Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Friday, 15 Oct 21 - Tux Machines is a community-driven public service/news site which has been around for over a decade and a half and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Security Leftovers

  • Security updates for Friday

    Security updates have been issued by Debian (squashfs-tools, tomcat9, and wordpress), Fedora (openssh), openSUSE (kernel, mbedtls, and rpm), Oracle (httpd, kernel, and kernel-container), SUSE (firefox, kernel, and rpm), and Ubuntu (linux-azure, linux-azure-5.4).

  • Apache Releases Security Advisory for Tomcat   | CISA

    The Apache Software Foundation has released a security advisory to address a vulnerability in multiple versions of Tomcat. An attacker could exploit this vulnerability to cause a denial of service condition.

  • Security Risks of Client-Side Scanning

    Even before Apple made their announcement, law enforcement shifted their battle for back doors to client-side scanning. The idea is that they wouldn’t touch the cryptography, but instead eavesdrop on communications and systems before encryption or after decryption. It’s not a cryptographic back door, but it still a back door — and brings with it all the insecurities of a back door. I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s substantially the same group that wrote a similar paper about key escrow in 1997, and other “exceptional access” proposals in 2015. We seem to have to do this every decade or so.) In our paper, we examine both the efficacy of such a system and its potential security failures, and conclude that it’s a really bad idea.

  • The Open Source Security Foundation receives $ 10 million in funding - itsfoss.net

    The Linux Foundation has announced a $ 10 million commitment to the OpenSSF (Open Source Security Foundation), an effort to improve the security of open source software. Funds raised through royalties from parent companies of OpenSSF, including Amazon, Cisco, Dell Technologies, Ericsson, Facebook, Fidelity, GitHub, Google, IBM, Intel, JPMorgan Chase, Microsoft, Morgan Stanley, Oracle, Red Hat, Snyk, and VMware …

Videos/Shows: Ubuntu 21.10, LHS, and Chris Titus

  • Ubuntu 21.10 - Full Review - Invidious

    Ubuntu 21.10 finally features the GNOME 40 desktop, better Wayland support, and more. In this video, I'll give you my thoughts on "Impish Idri" and we'll go over some of the new features. I'll talk about the installation process, Wayland changes,

  • LHS Episode #435: The Weekender LXXX

    It's time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. We'd love to hear from you.

  • Time to Rice and Make the Best Looking Desktop - Invidious

    We have our script that sets up the system... now we make our script to automatically make our desktop the best looking one out there!

today's howtos

  • Sourcing a file in Linux: Here are the basics of this important concept - TechRepublic

    Open source expert Jack Wallen explains the Linux source command and offers an example.

  • How to play Legion TD 2 on Linux

    Legion TD 2 is a tower defense game for Windows. It was developed and published by AutoAttack Games. Thanks to Proton, you’ll be able to play this game on Linux. Here’s how.

  • How to play Stick Fight: The Game on Linux

    Stick Fight: The Game is a physics-based online fighting game for PC. It was developed by Landfall West and published by Landfall. Here’s how you can enjoy Stick Fight: The Game on Linux.

  • Setting up a ThinkPad x250 with Linux

    Two chapters in this article are Debian-specific, the rest is more or less Archlinux-specific. It never grew into the device-specific alround tutorial I envisioned and has been partially superseded by this article. The ThinkPad itself is in daily use. No regrets there!

  • How to Install Fish Shell on CentOS 8 and Rocky Linux 8 – VITUX

    Fish Shell also known as ‘Friendly interactive shell’ used for Unix/Linux-like operating distributions. It provides a smart, fully equipped, and user-friendly command-line environment for all Linux users. Fish shell supports various features unlike any other shell such as autosuggestion, Tab completion, syntax highlighting, Sane Scripting, Glorious VGA Color, and web-based configuration. Using this interactive shell environment, you do not need to remember a bunch of Linux commands because it is more productive and comes with various handy features. We will talk about the installation of interactive Fish Shell on CentOS 8 in this tutorial. The same steps apply to Rocky Linux and AlmaLinux too.

  • How to disable Special keys Windows 10 (Sticky keys) | ITIGIC - TechStony

    They are keys that exist since the first versions of Windows and continue in the most recent versions, including Windows 10. Therefore, we are going to tell you what the special keys or Sticky Keys consist of and how to deactivate them because you have already tired of having them in your computer (or because they hinder you).

  • How to install Devuan(II) - Unixcop

    In this article I show how to install Devuan using the installer included in the desktop-live iso, refractainstaller. In a previous article I’ve showed how to install it using the net-install ISO. From the devuan site: Devuan GNU+Linux is a fork of Debian without systemd that allows users to reclaim control over their system by avoiding unnecessary entanglements and ensuring Init Freedom.

  • How to install and configure NextCloud on Centos 8 and LEMP

    In this guide, we are going to set up NextCloud on a Centos 8 server hosted with Nginx and php (LEMP stack). We will be using Mysql 8 and PHP 7.4 for this guide.This will also work for RHEL derivatives like Alma Linux 8, Rocky Linux 8 and RHEL 8. Nextcloud is an Open Source suite of client-server software for creating and using file hosting services. It is a a free self-hosted cloud storage solution similar to Dropbox, Google Drive, etc. With Nextcloud, you don’t have to worry about the pricey alternatives and since you will host your own files, you don’t have to worry about privacy or someone collecting your data.

Kernel: Paul E. Mc Kenney and New Stuff in Linux

  • Paul E. Mc Kenney: TL;DR: Memory-Model Recommendations for Rusting the Linux Kernel

    These recommendations assume that the initial Linux-kernel targets for Rust developers are device drivers that do not have unusual performance and scalability requirements, meaning that wrappering of small C-language functions is tolerable. (Please note that most device drivers fit into this category.) It also assumes that the main goal is to reduce memory-safety bugs, although other bugs might be addressed as well. Or, Murphy being Murphy, created as well. But that is a risk in all software development, not just Rust in the Linux kernel. Those interested in getting Rust into Linux-kernel device drivers sooner rather than later should look at the short-term recommendations, while those interested in extending Rust's (and, for that matter, C's) concurrency capabilities might be more interested in the long-term recommendations.

