Language Selection

English French German Italian Portuguese Spanish

Today in Techrights

More in Tux Machines

Stable Kernels: 5.17.10, 5.15.42, 5.10.118, 5.4.196, 4.19.245, 4.14.281, 4.9.316, 5.17.11, and 5.15.43

I'm announcing the release of the 5.17.10 kernel.

All users of the 5.17 kernel series must upgrade.

The updated 5.17.y git tree can be found at:
	git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.17.y
and can be browsed at the normal kernel.org git web browser:
	https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...

thanks,

greg k-h
Read more Also: Linux 5.15.42 Linux 5.10.118 Linux 5.4.196 Linux 4.19.245 Linux 4.14.281 Linux 4.9.316 Linux 5.17.11 Linux 5.15.43

today's leftovers

  • Contextual Logging in Kubernetes 1.24

    The Structured Logging Working Group has added new capabilities to the logging infrastructure in Kubernetes 1.24. This blog post explains how developers can take advantage of those to make log output more useful and how they can get involved with improving Kubernetes.

  • Why we translate our free online projects for young people to learn coding

    All young people deserve meaningful opportunities to learn how to create with digital technologies. But according to UNESCO, as much as 40% of people around the world don’t have access to education in a language they speak or understand. At the Raspberry Pi Foundation, we offer more than 200 free online projects that people all over the world use to learn about computing, coding, and creating things with digital technologies. To make these projects more accessible, we’ve published over 1700 translated versions so far, in 32 different languages. You can check out these translated resources by visiting projects.raspberrypi.org and choosing your language from the drop-down menu.

  • Purism Launches SIMple Plus for Data Privacy

    For those looking for a privacy-focused cellular service in the United States, Purism has launched another option in its suite of privacy-first cellular plans. With other big telecom providers, phone data does not stay private; it’s collected, linked with a person’s identity, and sold to advertisers. With Purism’s cellular services users can get peace of mind and protect their data privacy while on the go.

    The newly launched plan, “SIMple Plus”, provides subscribers with 4G high speed internet with a 3 GB monthly data limit and a $59/month price. Additionally, they can send texts globally to over 160 countries at no extra cost. The plan is designed especially for those who are interested in the SIMple plan, but would like a higher data cap.

    Founder and CEO of Purism, Todd Weaver elaborates on the need, “Due to the popularity of the Librem AweSIM service, where Personal Identifiable Information (PII) is not shared with any cellular carriers, fully protecting the privacy of the user from big telecom. We have added another pricing tier to maximize coverage of service offerings to the rapidly expanding user base.”

Microsoft: DuckDuckGo as Spying Proxy, Internet Explorer Dies, Windows Helps Organised Crime

  • DuckDuckGo Not Totally Private: It Allows Microsoft Trackers

    If you’re concerned about Internet privacy and started using the DuckDuckGo browser or search engine with no concerns that your data wasn’t private, you’ll want to read on. While many people eschewed Google and Microsoft, opting for the privacy provided by DuckDuckGo, they’re not really in the clear. DuckDuckGo gets its search results from Microsoft’s Bing search engine, and it’s now come to light that DuckDuckGo doesn’t block Microsoft’s trackers.

  • RIP Internet Explorer: Microsoft's iconic browser is dying June 15 | PCWorld

    Microsoft said that it finally plans to end support for the standalone version of Internet Explorer in June 2022, though you'll have the option of enabling Internet Explorer Mode within Microsoft Edge.

  • Four in Five Data Breaches Attributed to Organized Crime [iophk: Windows TCO]

    The sharp spike in ransomware breaches is also concerning -- incidents stemming from ransomware have increased by 13 percent in a single year. The jump is greater than the combined percentage increase over the past five years combined. According to Verizon, while criminals look to leverage increasingly sophisticated forms of malware, it is ransomware that continues to prove particularly successful in exploiting and monetizing illegal access to private information.

today's howtos

  • How to Create Sudo User in openSUSE Linux

    The sudo command allows a user to administer a Linux system with the security privileges of another user, by default, the superuser or root.

