportions is coming from and the commentariat is already screaming RUSSIA! But it is really no secret what is enabling this clusterfuck. It’s the Mirai botnet. If you buy a “smart camera” from the Chinese company Hangzhou XiongMai Technologies and do not change the default password, it will be part of a botnet five minutes after you connect it to the internet. We were promised a future where we would have flying cars but we’re living in a future where camera’s, light-bulbs, doorbells and fridges can get you in serious trouble because your home appliances are breaking the law.
Fog computing, also known as fog networking, is a decentralized computing infrastructure. Computing resources and application services are distributed in logical, efficient places at any points along the connection from the data source (endpoint) to the cloud. The concept is to process data locally and then use the network for communicating with other resources for further processing and analysis. Data could be sent to a data center or a cloud service. A worthwhile reference published by Cisco is the white paper, "Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are."
Canonical has announced its ‘Livepatch Service’ which any user can enable on their current installations to eliminate the need for rebooting their machine after installing an update for the Linux kernel. With the release of Linux 4.0, users have been able to update their kernel packages without rebooting, however, Ubuntu will be the first distribution to offer this feature for free.
Dirty Cow is a silly name, but it's a serious Linux kernel problem. According to the Red Hat bug report, "a race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system."
Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks.
Russian antivirus vendor Dr.Web discovered this new trojan in October. The company's malware analysts say the trojan is spread in the form of an archived PDF, Microsoft Office, or OpenOffice file.