Language Selection

English French German Italian Portuguese Spanish

OLPC’s New $150 Android Tablet Is on Sale at Walmart

Filed under
OLPC




More in Tux Machines

TechNexion Unveils EDM and AXON SoM’s Powered by NXP i.MX8M Plus SoC

The company offers standard support for Ubuntu 20.04 LTS, Linux-built Yocto Project, and Android 10, as well as extended support for FreeRTOS. If it feels like you’ve seen EDM-G-IMX8M-PLUS module before it’s because it should be the one found in the upcoming Wandboard 8MPLUS SBC. There’s will be other development kits based on existing AXON/EDM baseboards including AXON-PI Raspberry Pi-like starter board, or the full-featured AXON-WIZARD and EDM-WIZARD evaluation boards. Marcel vandenHeuvel, TechNexion’s CEO, gives an overview of the AXON i.MX8M Plus modules and baseboard, and shows a Yocto 3.0 Linux demo with dual displays. Read more

Security: AppArmor and SELinux, Linux Security Features and Zero Trust Security Model

  • Technologies for container isolation: A comparison of AppArmor and SELinux

    I researched how containers, virtual machines (VMs), and processes, in general, are separated by different technologies—namely, AppArmor and SELinux. My goal was to compare these solutions for isolation/separation capabilities in the cloud world. Just as a reminder, Red Hat Enterprise Linux uses SELinux technology to separate processes, containers, and VMs. OpenShift also uses this technology. The first option is an isolation technology called AppArmor, which is a very similar technology to SELinux. However, it is not label-based. AppArmor security profiles, which are equivalent to SELinux security policies, look more user-friendly, but that’s because AppArmor is less complicated and controls fewer operations.

  • Kees Cook: security things in Linux v5.7

    Linux v5.7 was released at the end of May. [...] After Silvio Cesare observed some weaknesses in the implementation of CONFIG_SLAB_FREELIST_HARDENED‘s freelist pointer content obfuscation, I improved their bit diffusion, which makes attacks require significantly more memory content exposures to defeat the obfuscation. As part of the conversation, Vitaly Nikolenko pointed out that the freelist pointer’s location made it relatively easy to target too (for either disclosures or overwrites), so I moved it away from the edge of the slab, making it harder to reach through small-sized overflows (which usually target the freelist pointer). As it turns out, there were a few assumptions in the kernel about the location of the freelist pointer, which had to also get cleaned up.

  • Zero Trust Security Model

    The Zero Trust Network, also called Zero Trust Architecture, is a model that was developed in 2010 by the principal analyst John Kindervag. A zero-trust security system helps to protect the enterprise system and improves cybersecurity. [...] The Zero Trust approach depends upon modern technologies and methods to achieve the target of securing an organization. The Zero Trust Model calls for businesses to manipulate micro-segmentation and granular perimeter execution based on users, their whereabouts, and other data or information, to find out whether to believe a user, machine, or application that is trying to seek access to a specific part of the enterprise or organization. Zero Trust also takes care of all other policies, for example, giving users the least access they require to complete the task they want to complete. Creating a Zero Trust environment is not only about putting into practice the separate singular technology associations; it is also about using these and other technologies to impose the idea that no one and nothing should have access until they have proven that they should be trusted. Of course, organizations know that creating a Zero Trust Security Model is not an overnight achievement. Because it is not easy to achieve something so complex in a single night, it can take years to find the most secure, ideal system possible. Many companies are shifting to the cloud security system. These systems have the best options to go to Zero Trust. Now is the time to be ready for a Zero Trust transition. All organizations, either large or small, or should have Zero Trust security systems for their data safety.

Linux Lite 5.2 RC-1 Is Now Available For Download And Testing

Linux Lite is undoubtedly one of the best lightweight and Windows alternative Linux operating systems. Earlier on May 31, 2020, Linux Lite creator Jerry Bezencon released the most feature-rich, Linux Lite 5.0 “Emerald.” Working on the next Linux Lite 5.2 version release, Jerry Bezencon has now made its first testing version available for download. So, let’s see what the new features and updates are coming in the Linux Lite 5.2. Read more

Android Leftovers