The Bash shell is a fundamental Linux tool and, in this era of containers and clusters and microservices, good old-fashioned Linux system administration skills are as relevant as ever. Today, we'll learn about running other command shells, Bash built-ins, configuration files, and shell expansion.
Remotely-distributed system administration teams provide around-the-clock coverage without anyone losing sleep, and have the benefit of drawing from a global talent pool. The OpenStack global infrastructure team relies on these five open source tools to communicate, and to coordinate our work.
Bodhi 4 Alpha, More Tor Heads Roll, Wily Werewolf EOL
Today the Bodhi project announced announced the release of version 4.0.0 Alpha for 64-bit computers only. The final will include support for 32-bit. Elsewhere, Ubuntu 15.10 hit its end of life and the Tor project dismissed two more individuals for inappropriate behavior. Carla Schroder shared some Bash tips for sysadmins and Technews listed commands to avoid.
I love Tycoon style games, I like being able to build and manage and do awesome things. Running a TV station isn’t something I had thought about before so it’s a very cool idea.
The first thing that always impresses me is that it starts on the correct monitor and has no troubles with the fullscreen due to having two monitors. You know how often I complain about games having a totally messed up resolution or picking the wrong monitor, but not a problem here at all!
God is a Cube: Nanomachines Rising sounds pretty fun for anyone who likes programming, puzzles and robotics. You control nanomachines to create AIs made of graphical symbols.
The developer emailed in that they have been working on making the Linux build nice and solid ready for release, so I thought you guys would like to know about it considering it will have a properly supported and tested Linux build.
How To Build A Raspberry Pi Smartwatch — The Geekiest Watch Ever Made
In our Getting Started With Raspberry Pi series, we’ve introduced you to the basics of Pi, told you how to get everything you need, and help you boot a basic operating system. But, Raspberry Pi is much more than that. You can use it as a TOR proxy router, build your own PiPhone, and even install Windows 10 IoT.
This little device comes with lots of flexibility, that allows it to be used in multiple applications. Well, did you ever think about wearing your Raspberry Pi? If your answer is NO, I won’t be surprised.
If you imagine a scenario where Raspberry Pi is used to build a smartwatch, it would look too bulky. Well, that’s the thing about making geeky things that set you apart from the regular crowd, right?
Ten years ago it didn’t seem like Linux growth could increase any faster. Then, in 2006, Amazon launched Amazon Web Services (AWS). Linux growth went from linear to exponential. AWS competitors sprang up and were acquired by IBM, Microsoft, and other big players, accelerating Linux expansion even more.
Linux became the platform of choice for the private cloud. But this movement wasn’t confined to the cloud. A rush to create Linux applications and services spilled over to traditional on premises. Linux had evolved from that obscure thing people ran web servers on to the backbone operating system of the majority of IT.
My friends often leave their computers open and unlocked. I tell them they should probably get in the habit of locking their computers, but they don’t listen to me. So I’ve created a simple project to hack my friends and show them the importance of computer security.
All I need to do is wait for them to leave their computer unlocked for a few seconds, open up their terminal, and type a single, short command.
It was just after 6pm on December 23, 2013, and Lennon Ray Brown, a computer engineer at the Citibank Regents Campus in Irving, Texas, was out for revenge.
Earlier in the day, Brown – who was responsible for the bank’s IT systems – had attended a work performance review with his supervisor.
It hadn’t gone well.
Brown was now a ticking time bomb inside the organisation, waiting for his opportunity to strike. And with the insider privileges given to him by the company, he had more of an opportunity to wreak havoc than any external hacker.
A super-bug in the Xen hypervisor may allow privileged code running in guests to escape to the underlying host.
This means, on vulnerable systems, malicious administrators within virtual machines can potentially break out of their confines and start interfering with the host server and other guests. This could be really bad news for shared environments.
All versions of open-source Xen are affected (CVE-2016-6258, XSA-182) although it is only potentially exploitable on x86 hardware running paravirtualized (PV) guests. The bug was discovered by Jérémie Boutoille of Quarkslab, and publicly patched on Tuesday for Xen versions 4.3 to 4.7 and the latest bleeding-edge code.
The cybersecurity shortfall in the workforce remains a critical vulnerability for companies and nations, according to an Intel Security report being issued today.
Eighty-two percent of surveyed respondents reported a shortage of security skills, and respondents in every country said that cybersecurity education is deficient.
Memory protections and attack surface reductions.
Google has switched on new security features for the Linux kernel in Android, hoping to reduce vulnerabilities and to improve the robustness of its mobile operating system.
Android is built around the open source Linux kernel, the core computer program that controls the software running on devices, and the hardware they're built upon.