  • Verification Challenges

    You would like to do some formal verification of C code? Or you would like a challenge for your formal-verification tool? Either way, here you go!

  • Cluster Scheduler Support Queued Ahead Of Linux 5.16 - Phoronix

    Cluster scheduler support has been queued up for landing in the Linux 5.16 kernel for AArch64 and x86_64 systems for improving the CPU scheduler behavior for systems that have clusters of CPU cores. The cluster scheduler support in this context is about enhancing the Linux kernel's scheduler for systems where sets of CPU cores share an L2 cache or other mid-level caches/resources. This cluster scheduler work stems from work by HiSilicon and Huawei aiming to improve the Linux performance for the Kunpeng 920 server chip. That HiSilicon SoC has six or eight clusters per NUMA node with four CPU cores per cluster and a shared L3 cache. With the cluster scheduler patches they were able to enhance the overall performance of the system and also improve the efficiency.

  • AMD Finally Enabling PSR By Default For Newer Hardware With Linux 5.16 - Phoronix

    With it getting late into the Linux 5.15 kernel cycle, the focus is shifting by the Direct Rendering Driver maintainers from new feature work targeting the next cycle (5.16) to instead on bug fixes. AMD sent out a pull request of new AMDGPU Linux 5.16 material this week that is primarily delivering bug fixes but one notable addition is finally enabling PSR by default for newer GPUs.

  • Intel Compute-Runtime 21.41.21220 Ships Updated DG1 Support - Phoronix

    Intel's open-source engineers have shipped Compute-Runtime 21.41.21220 as the newest version of this Linux compute stack enabling OpenCL and Level Zero support with their graphics processors. Intel Compute-Runtime 21.41.21220 is the latest weekly update for this compute stack. New this week is updated DG1 platform support and Level Zero support for SPIR-V static module linking.

Un-Googled Chromium and PDF Editor for Google Chrome

Filed under
Google
Web
  • Un-Googled Chromium update for Slackware 14.2 and -current | Alien Pastures

    After nearly two weeks of pulling my hair out I finally was able to build the newest Chromium in its un-Googled variant. You can find packages for Slackware 14.2 and -current in my repository on slackware.nl.

    It’s a jump from the 92 to the 94 release (94.0.4606.81 to be precise) but I simply did not have the opportunity to build a 93 release. In part because the un-googled repository maintained by Eloston did not offer release tarballs for a while. Extended leave of absence of the maintainer seems to be the issue which by now has been resolved by giving more people commit access to that repository.

    The un-Googled version of Chromium is incapable of “phoning home” to Google, by altering the source code and stripping/mangling all occurrences where that might happen. This is basically what Eloston’s project does.

  • Adobe Gives a Free PDF Editor for Google Chrome and Edge Users

    Adobe announced via a blog post that Acrobat extension for Google Chrome and Microsoft Edge now have basic PDF editing features, right inside the browser.

today's leftovers

Filed under
Misc
  • Excuse me, your memory is leaking. GNOME Software running in the background, taking hundreds of MB of RAM.

    So I noticed today that GNOME software is constantly running in the background taking up to 435 MB of RAM.

    It does that (very) occasionally, unpredictably. I can’t figure out why. Usually, it’s only taking 30-60 MB.

    Obviously that’s a bit much for a program that’s only job is sitting there and telling me when updates are available or waiting for me to install a program, and obviously there are leaks, and indeed, all you apparently need to do is run valgrind on it and it will find some.

  • Tender to implement C++ accessibility tests (#202110-01)

    The Document Foundation (TDF) is the charitable entity behind the world’s leading free/libre open source (FLOSS) office suite LibreOffice.

    We are looking for an individual or company to implement C++ accessibility tests.

    The work has to be developed on LibreOffice master, so that it will be released in the next major version.

    The current accessibility tests are rather incomplete and hard to maintain. Additionally, they are written in Java.

  • Framework MarketPlace lets you buy replacement parts, expansion cards for the modular Framework Laptop

    The Framework Laptop is a thin and light notebook with a 13.5 inch display and an Intel Tiger Lake processor. But what really makes the notebook stand out is its modular design and emphasis on repairability and customization.

    When the Framework laptop went up for pre-order earlier this year, customers could choose from a couple of different configuration options. But now Framework has launched a Marketplace, which were you purchase Expansion Cards to further customize the laptop, as well as replacement parts that let you swap out keyboards, batteries, displays, and even motherboards and processors.

PostgreSQL Leftovers

Filed under
Server
  • pg_partman 4.6.0 released

    PostgreSQL Partition Manager (pg_partman) v4.6.0 has been released.

  • PostgreSQL: PGConf NYC 2021 Sessions Announced, Last Week for Early Bird!

    The first community PostgreSQL conference in many months is coming to New York City in less than two months! PGConf NYC is a non-profit, community-run and PostgreSQL community recognized conference being run by the United States PostgreSQL Association (PgUS).

    PGConf NYC delivers two days packed with presentations about PostgreSQL and related technologies, as well as the usual hallway and social track. PGConf NYC is being held December 2nd and 3rd, 2021 in New York City.

  • Psycopg 3.0 released

    I am extremely excited to announce the first stable release of Psycopg 3!

    Psycopg 3 is a complete rewrite based on the experience accumulated with the development and maintenance of psycopg2. Psycopg 3 targets all the current versions of Python (3.6-3.10) and PostgreSQL (10-14) and allows the use of modern Python development techniques, such as async and statically typed code. A list of the new features is available in the documentation.

Programming Leftovers

Filed under
Development
  • abs function in C

    Why is it necessary for programmers to use the abs() function? It’s accessible in almost every programming language; But how much good is a function that just turns negative values into positive ones? You may find yourself wanting positive numbers occasionally, and the abs() function ensures that you will get them. The abs function is an abbreviation for “Absolute Value” inside the C programming language, and it specifies the distance of a number just on a number line beginning from 0 without taking the direction into account. The abs value of a number, or its absolute value, has always been positive, implying that a distance could never be negative.
    The abs () method returns the absolute appropriate value integers and is specified in the stdlib.h header file. To return the absolute value of a particular number, we must include the stdlib.h header file in our C application. Only positive values are returned by the abs() function.

