Language Selection

English French German Italian Portuguese Spanish

Advertisement

Programming/Development: Minicoin, GNU Gengetop and Python

Filed under
Advertisement
  • Building and testing on multiple platforms – introducing minicoin

    While working with large-scale (thousands of hosts), distributed (globally) systems, one of my favourite, albeit somewhat gruesome, metaphors was that of “servers as cattle” vs “servers as pets”. Pet-servers are those we groom manually, we keep them alive, and we give them nice names by which to remember and call (ie ssh into) them. However, once you are dealing with hundreds of machines, manually managing their configuration is no longer an option. And once you have thousands of machines, something will break all the time, and you need to be able to provision new machines quickly, and automatically, without having to manually follow a list of complicated instructions.

    When working with such systems, we use configuration management systems such as CFEngine, Chef, Puppet, or Ansible, to automate the provisioning and configuration of machines. When working in the cloud, the entire machine definition becomes “infrastructure as code”. With these tools, servers become cattle which – so the rather unvegetarian idea – is simply “taken behind the barn and shot” when it doesn’t behave like it should. We can simply bring a new machine, or an entire environment, up by running the code that defines it. We can use the same code to bring production, development, and testing environments up, and we can look at the code to see exactly what the differences between those environments are. The tooling in this space is fairly complex, but even so there is little focus on developers writing native code targeting multiple platforms.

    For us as developers, the machine we write our code on is most likely a pet. Our primary workstation dying is the stuff for nightmares, and setting up a new machine will probably keep us busy for many days. But this amount of love and care is perhaps not required for those machines that we only need for checking whether our code builds and runs correctly. We don’t need our test machines to be around for a long time, and we want to know exactly how they are set up so that we can compare things. Applying the concepts from cloud computing and systems engineering to this problem lead me (back) to Vagrant, which is a popular tool to manage virtual machines locally and to share development environments.

  • GNU Gengetopt - News: 2.23 released

    New version (2.23) was released. Main changes were in build system, so please report any issues you notice.

  • Abolishing SyntaxError: invalid syntax ...

    Do you remember when you first started programming (possibly with Python) and encountered an error message that completely baffled you? For some reason, perhaps because you were required to complete a formal course or because you were naturally persistent, you didn't let such messages discourage you entirely and you persevered. And now, whenever you see such cryptic error messages, you can almost immediately decipher them and figure out what causes them and fix the problem.

  • Sending email with EZGmail and Python
  • Creating and Importing Modules in Python

Programming/Development: GNU Releases, Bash, Python and JavaScript

Filed under
Advertisement
GNU

Programming: VIM, Python, Knative, Glibc and GCC

Filed under
Advertisement

Learn Linux Kernel Device Drivers With Linux Foundation Instructor Bill Kerr

Filed under
Advertisement
Linux

Bill Kerr has taught Linux Foundation courses in Linux Kernel internals, debugging, device drivers and application development for many years. He helped write the original Linux Foundation Training course materials and has been working with UNIX kernels for 35 years.

Read more

8 Ways to Write a Better Linux SysAdmin Job Posting

Filed under
Advertisement
GNU
Linux

Linux system administrators are in high demand these days and many hiring managers say they're having a hard time finding talent to fill their open positions. It's critical, then, for companies seeking skilled admins to hone their recruiting process in order to stay competitive – and this starts with writing an effective job posting.

Unfortunately, many companies aren't hitting the mark. Job postings for sysadmin positions are largely similar; they’re boring and generic, according to New York City-based recruiter Steve Levy.

Read more

Sourceforge Hijacks the Nmap Sourceforge Account

Filed under
Advertisement
Development

Hi Folks! You may have already read the recent news about Sourceforge.net
hijacking the GIMP project account to distribute adware/malware.
Previously GIMP used this Sourceforge account to distribute their Windows
installer, but they quit after Sourceforge started tricking users with fake
download buttons which lead to malware rather than GIMP. Then Sourceforge
took over GIMP's account and began distributing a trojan installer which
tries to trick users into installing various malware and adware before
actually installing GIMP.

Read more

Slashdot Burying Stories About Slashdot Media Owned SourceForge

Filed under
Advertisement
Development

If you’ve followed any tech news aggregator in the past week, you’ve probably seen the story about how SourceForge is taking over admin accounts for existing projects and injecting adware in installers for packages like GIMP. For anyone not following the story, SourceForge has a long history of adware laden installers, but they used to be opt-in. It appears that the process is now mandatory for many projects.

People have been wary of SourceForge ever since they added a feature to allow projects to opt-in to adware bundling, but you could at least claim that projects are doing it by choice. But now that SourceForge is clearly being malicious, they’ve wiped out all of the user trust that was built up over sixteen years of operating. No clueful person is going to ever download something from SourceForge again. If search engines start penalizing SourceForge for distributing adware, they won’t even get traffic from people who haven’t seen this story, wiping out basically all of their value.

