Language Selection

English French German Italian Portuguese Spanish

Ohio Linuxfest A Success!

Filed under
Linux

If you didn't make it to the Ohio Linuxfest this past weekend you missed a great time. With speakers like John "Maddog" Hall, Jeff Waugh and Chris DiBona not to mention vendors like Novell, IBM, RedHat, and Sun, there was a something for everyone at Ohio Linuxfest this year.

I (Aaron) was there with a booth right next to The Linux Link Tech Show guys. I got to meet so many people from the Open Source community and everyone was interested in the show. Thanks to everyone who stopped by to say hello and find out about the show!

Attendance was up this year by about 33% with about 1050 people there for the one day event. The doors opened at 8:00am with the keynote address starting at 9:00am. Thanks to the help of a lot of great volunteers check in was a snap and everyone was able to get right to the booths.

Full Story.

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News