    Consider the following scenario: If we have an integer number -2 and wish to find the absolute value, we may use the abs() method to have the positive number 2. In addition, when we have an integer number 2 and want to determine the absolute value, we can use the abs() method to return the very same value as 2. It gives the very same number if we provide it with any positive number.

  • Printf-style debugging using GDB, Part 2

    The first article in this series introduced the GNU debugger, GDB, and in particular its dprintf command, which displays variables from programs in a fashion similar to C-language printf statements. This article expands on the rich capabilities of printf-style debugging by showing how to save commands for reuse and how to save the output from the program and GDB for later examination.

  • Python Wrapper to find all primes from a given interval via sieve of Eratosthenes released as C++ procedure
  • Intel Contributes AVX-512 Optimizations To Numpy, Yields Massive Speedups - Phoronix

    Intel has contributed AVX-512 optimizations to upstream Numpy. For those using Numpy as this leading Python library for numerical computing, newer Intel CPUs with AVX-512 capabilities can enjoy major speed-ups in the range of 14~32x faster.

    This summer Intel volleyed their initial AVX-512 code for Numpy and finally this week the code was merged upstream. This open-source AVX-512 code originates from the Intel Short Vector Math Library (SVML) that they open-sourced the code from. Intel has also been working on allowing Numpy to be built against SVML as a separate improvement.

  • TSV to CSV on the CLI (if you really have to)

    Regular visitors to this blog will know that I don't like the CSV format. It's awful. In my humble opinion, data workers should aim to use invisible tabs (TSV) or visible pipes (PSV) as field separators in delimited text tables. Sometimes, though, data workers are required to convert a perfectly good TSV or PSV to a CSV. What to do?

    I don't recommend opening the TSV or PSV in spreadsheet software and saving the result as a CSV, unless there are no leading or trailing quotes in the data items, or umatched quotes generally. The original quotes might well disappear in the saved CSV.

    There are a number of TSV-to-CSV programs for the command line. One is in Haskell, for example, and there also routines to do the job in Perl and Python. But if the individual fields in the TSV don't contain commas or quotes, the TSV-to-CSV conversion is simple — use tr:

  • Useful Bash Commands You May Not Know About

    Bash is a fairly powerful language to program in, and is also quite easy to start off with.

    After all, it's almost universally the shell you're going to see when you open up your terminal. That makes it extremely useful to get accustomed to.

    There's some powerful commands in Bash that you may not be aware of though, even if you're fairly seasoned with using the language. All of these commands can serve quite useful purposes though, and can make the shell scripts you write cleaner, more maintainable, and just outright more powerful than they could've been before.

Security Leftovers

Filed under
Security
  • 10 Most Commonly Used FOSS Packages

    The Core Infrastructure Initiative Census Program II report released earlier this year identified the most commonly used FOSS components in production applications, with the goal of understanding potential vulnerabilities in these components and better securing the open source software supply chain.

  • Don’t penalise cybersecurity researchers!

    We wrote to the Indian Computer Emergency Response Team regarding a provision in their new Responsible Vulnerability Disclosure and Coordination Policy that penalises cybersecurity researchers for vulnerability disclosures. In our representation, we highlighted how such provisions would create an atmosphere in which researchers would be reluctant about reporting vulnerabilities and recommended that a robust disclosure mechanism be implemented that protects researchers from harm.

    [...]

    Such provisions contribute to a disclosure regime in which security researchers would be liable under the Information Technology Act, 2000 (‘IT Act’), and are penalised for disclosures of genuine security vulnerabilities. Section 43 of the Information Technology Act, 2000 penalizes anyone who gains unauthorized access to a computer resource without permission of the owner, and so fails to draw a distinction between malicious hackers and ethical security researchers. Thus, even when researchers have acted in good faith they may be charged under the IT Act. As we have mentioned earlier, companies have exploited this loophole in the said provision to press charges against cybersecurity researchers who expose data breaches in their companies. The Personal Data Protection Bill, 2019, currently being considered by a Joint Parliamentary Committee, also fails to protect security researchers and whistleblowers. All of this leads to situations in which researchers are reluctant to report vulnerabilities for fear of being sued.

    Clause 7 of the Policy is also in conflict with the Information Technology (The Indian Computer Emergency Response Team and Manner of Performing Functions and Duties) Rules, 2013 (‘2013 IT Rules’) which adapts a cooperative and collaborative approach. Rule 10 requires CERT-IN to interact with stakeholders including research organisations and security experts for preventing cyber security incidents. Under Rule 11(2), CERT-IN is obligated to collaborate with, among others, organisations and individuals engaged in preventing and protecting against cyber security attacks. Thus, by imposing complete and sole responsibility on cyber security researchers for actions undertaken during the discovery of a vulnerability, the policy is in conflict with the collaborative spirit of the 2013 IT Rules and so is a genuine impediment to effective collaboration.

  • Airline Passenger Mistakes Vintage Camera for a Bomb

    Back in 2007, I called this the “war on the unexpected.” It’s why “see something, say something” doesn’t work. If you put amateurs in the front lines of security, don’t be surprised when you get amateur security. I have lots of examples.

  • How to create an effective security policy: 6 tips

    Are your security policies boring? OK, that’s not entirely fair. Security policies are boring, especially to people outside of IT – in the way that children find their parents’ or teachers’ rules “boring.” There’s a limit to how interesting one can make “best practices for creating strong passwords” sound to the masses.

    The point of such policies is to educate people on organizational rules and the habits of good security hygiene. This is the administrative layer of security controls: all of the rules, standards, guidelines, and training an organization puts in place as part of its overall security program. It’s the human-focused component that rounds out the other two general categories of security controls, according to Terumi Laskowsky, an IT security consultant and cybersecurity instructor at DevelopIntelligence. The other two categories are technical/logical controls (your hardware and software tools) and physical controls (things like building or site access).

