Language Selection

English French German Italian Portuguese Spanish

Will you buy a Steam Machine for $499?

Filed under
Gaming

Linux gamers are chomping at the bit to get their hands on a Steam Machine. iBuyPower has released information about their $499 prototype.

Read more

More in Tux Machines

Security Leftovers

  • Krebs Goes Down, Opera Gets a VPN & More…
    Krebs on Security in record DDOS attack: Everybody’s go-to site for news and views of security issues, has been temporarily knocked offline in a DDOS attack for the record books. We first heard about the attack on Thursday morning after Brian Krebs reported that his site was being hit by as much as 620 Gbs, more than double the previous record which was considered to be a mind-blower back in 2013 when the anti-spam site Spamhaus was brought to its knees. Security sites such as Krebs’ that perform investigative research into security issues are often targets of the bad guys. In this latest case, Ars Technica reported the attack came after Krebs published the identity of people connected with vDOS, Israeli black hats who launched DDOS attacks for pay and took in $600,000 in two years doing so. Akamai had been donating DDoS mitigation services to Krebs, but by 4 p.m. on the day the attack began they withdrew the service, motivated by the high cost of defending against such a massive attack. At this point, Krebs decided to shut down his site.
  • Upgrade your SSH keys!
    When generating the keypair, you're asked for a passphrase to encrypt the private key with. If you will ever lose your private key it should protect others from impersonating you because it will be encrypted with the passphrase. To actually prevent this, one should make sure to prevent easy brute-forcing of the passphrase. OpenSSH key generator offers two options to resistance to brute-force password cracking: using the new OpenSSH key format and increasing the amount of key derivation function rounds. It slows down the process of unlocking the key, but this is what prevents efficient brute-forcing by a malicious user too. I'd say experiment with the amount of rounds on your system. Start at about 100 rounds. On my system it takes about one second to decrypt and load the key once per day using an agent. Very much acceptable, imo.
  • Irssi 0.8.20 Released
  • What It Costs to Run Let's Encrypt
    Today we’d like to explain what it costs to run Let’s Encrypt. We’re doing this because we strive to be a transparent organization, we want people to have some context for their contributions to the project, and because it’s interesting. Let’s Encrypt will require about $2.9M USD to operate in 2017. We believe this is an incredible value for a secure and reliable service that is capable of issuing certificates globally, to every server on the Web free of charge. We’re currently working to raise the money we need to operate through the next year. Please consider donating or becoming a sponsor if you’re able to do so! In the event that we end up being able to raise more money than we need to just keep Let’s Encrypt running we can look into adding other services to improve access to a more secure and privacy-respecting Web.
  • North Korean DNS Leak reveals North Korean websites
    One of North Korea’s top level DNS servers was mis-configured today (20th September 2016) accidentally allowing global DNS zone transfers. This allowed anyone who makes a zone transfer request (AXFR) to retrieve a copy of the nation’s top level DNS data. [...] This data showed there are 28 domains configured inside North Korea, here is the list: airkoryo.com.kp cooks.org.kp friend.com.kp gnu.rep.kp kass.org.kp kcna.kp kiyctc.com.kp knic.com.kp koredufund.org.kp korelcfund.org.kp korfilm.com.kp ma.gov.kp masikryong.com.kp naenara.com.kp nta.gov.kp portal.net.kp rcc.net.kp rep.kp rodong.rep.kp ryongnamsan.edu.kp sdprk.org.kp silibank.net.kp star-co.net.kp star-di.net.kp star.co.kp star.edu.kp star.net.kp vok.rep.kp
  • Yahoo’s Three Hacks
    As a number of outlets have reported, Yahoo has announced that 500 million of its users’ accounts got hacked in 2014 by a suspected state actor. But that massive hack is actually one of three interesting hacks of Yahoo in recent years.

Italian Military's LibreOffice Migration Underway; 100,000+ PCs To Be Migrated

As we reported exactly an year ago, Italian Military's plans to migrate its entire fleet of desktop PCs to LibreOffice is well underway and has reached its first milestone. Since the project got started about an year ago, the Italian military have switched over 8000 PC workstations to LibreOffice. Read more

Every Little Hacker needs a Little Linux Computer

I know what you’re probably all thinking, why isn’t this kid’s adorable face on every possible toddler related product currently on the market? Rest assured, I constantly remind my sister of how she could be exploiting his cuteness for millions of dollars- but I digress. Where were we? Oh right, Linux. Let’s talk hardware. If we’re building this little dude a Linux computer and we’re “ballin’ on a budget”, there’s no better choice than a Raspberry Pi. I mean he is a hacker in training, right? His typing (and well, hand coordination in general) isn’t that great yet, so we’ll need an over-sized keyboard. A big mouse pad, and a good wireless mouse will do well. Oh, and how about a VESA mount case for the Raspberry Pi so it stays out of the way? All of that should do nicely. Read more

Can Justin Trudeau Fix Canada’s Broken Government IT System?

During a March hearing before the House of Commons Government Operations Committee, there was a telling exchange between an official of Shared Services Canada (SSC)–the department that manages the Canadian federal government’s IT–and rookie MP David Graham. Graham wanted to know what percentage of SSC’s data centres and servers ran on Linux or other similar source software. Patrice Rondeau, the SSC official, replied that “approximately 15 percent are running Linux.” Read more