Read more

SourceForge commits reputational suicide

Filed under
Advertisement
Development

Despite seeming reformed last year, SourceForge has been caught red-handed abusing the reputations of open source projects

Read more

SourceForge locked in projects of fleeing users, cashed in on malvertising [Updated]

Filed under
Advertisement
Development

The takeover of the SourceForge account for the Windows version of the open-source GIMP image editing tool reported by Ars last week is hardly the first case of the once-pioneering software repository attempting to cash in on open-source projects that have gone inactive or have actually attempted to shut down their SourceForge accounts. Over the past few years, SourceForge (launched by VA Linux Systems in 1999 and now owned by the tech job site company previously known as Dice) has made it a business practice to turn abandoned or inactive projects into platforms for distribution of "bundle-ware" installers.

Despite promises to avoid deceptive advertisements that trick site visitors into downloading unwanted software and malware onto their computers, these malicious ads are legion on projects that have been taken over by SourceForge's anonymous editorial staff. SourceForge's search engine ranking for these projects often makes the site the first link provided to people seeking downloads for code on Google and Bing search results.

And because of SourceForge's policies, it's nearly impossible for open-source projects to get their code removed from the site. SourceForge is, in essence, the Hotel California of code repositories: you can check your project out any time you want, but you can never leave.

Read more

[Ed: Why am I not surprised?]

Syndicate content

More in Tux Machines

GNU Parallel 20190922 ('Stallman') released

GNU Parallel 20190922 ('Stallman') has been released. It is available for download at: http://ftpmirror.gnu.org/parallel/ GNU Parallel is 10 years old next year on 2020-04-22. You are here by invited to a reception on Friday 2020-04-17. Read more

Top 20 Best NodeJs Frameworks For Developers in 2019

Over the past few years, the use of web applications has increased to a vast extent. Developers have been looking for such a platform that is both advanced and provides flexibility to develop a variety of web applications. NodeJs Frameworks have earned the credit to be the top selection by the developers. You wanna know why? It is because of the capability to build smart, scalable server-side network-based applications. Read more

Today in Techrights

today's leftovers

  • Linux Foundation Hosting Open Source Project on UAS Interoperability

    The Linux Foundation, a nonprofit technology consortium, plans to host the InterUSS Platform Open Source Project, which is designed to enable “trusted, secure and scalable” interoperability among unmanned aircraft system (UAS) service suppliers (USSs) to advance “safe, equitable and efficient” drone operations, the foundation has announced. Initial contributors include both industry and regulatory organizations: Wing, AirMap, Uber and the Swiss Federal Office of Civil Aviation. Similar to the evolution of cities, our skies are becoming busier with traffic, the Linux Foundation explains. In an effort to unleash innovation and ensure safety, aviation regulators around the world are implementing UAS traffic management to support increasing and diverse drone operations. Under UTM, a set of USSs (also known as U-Space Service Providers, or USPs) assists drone operators with conducting safe and compliant operations.

  • #CFSummit2019: Open Source Community Witnesses High-Velocity Of Change

    This time last week, The Hague, The Netherlands welcomed over 700 people all attending the 2019 European Cloud Foundry Summit. While last year, the theme was very much tailored around pushing enterprise-ready platform-as-a-service portfolio, as it continues to strike closer relationships with the world’s biggest cloud service providers, but this year, the summit took a more forward-thinking approach with its ‘Building the Future’ theme.

  • CEDIA 2019: Home Assistant Is an Open-Source Home Automation Platform, Uses Raspberry Pi
  • Homura Is A Windows Game Launcher For FreeBSD - Supports Steam, Origin, UPlay + More

    While FreeBSD doesn't see much in the way of game ports besides compatibility with open-source games/engines, FreeBSD's Linux binary compatibility layer for years has allowed running Linux games on FreeBSD and there is also Wine support for FreeBSD to handle Windows software. Thanks to those efforts, it's possible to make a FreeBSD gaming box. Homura is a newer open-source project focused on providing a Windows game launcher for FreeBSD systems. Homura is akin to CrossOver or Lutris and wraps around Wine/WineTricks and makes it easy to deploy various Windows games and gaming services under FreeBSD.

  • The Hardware FOSDEM Uses To Carry Out Linux Video Recordings Of Their Event

    Not only is FOSDEM one of the best open-source/Linux events in the world for those who make the journey each February to Brussels, but they also for years now have done a masterful job at recording the different talks and developer room sessions. Each year gets better both for the event itself as well as the video recordings even with FOSDEM operating on a very limited budget due to the event being free to attend. For those curious about the hardware/software setup powering their video setup, here's an interesting blog post.

  • Matplotlib titles have configurable locations – and you can have more than one at once!

    Just a quick post here to let you know about a matplotlib feature I've only just found out about.

  • Microsoft Operating Systems BlueKeep Vulnerability

    BlueKeep (CVE-2019-0708) exists within the Remote Desktop Protocol (RDP) used by the Microsoft Windows OSs listed above. An attacker can exploit this vulnerability to perform remote code execution on an unprotected system. According to Microsoft, an attacker can send specially crafted packets to one of these operating systems that has RDP enabled.[1] After successfully sending the packets, the attacker would have the ability to perform a number of actions: adding accounts with full user rights; viewing, changing, or deleting data; or installing programs. This exploit, which requires no user interaction, must occur before authentication to be successful.