    Laskowsky notes that people tend to question the value of administrative controls. That’s partly because it can be difficult to measure or “see” their effectiveness, especially relative to technical or physical controls. But Laskowsky and other security experts generally agree that they are necessary. Security is not a steady-state affair – while our security tooling and processes are becoming more automated, a strong posture still requires human awareness, intelligence, and adaptability.

    “Raising our security awareness through administrative controls allows us to start seeing the patterns of unsafe behavior,” Laskowsky says. “We can then generalize and respond to new threats faster than security companies can come up with software to handle them.”

IBM, Red Hat, and AlmaLinux

Filed under
Red Hat
  • Kube by Example expands training curriculum with new learning paths for Kubernetes developers

    We see Kubernetes as the foundation for hybrid cloud, and hybrid cloud as the future of IT. The technology remains among both the most loved and most wanted tools in this year’s Stack Overflow Developer survey. Given its prevalence and strategic importance, we have also seen developers seeking out and engaging with Kubernetes-focused training resources like Kube by Example, an online destination for free Kubernetes-focused tutorials, news and community interaction.

    As the company behind the industry’s leading enterprise Kubernetes platform, Red Hat has backed Kube by Example and is diligently working to establish it as the premier destination for developers and operators to sharpen their Kubernetes skills in a hands-on environment.

  • Celebrating Ada Lovelace with 4 career lessons from women in technology

    Ada Lovelace is known as the first computer programmer. Mainly known for her work with Charles Babbage’s Analytical Engine in the 1800s, she was the first to recognize that the machine could do more than simple calculation — that it could follow a set of instructions (a program) to perform tasks. While Babbage’s computer was never built, Lovelace is credited with writing up an algorithm to be carried out by such a machine. Now, every year in mid-October, we celebrate women tech pioneers on Ada Lovelace Day.

  • Igor Seletskiy Steps Down to Assure AlmaLinux Independence - FOSS Force

    Today Igor Seletskiy, co-founder and CEO of CloudLinux, announced that he’s stepped down from his role as chairman of the board at the AlmaLinux Foundation, and is also vacating his seat on the board of directors.

    The foundation, which he started earlier this year, produces AlmaLinux, a drop-in replacement for Red Hat’s CentOS Linux that Seletskiy announced in December, shortly after Red Hat said it was moving the Linux distribution from its traditional role as a downstream clone of Red Hat Enterprise Linux to sit upstream as RHEL’s “nightly build.”

    A replacement was needed because many organizations, including many Fortune 500 enterprises, use CentOS in production as a way to take advantage of RHEL’s stability without having to pay for support contracts.

    Both Seletskiy and the AlmaLinux Foundation are very clear there’s no palace intrigue behind this move. The new distro’s founder is stepping down not because of some power struggle within the organization, but because he wants the distro he birthed to have a life of its own as an independent project.

  • Why can't I use sudo with rootless Podman?

    I was recently asked: Why can't I run rootless Podman containers when I log into a user via sudo or su? The problem is a bit complex to explain, so I'll start with an example.

  • Digital transformation: 3 myths the pandemic busted

    When the pandemic struck, most organizations had no choice but to accelerate their digital technology adoption. Many condensed into a matter of months what might otherwise have been years of consideration, strategizing, and change.

    According to a survey by McKinsey, the pandemic sparked a seven-year increase in the rate at which companies developed digital or digitally enhanced offerings. It accelerated the digitization of their customer and supply-chain interactions and internal operations by three to four years.

    This shift sparked a new reality for today’s organizations to remain competitive and meet customers’ changing needs. But while enterprises have certainly dedicated more resources to the process of digital transformation, many misconceptions still remain.

Archcraft October Release Available

Filed under
GNU
Linux

New ISO of Archcraft is now available to download.

Many users faced issues with the September release, due to the bug in the installer. However it was not a big issue and can be fixed easily, But there are people who are completely new to Linux in general. So, this release belongs to them. This release fixes every issue on the previous release.

Read more

Kernel: Performance, Chinese Hardware, and DAMON

Filed under
Linux
  • 7.4M IOPS Achieved Per-Core With Newest Linux Patches - Phoronix

    Linux block subsystem maintainer and lead IO_uring developer Jens Axboe had a goal of hitting 7M IOPS per-core performance this week. On Monday he managed to already hit 7.2M IOPS and today hit 7.4M IOPS with his latest work-in-progress kernel patches.

    This month Jens Axboe has been making some remarkable improvements to the Linux block code for squeezing out every bit of I/O potential of the system. Yesterday Jens Axboe was hitting 7.2M IOPS with new persistent DMA map patches that also shaved off around 10% of synchronization latency.

  • Loongson Volleys Latest Patches For LoongArch Linux Support - Phoronix

    Chinese vendor Loongson continues working on their Linux kernel patches enabling the LoongArch processor ISA as their fork from MIPS. While early on when copying existing MIPS open-source code they were quick to call their new ISA "not MIPS", in these later patch series they continue to refer to their ISA as "a bit like MIPS or RISC-V."

    LoongArch debuted this summer with their Loongson 3A5000 processors and since then their engineers have been working to get the LoongArch support into the mainline kernel. Loongson though has ruffled some feathers of the upstream kernel developers with in some areas just copying existing MIPS code.

  • DAMON Extended To Offer Physical Memory Address Space Monitoring - Phoronix

    One of many exciting additions with the forthcoming Linux 5.15 kernel is DAMON landed as a data access monitoring framework. DAMON opens up new possibilities around proactive reclamation of system memory and other interesting features. Currently though it's limited to monitoring the virtual address space of the kernel but a new set of patches out allow for physical address space monitoring as well.

Graphics: OpenCL, Mesa, Vulkan

Filed under
Graphics/Benchmarks
  • Portable Computing Language 1.8 Released For OpenCL On CPUs, Other Accelerators - Phoronix

    PoCL is the open-source project implementing OpenCL for CPU-based execution as well as multi-device support by getting its Portable Computing Language implementation working atop NVIDIA GPUs via CUDA, AMD GPUs via HSA, and other back-ends by way of LLVM. PoCL 1.8 is out today as the newest feature release.