    In this guide, we will walk you through the process of creating a sudo user in openSUSE i.e create a user and grant them privileges to invoke the sudo command.

  • Draw Guide 7.3

    This 348 pages book covers the main features of Draw, the vector graphics component of LibreOffice. Using Draw, a wide variety of graphical images can be created. Vector graphics store and display a picture as simple geometric elements such as lines, circles, and polygons rather than as a collection of pixels (points on the screen). This permits simpler storage and supports precise scaling of the picture elements.

  • How to install RubyMine 2022 on a Chromebook

    Today we are looking at how to install RubyMine 2022 on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below. Please take note that it comes with a 30-day free trial and afterward it is paid.

  • How to use apt Package Manager on Ubuntu Command Line

    When you start using the Ubuntu operating system, the graphical Ubuntu application manager is your first choice to install software. Although this collection contains a large number of applications, you will quickly notice that it lacks many powerful tools, especially those for the command line. Then it’s time to switch to apt-get, a more powerful software installation tool. With this tool, you can not only install software from the command line, but also to:Update the package repositoriesUpdate installed softwareSearch for available packagesGet the source code for an installed packageReinstall a software packageRemove a software from your system

    In this tutorial, I’ll show you how to use the apt-get tool to complete the tasks indicated above.

  • How to install and use with Sublime Text on Ubuntu 22.04

    Sublime is a robust and extensively used source code editor that provides programmers and developers the platform to write and edit their codes in different languages. It is best known for its speed, user-friendly interface, and extensions making it an ideal choice for a beginner to use this editor. It includes several notable features like quick navigation to files, Python-based plugin API and more. Further, its functionality can be expanded by installing various plugins. This guide will demonstrate how to install and get started with Sublime on Ubuntu 22.04.

  • How to Install .NET Core (dotnet) on Ubuntu 22.04 [Ed: But this would help Microsoft, unless you move something away from Windows]

    Microsoft .NET Core is a free and open-source software framework designed with keeping Linux and macOS in mind. It is a cross-platform successor to .NET Framework available for Linux, macOS, and Windows systems. .NET Core 6 is an LTR release that will support for the next 3 years. It also supports hot reload and better git integration with Visual Studio 2022. The developers should install the .NET Core SDK on their system and the staging or production server needs the .NET Core runtime only.

  • How to Find and Remove Duplicate Lines in a Text File

    As a Linux administrator, superuser, or beginner learning the ropes of the operating system ecosystem, it is essential to learn the Linux command line tweaks on how to deal with duplicate lines in a text file. A common scenario that needs a quick and efficient approach to getting rid of these duplicate lines in a text file is when handling log files. Log files are key/important in improving the user experience of Linux users through their computer-generated data. Such data can be translated as usage operations, activities, and patterns associated with a server, device, application, or system.

  • How to Convert or Merge Multiple Images to PDF in Linux

    Images are an important aspect of everyone’s Linux operating system experience. They hold special information like screenshots of invaluable Linux commands implementation and execution, and also screen captures that are vital to your finished projects’ documentation. Saving your images to a single PDF file is an ingenious way of storing and managing them without having to worry about their whereabouts if some get misplaced. This article seeks to walk us through various approaches to converting or Merging multiple images into PDF in Linux.

  • PGP Encryption: How It Works and How You Can Get Started

    Don’t let the name “Pretty Good Privacy” mislead you. PGP encryption is the gold standard for encrypted communication and has been used by everyone from nuclear activists to criminals since its invention in 1991. While the execution is complex, the concept is simple: you can encrypt text, making it unreadable to anyone who doesn’t have the key to decode it.

  • Linking Kubernetes Clusters

    In legacy IT, dynamic scaling usually meant that you had to start new virtual machines manually. Then, you had to integrate the application into an existing cluster and possibly reconfigure the load balancers. Kubernetes takes all of this work off your plate.