Language Selection

English French German Italian Portuguese Spanish

LinuxWorld 2006: A Diamond in The Rough

Filed under
Linux

"What do you think of the show?" This is the question I heard all week at LinuxWorld here.

It turns out that many of my journalist peers, a few speakers and a number of vendors weren't as impressed by the show as I was.

This was the year when neither HP nor IBM had a booth on the exhibit floor. Many people I spoke with mentioned their absence. But I'm a journalist, and had the benefit of being pre-briefed by both IBM and HP, and I even attended an HP VIP event on the opening night of the show.

I heard a rumor that Red Hat initially balked on exhibiting at the show when it discovered IBM wouldn't have a booth. But Red Hat and the show's higher-ups evidently came to an agreement and Red Hat showed, as did its competitor Novell.

There was no PHP or Zend booth, nothing from Debian (though Ubuntu was there) no Mandriva and no Mozilla.

Full Story.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News