  • Mesa 21.3 Fixes Issue Of Some Games Having Transparency Issues Under Wayland - Phoronix

    Landing in time for the imminent Mesa 21.3 feature freeze / code branching is support for the EGL_EXT_present_opaque extension on Wayland. While this EGL extension may not sound too exciting, for some OpenGL games on Wayland it will address some transparency issues.

    The issue stems from this issue ticket opened during the summer by game porter Ethan Lee. The issue is around needing an EGL equivalent to VkCompositeAlphaFlagBitsKHR as "we've got a whole lot of games that are unintentionally translucent in Wayland." Portal 2 is among the games as a result having issues under native Wayland.

  • Vulkan 1.2.196 Introduces H.265 Encode Extension - Phoronix

    Arriving back in April were the initial Vulkan Video extensions that included support for video decode of H.264 and H.265 while the initial video encode support was limited to H.264. Out today with Vulkan 1.2.196 is the new extension allowing for H.265 encoding with this new industry-standard video API.

    Vulkan 1.2.196 introduces the provisional VK_EXT_video_encode_h265 extension. This extension was worked on by AMD, Intel, and NVIDIA but at least under Linux only the NVIDIA proprietary driver currently exposes Vulkan Video encode/decode support. Presumably this morning NVIDIA will be issuing a new Vulkan beta driver providing timely support for this new H.265 encode provisional extension.

AMD Radeon RX 6600 Linux Performance

Filed under
Graphics/Benchmarks

Today AMD is officially launching the Radeon RX 6600 graphics card as a trimmed down model from the Radeon RX 6600 XT that launched back in August. This new (non-XT) model has a suggested price of $329 USD and here is a look at how well this RDNA2 graphics card is performing under Linux.

The AMD Radeon RX 6600 graphics card features 28 compute units, 1792 stream processors, a 2044MHz game clock with up to 2491MHz boost clock, 8GB of GDDR6 video memory, and 32MB infinity cache.

Read more

Adobe Gives a Free PDF Editor for Google Chrome and Edge Users

Filed under
Linux
News

Adobe announced via a blog post that Acrobat extension for Google Chrome and Microsoft Edge now have basic PDF editing features, right inside the browser.
Read more

Sparky 2021.10

Filed under
GNU
Linux
Debian

Sparky 2021.10 of the (semi-)rolling line is out; it is based on Debian testing “Bookworm”.

This iso update provides:
– all packages upgraded as of October 12, 2021
– Linux kernel 5.14.9
– Calamares 3.2.44.3
– i386 libs removed from amd64 iso images
– small improvements

No reinstallation is required if you installed Sparky 2021.09, simply keep it up to date.

Read more

Microsoft and CNET confuse users with fake “This PC can’t run Windows 11” errors. Suggest buying a completely new computer.

Filed under
GNU
Linux
Microsoft

Microsoft and CNET confuse users with fake “This PC can’t run Windows 11” errors. Suggest buying a completely new computer.

Mostly, if your machine doesn’t have “Security Theater Boot” and the “Toilet Paper Module” (I jest.) available to be turned on, you need to buy another computer.

Except that you don’t. You could format Windows off your computer entirely and go on happily using GNU/Linux for many more years without fake incompatibility messages from your pals at Microsoft and Intel, where sales have been in the dumps and they need fake error messages to drive new sales.

Read more

Games: Warp Frontier, Space Crew: Legendary Edition, No Longer Home, Doom Fighters

Filed under
Gaming
  • Space sci-fi point and click adventure Warp Frontier releases for Linux in November | GamingOnLinux

    Developed Brawsome emailed to note that their space sci-fi adventure Warp Frontier will be releasing for Linux (and macOS) in November following the Windows release in late September.

    Warp Frontier is a 2D point and click adventure set in the year 2215, in orbit around humanity's newest extrasolar colony. It follows the story of war hero turned cop, Vincent Cassini, and his robot partner Mac, as they investigate the cover-up of a war crime by an old enemy that stole the lives of thousands, including his wife and best friend. The game has a particularly Australian flavour in both the writing and the voice cast, including the talents of Kevin Powe (Dead Static Drive), Aimee Smith (Eastern Market Murder), and Angela Tran (The Lake). The game also features an original soundtrack by Thomas Regin (Unavowed).

  • Space Crew: Legendary Edition releases as a free expansion on October 21 | GamingOnLinux

    Curve Digital and Runner Duck have together announced that Space Crew: Legendary Edition will arrive on October 21 as a free expansion to the base game with a ton of new content.

    Planned content includes a new "epic" Android Ambush campaign, the ability to take crew off-ship onto stations, outposts and new vessels in Away Team missions. There will also be a new star-system to explore with new missions as well as a range of special features and gameplay experiences.

  • Magical realist point and click adventure No Longer Home now on Linux | GamingOnLinux

    After the initial release back in July, No Longer Home from Humble Grove and Fellow Traveller has launched the Linux version. Funded on Kickstarter back in 2018, the original plan was to have Linux support so it's good to see it land.

    Based upon the real life experiences of the developer, where they were forced apart so they decided to stay in touch and make a game together. Here's what the story entails: "Bo and Ao are graduating university and preparing to leave the flat they’ve lived in together for a year. Thanks to visa limitations, Ao is forced to return to Japan, leaving Bo in England. Disillusioned by post-educational life and shoved aside by a government who doesn’t want them there, both are trying to come to terms with their uncertain futures. And deep under their South London flat, something grows..."

  • Doom Fighters turns the classic Doom II into a beat 'em up | GamingOnLinux

    Doom mods do a lot of things from small adjustments to total conversions and Doom Fighters is one of the most interesting I've seen recently that turns Doom II into a beat 'em up.

    Released on October 10 is genuinely a surprise. Giving you a 3D character model for Doomguy, you run around and beat up monsters. You get to punch, kick, grab enemies, fly away with them and more. The developer mentioned they do plan to expand the game to include powerful execution moves, alternate deaths, weapons and destructible environments. Sounds like multiplayer will be sorted eventually too.

  • Competitive action-puzzler Petal Crash Online arrives on Steam as a free update | GamingOnLinux

    Petal Crash Online is the free update to the original Petal Crash, a block-matching game where you push blocks around and smash them together to score points. It's pretty great actually. A genre of games that isn't overly popular on PC but this is easily one of the best.

    This new online mode was first launched on itch.io as a separate game but folks on Steam now have it free as an update download with it now giving you the option to play the original or the online mode when you launch it. The online client was built ground the ground-up to support rollback net-code for nicely synced matches.

today's howtos

Filed under
HowTos
  • How To Enable Virtual Emulated Desktop On Proton Steam On Ubuntu Linux! - Fosslicious

    Proton is an application released by Valve that is used to run Windows Operating System Games on Linux. We can install this application via Steam.

    To see a list of games that can be run on Proton, please visit ProtonDB. There are also some discussions posted by users regarding problems when running games using Proton.

    Proton was developed from Wine. So, some features of Wine can be used in this application. One of them is Virtual Emulated Desktop.

  • How To Install Snap on Linux Mint 20 - idroot

    In this tutorial, we will show you how to install Snap on Linux Mint 20. For those of you who didn’t know, Snap is a package management system for installing and managing applications (called Snaps) developed by Cananoical for Linux operating systems. The system is designed to work for the internet of things, cloud and desktop computing.

    This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of Snap on a Linux Mint 20 (Ulyana).

  • Install Docker and Portainer - blackMORE Ops

    Docker is a set of platform as a service (PaaS) products that use OS-level virtualization to deliver software in packages called containers. Containers are isolated from one another and bundle their own software, libraries and configuration files; they can communicate with each other through well-defined channels. Because all of the containers share the services of a single operating system kernel, they use fewer resources than virtual machines. The service has both free and premium tiers. The software that hosts the containers is called Docker Engine.

    Portainer CE is a lightweight ‘universal’ management GUI that can be used to easily manage Docker, Swarm, Kubernetes and ACI environments. It is designed to be as simple to deploy as it is to use. Portainer consists of a single container that can run on any cluster. It can be deployed as a Linux container or a Windows native container. Portainer allows you to manage all your orchestrator resources (containers, images, volumes, networks and more) through a super-simple graphical interface. A fully supported version of Portainer is available for business use.

  • Learn Usage of chown (Change Ownership) Command in Linux

    Under Linux, the ownership of created or existing files and directories is associated with a specific Linux system user, group, or other (file/directory permission access types).

    However, files or directories ownership verdicts are not final as it is possible to chown (Change Ownership) of any file and/or directory within the Linux operating system.

  • Learn Usage of chgrp (Change Group) Command in Linux

    If you are reading this article on the chgrp command, there is a high chance you have explored all the depths of Linux’s chown command and chmod command.

  • Linux Essentials: Background (bg) and Foreground (fg) - Invidious

    In this episode of Linux Essentials, we'll take a look at how to send tasks to the background, and then bring them to the foreground.

Audiocasts/Shows: LINUX Unplugged, mintCast, Linux in the Ham Shack

Filed under
GNU
Linux
  • Life Changing Virtualization | LINUX Unplugged 427

    Wimpy stops by with a new tool that will change your virtualization game, and we share our thoughts on Ubuntu 21.10 and take the flavor challenge.

  • mintCast 371.5 – Minus One

    1:37 Linux Innards
    35:41 Vibrations from the Ether
    50:04 Check This Out
    53:53 Announcements & Outro

  • LHS Episode #434: Linux Install Media Deep Dive

    Hello and welcome to the 434th installment of Linux in the Ham Shack. In this episode, the hosts discuss creating bootable images to start your computer with Linux or install the operating system. Discussion ranges from CDs to DVDS, USB flash drives and Micro SD cards. Also touched on are persistence, running distros from install media, dual booting and more. We hope you enjoy this episode and come back for the next one. Have a great week.

25 ways you can contribute to KDE

Filed under
KDE

In honor of KDE’s impending 25th birthday tomorrow, here are 25 ways you can get involved to help make KDE software the best in the world!

Read more

today's leftovers

Filed under
Misc
  • Donation campaign: "Framasoft, it’s also…"

    The campaign is named "Framasoft, it’s also…" and communicate in a playful way (a card game) their actions in the digital world, but also in real-life. You can flip more than thirty illustrated cards to discover the org. You'll probably be surprised by the amount of what they manage.

  • 7 Open-Source Software Options for Architects

    Open-source software is released under a specific license that gives users the right to download, use, or change the software and its source code. Unlike commercial software, which typically has a protected source code and proprietary file formats, open-source software projects are not profit-driven and encourage users to modify and share their code with the wider community. Often the goal of these projects is to develop applications that can accommodate multiple viewpoints and ways of working. Some well-known open-source projects include the Linux operating system, the WordPress web publishing platform, and the audio-editing application Audacity.

  • What can enterprises do about soaring technical debts?

    Over the last few decades, technical debts for multiple organizations are witnessing growth due to failed and non-planned tech projects architecture. According to OutSystem's latest research, technical debt is estimated to cost businesses $5 trillion in the next ten years. Thus, the IT debts have become the central focus, along with re-directing the analysis criteria of every project.

    [...]

    She says, "Refactoring code has to be a norm. Every spring I have certain cycles that I reserve for refactoring. The second thing required is fearless developers who can fix the bugs when necessary. Also, retiring legacy systems needs to be addressed as they can pose a threat to security. So, we make sure to retire from the things which don't make sense anymore."

  • Apple II Programming: From A Cabin In The Woods

    Adam: Hello, and welcome to CoRecursive. I’m Adam Gordon Bell. Each episode, a guest shares the story behind a piece of software being built. Today’s episode is about remote work. Well, sort of. I’ve been working from my home office for almost exactly 10 years now. And when everyone started working from home, I felt like I had some tips to share, like to break up the Zoom meetings you can just go for walking meetings. Just call in on your phone. It makes a big difference. But I’m not totally sure we figured out all that remote work can be. So I found someone who has something to teach me about remote work. I think that he might be the original remote software developer. He left California behind for a lower cost of living in Oregon. And from Oregon, he developed software for Apple. But the kind of surprising thing is he did this all in 1976. And he did it so well he became rich and even briefly quite famous.

    Paul: That’s 60s artist, whose name escapes me, said everybody is famous for 15 seconds. I was famous for slightly longer than that. But during that time, it was nuts. People would show up and try to ask for autographs and stuff. It was weird. I mean, it never occurred to me that people would want the autographs of a computer programmer. I mean, that’s just not like the normal, famous person kind of an image I have in my mind.

    Adam: That was Paul Lutus. He built Apple Writer for the Apple II. And he thinks there’s something that we, as a profession, are missing, something that we’ve forgotten. But to understand his story and how he got on the front page of the Wall Street Journal, how he got interviewed for national TV programs and all for writing software, we need a little background.

  • Tilde expansion in Rust

    In several of my personal projects I have a need for tilde expansion, which means taking a filename such as ~/foo and expanding the tilde into the current user’s home directory. For me, that would result in /home/liw/foo. This is ubiquitous in Unix, and now unknown elsewhere. The usual tilde syntax is a little more complex than that: one can refer to another user’s home directory as well.

  • Red Hat Is Hiring Another Linux Developer To Work On GPU Hardware Enablement - Phoronix

    Red Hat already employs numerous open-source graphics driver developers from DRM subsystem maintainer David Airlie to numerous others on his team working on areas from Mesa OpenCL support to Heterogeneous Memory Management to other user and kernel-space improvements for open-source Linux graphics. Red Hat has now put out a call to hire yet another experienced Linux GPU driver developer.

  • IBM Attempts An Uncrewed Atlantic Crossing (Again) | Hackaday

    IBM and a non-profit company, ProMare, failed to send their 49-foot Mayflower autonomous ship across the Atlantic back in June. Now they are almost ready to try again. The Mayflower will recreate the path of its more famous namesake.

    The total voyage is set to take a month, but the last attempt developed mechanical problems after three days. Now they are running more sea trials closer to shore before attempting another crossing in 2022.

Hardware Leftovers

Filed under
Hardware
  • CAN communication on the Raspberry PI with SocketCAN

    Looking for a way to connect your Raspberry PI to a Controller Area Network (CAN) bus? With the help of the low-cost Waveshare RS485/CAN hat, you can augment your Raspberry PI such that it can communicate with the traffic on the CAN bus. This article explains how to configure the Waveshare RS485/CAN hat as a SocketCAN interface on your Raspberry PI.

  • Engaging Black students in computing at school — interview with Lynda Chinaka
  • The Beauty Of Dance, Seen Through The Power Of Touch | Hackaday

    This platform, which is called Kinetic Soul, uses Posenet computer vision to track a dancer’s movements. Posenet detects the dancer’s joints and creates a point map to determine what body parts are moving where, and at what speed. Then the system translates and transmits the movements to the 32 pins on the surface, creating a touchable picture of what’s going on. Each 3D-printed pin is controlled with a solenoid, all of which are driven by a single Arduino.

  • Sinclair Pocket TV Teardown | Hackaday

    A pocket-sized TV is not a big deal today. But in 1983, cramming a CRT into your pocket was quite a feat. Clive Sinclair’s TV80 or FTV1 did it with a very unique CRT and [Dubious Engineering] has a teardown video to show us how it was done.

    A conventional CRT has an electron gun behind the screen which is why monitors that use them are typically pretty thick. The TV80’s tube has the electron gun to the side to save space. It also uses a fresnel lens to enlarge the tiny image.

  • Bendable Colour EPaper Display Has Touch Input Too | Hackaday

    The Interactive Media Lab at Dresden Technical University has been busy working on ideas for user interfaces with wearable electronics, and presents a nice project, that any of us could reproduce, to create your very own wearable colour epaper display device. They even figured out a tidy way to add touch input as well. By sticking three linear resistive touch strips, which are effectively touch potentiometers, to a backing sheet and placing the latter directly behind the Plastic Logic Legio 2.1″ flexible electrophoretic display (EPD), a rudimentary touch interface was created. It does look like it needs a fair bit of force to be applied to the display, to be detectable at the touch strips, but it should be able to take it.

Syndicate content

More in Tux Machines

Security Leftovers

  • Security updates for Friday

    Security updates have been issued by Debian (squashfs-tools, tomcat9, and wordpress), Fedora (openssh), openSUSE (kernel, mbedtls, and rpm), Oracle (httpd, kernel, and kernel-container), SUSE (firefox, kernel, and rpm), and Ubuntu (linux-azure, linux-azure-5.4).

  • Apache Releases Security Advisory for Tomcat   | CISA

    The Apache Software Foundation has released a security advisory to address a vulnerability in multiple versions of Tomcat. An attacker could exploit this vulnerability to cause a denial of service condition.

  • Security Risks of Client-Side Scanning

    Even before Apple made their announcement, law enforcement shifted their battle for back doors to client-side scanning. The idea is that they wouldn’t touch the cryptography, but instead eavesdrop on communications and systems before encryption or after decryption. It’s not a cryptographic back door, but it still a back door — and brings with it all the insecurities of a back door. I’m part of a group of cryptographers that has just published a paper discussing the security risks of such a system. (It’s substantially the same group that wrote a similar paper about key escrow in 1997, and other “exceptional access” proposals in 2015. We seem to have to do this every decade or so.) In our paper, we examine both the efficacy of such a system and its potential security failures, and conclude that it’s a really bad idea.

  • The Open Source Security Foundation receives $ 10 million in funding - itsfoss.net

    The Linux Foundation has announced a $ 10 million commitment to the OpenSSF (Open Source Security Foundation), an effort to improve the security of open source software. Funds raised through royalties from parent companies of OpenSSF, including Amazon, Cisco, Dell Technologies, Ericsson, Facebook, Fidelity, GitHub, Google, IBM, Intel, JPMorgan Chase, Microsoft, Morgan Stanley, Oracle, Red Hat, Snyk, and VMware …

Videos/Shows: Ubuntu 21.10, LHS, and Chris Titus

  • Ubuntu 21.10 - Full Review - Invidious

    Ubuntu 21.10 finally features the GNOME 40 desktop, better Wayland support, and more. In this video, I'll give you my thoughts on "Impish Idri" and we'll go over some of the new features. I'll talk about the installation process, Wayland changes,

  • LHS Episode #435: The Weekender LXXX

    It's time once again for The Weekender. This is our bi-weekly departure into the world of amateur radio contests, open source conventions, special events, listener challenges, hedonism and just plain fun. Thanks for listening and, if you happen to get a chance, feel free to call us or e-mail and send us some feedback. Tell us how we're doing. We'd love to hear from you.

  • Time to Rice and Make the Best Looking Desktop - Invidious

    We have our script that sets up the system... now we make our script to automatically make our desktop the best looking one out there!

today's howtos

  • Sourcing a file in Linux: Here are the basics of this important concept - TechRepublic

    Open source expert Jack Wallen explains the Linux source command and offers an example.

  • How to play Legion TD 2 on Linux

    Legion TD 2 is a tower defense game for Windows. It was developed and published by AutoAttack Games. Thanks to Proton, you’ll be able to play this game on Linux. Here’s how.

  • How to play Stick Fight: The Game on Linux

    Stick Fight: The Game is a physics-based online fighting game for PC. It was developed by Landfall West and published by Landfall. Here’s how you can enjoy Stick Fight: The Game on Linux.

  • Setting up a ThinkPad x250 with Linux

    Two chapters in this article are Debian-specific, the rest is more or less Archlinux-specific. It never grew into the device-specific alround tutorial I envisioned and has been partially superseded by this article. The ThinkPad itself is in daily use. No regrets there!

  • How to Install Fish Shell on CentOS 8 and Rocky Linux 8 – VITUX

    Fish Shell also known as ‘Friendly interactive shell’ used for Unix/Linux-like operating distributions. It provides a smart, fully equipped, and user-friendly command-line environment for all Linux users. Fish shell supports various features unlike any other shell such as autosuggestion, Tab completion, syntax highlighting, Sane Scripting, Glorious VGA Color, and web-based configuration. Using this interactive shell environment, you do not need to remember a bunch of Linux commands because it is more productive and comes with various handy features. We will talk about the installation of interactive Fish Shell on CentOS 8 in this tutorial. The same steps apply to Rocky Linux and AlmaLinux too.

  • How to disable Special keys Windows 10 (Sticky keys) | ITIGIC - TechStony

    They are keys that exist since the first versions of Windows and continue in the most recent versions, including Windows 10. Therefore, we are going to tell you what the special keys or Sticky Keys consist of and how to deactivate them because you have already tired of having them in your computer (or because they hinder you).

  • How to install Devuan(II) - Unixcop

    In this article I show how to install Devuan using the installer included in the desktop-live iso, refractainstaller. In a previous article I’ve showed how to install it using the net-install ISO. From the devuan site: Devuan GNU+Linux is a fork of Debian without systemd that allows users to reclaim control over their system by avoiding unnecessary entanglements and ensuring Init Freedom.

  • How to install and configure NextCloud on Centos 8 and LEMP

    In this guide, we are going to set up NextCloud on a Centos 8 server hosted with Nginx and php (LEMP stack). We will be using Mysql 8 and PHP 7.4 for this guide.This will also work for RHEL derivatives like Alma Linux 8, Rocky Linux 8 and RHEL 8. Nextcloud is an Open Source suite of client-server software for creating and using file hosting services. It is a a free self-hosted cloud storage solution similar to Dropbox, Google Drive, etc. With Nextcloud, you don’t have to worry about the pricey alternatives and since you will host your own files, you don’t have to worry about privacy or someone collecting your data.

Kernel: Paul E. Mc Kenney and New Stuff in Linux

  • Paul E. Mc Kenney: TL;DR: Memory-Model Recommendations for Rusting the Linux Kernel

    These recommendations assume that the initial Linux-kernel targets for Rust developers are device drivers that do not have unusual performance and scalability requirements, meaning that wrappering of small C-language functions is tolerable. (Please note that most device drivers fit into this category.) It also assumes that the main goal is to reduce memory-safety bugs, although other bugs might be addressed as well. Or, Murphy being Murphy, created as well. But that is a risk in all software development, not just Rust in the Linux kernel. Those interested in getting Rust into Linux-kernel device drivers sooner rather than later should look at the short-term recommendations, while those interested in extending Rust's (and, for that matter, C's) concurrency capabilities might be more interested in the long-term recommendations.

  • Verification Challenges

    You would like to do some formal verification of C code? Or you would like a challenge for your formal-verification tool? Either way, here you go!

  • Cluster Scheduler Support Queued Ahead Of Linux 5.16 - Phoronix

    Cluster scheduler support has been queued up for landing in the Linux 5.16 kernel for AArch64 and x86_64 systems for improving the CPU scheduler behavior for systems that have clusters of CPU cores. The cluster scheduler support in this context is about enhancing the Linux kernel's scheduler for systems where sets of CPU cores share an L2 cache or other mid-level caches/resources. This cluster scheduler work stems from work by HiSilicon and Huawei aiming to improve the Linux performance for the Kunpeng 920 server chip. That HiSilicon SoC has six or eight clusters per NUMA node with four CPU cores per cluster and a shared L3 cache. With the cluster scheduler patches they were able to enhance the overall performance of the system and also improve the efficiency.

  • AMD Finally Enabling PSR By Default For Newer Hardware With Linux 5.16 - Phoronix

    With it getting late into the Linux 5.15 kernel cycle, the focus is shifting by the Direct Rendering Driver maintainers from new feature work targeting the next cycle (5.16) to instead on bug fixes. AMD sent out a pull request of new AMDGPU Linux 5.16 material this week that is primarily delivering bug fixes but one notable addition is finally enabling PSR by default for newer GPUs.

  • Intel Compute-Runtime 21.41.21220 Ships Updated DG1 Support - Phoronix

    Intel's open-source engineers have shipped Compute-Runtime 21.41.21220 as the newest version of this Linux compute stack enabling OpenCL and Level Zero support with their graphics processors. Intel Compute-Runtime 21.41.21220 is the latest weekly update for this compute stack. New this week is updated DG1 platform support and Level Zero support for SPIR-V static module linking.