Language Selection

English French German Italian Portuguese Spanish

OS

Exclusive: Zorin OS And Star Labs Team Up To Offer A Beautiful Linux Laptop Experience

Filed under
OS
Linux

It's no secret I'm impressed with Zorin OS 15. The polished and user-friendly distro is worth paying attention to, especially as a gateway for beginners into the world of desktop Linux. In what, until today, would have been a totally unconnected observation, I'm also thrilled that Star Labs has popped up on my radar. The UK-based Linux laptop company has a worthy challenger to the Dell XPS 13, and Star Labs is beginning to make waves in the dedicated Linux hardware space. As someone who appreciates the efforts of both these entities, I'm thrilled to exclusively report that they'll be joining forces.

Beginning this Friday June 21 at 3pm UK time, Star Labs will begin offering Zorin OS 15 as a pre-loaded option on their entire range of laptop, which currently consists of the Star LabTop Mk III and Star Lite. Zorin OS compliments existing OS options of Ubuntu and Linux Mint.

Read more

Wind River pumps new beans into embedded Linux

Filed under
OS
Linux
Hardware

It’s hard to know whether to pronounce software infrastructure company Wind River as wind (as in eaten too many beans, that thing that makes sails billow out) or wind (as in snakey, twisty) river.

It looks like its wind as in breezy mistrals on this link, so let’s go with that.

Whether it be winding or breezy, the company has this month updated its Wind River Linux with a release focused on ease of adoption of containers in embedded systems.

How do you make containers adoption easier? We’re glad you asked.

It’s all about offering pre-built containers, tools and documentation as well as support for frameworks such as Docker and Kubernetes.

Read more

Enso OS Makes Xfce Elementary

Filed under
OS
Reviews

The most impressive aspect of Enso OS is the tweaked desktop that combines a somewhat modified Xfce environment with key elements from Elementary OS. The result could be a better alternative to Xubuntu, depending on your computing preferences.

For an early beta release of a relatively new Linux distribution, Enso OS has much going for it. This distro also has numerous areas where the developer must grow the infrastructure.

Enso OS is clearly a distro that bears watching over the next few releases.

Read more

Huawei has an alternative for its Android alternative

Filed under
OS
Android

Following the US government trade ban last month, Huawei lost business ties with several American companies, including Google, dealing a huge blow to its Android smartphone business. The Chinese phonemaker is building an Android-based operating system of its own now. However, building an OS from the scratch is by no means an easy task. While it continues working on its OS, supposedly called HongMeng OS in China, the company is also exploring other options, in case it has to completely forego Android.

There aren’t many options out there, but Huawei still seems to have zeroed in on one of them. A report from Russia suggests that the Chinese company may make Aurora OS its Android alternative. Aurora OS is a Russian-made mobile OS based on the open-source Sailfish OS Linux distribution developed by Finnish company Jolla.

Read more

Wind River Linux adds Docker and Kubernetes support for the edge

Filed under
OS
Hardware

The latest version of Wind River Linux debuts an “OverC” container stack that eases integration of frameworks such as Docker and Kubernetes on edge devices. The Yocto-based embedded distro is available in open source and commercial versions.

When reading about the latest, container-friendly version of the market-leading commercial Wind River Linux distribution, we were struck by the mention of an open source version of the commercial distro available for download on GitHub. We wondered if this was a new development after Intel sold off Wind River to investment firm TPG last year, but a Wind River spokesperson informed us that the open source version has been available since 2017.

Read more

Also: Skylake box PC has 6x GbE with optional PoE and Myriad X support

5 Alternative Mobile Operating Systems To Android

Filed under
OS
Android

Android is dominating the mobile and there are no doubts regarding this. According to statistics, Android has a share of 75%, iOS has a share of 22% and remaining operating systems share the rest. We want to talk about these “remaining operating systems” which you probably have never heard of and you will perhaps want to have on your next phone.

Read more

Huawei’s “Oak OS” may arrive as early as August

Filed under
OS
Android

Google, meanwhile, has warned the US government of potential security risks regarding the blacklisting of Huawei. Apparently, the web giant is worried that Huawei will roll out an OS that would be less secure than Android. Huawei’s system is likely to have more bugs in it than Android, making its phones more susceptible to hacks. “Our focus is protecting the security of Google users on the millions of existing Huawei handsets in the US and around the world,” Financial Times quoted Google as saying.

The Oak OS will be an Android-based system (via the Android Open Source Project). While most of the existing Android apps should be compatible with the new OS, it won’t have the access to Google Play Store. Of course Huawei have its own app store, but can it bring all apps from the Play Store to its store is something to look forward to. Reportedly, Facebook is stopping Huawei from pre-installing its apps on the company’s upcoming phones, further compounding its problems.

Read more

PinePhone $149 Linux smartphone could support Ubuntu, Sailfish, Maemo, LuneOS and more

Filed under
OS
GNU
Linux
Gadgets

The PinePhone is a cheap, Linux-ready smartphone that’s expected to ship in limited quantities later this year. It’s not exactly a high-power device by modern smartphone standards, but with an expected starting price of $149, it will be a lot more affordable than some of the other Linux phones on the horizon.

It’s also starting to look like the PinePhone could be a very versatile device.

Pine64 has been sending out development kits for a while, and it looks like developers are porting a number of GNU/Linux-based operating systems to the platform.

Read more

Librem 5 vs Android — Which boots faster?

Filed under
OS
Android
GNU
Linux
  • Librem 5 vs Android — Which boots faster?

    A simple question: What boots faster — a run-of-the-mill Android phone or a Librem 5 smartphone running PureOS?

    We put the Librem 5 dev kit next to an HTC One, both powered completely off, then pushed the power buttons at the same time.

  • Purism Talks Up The Librem 5 Smartphone Boot Speed, Price Increase Coming

    Purism is still promoting their Librem 5 Linux smartphone as coming next quarter despite not seeing any production design yet and the software stack being incomplete. While the software is still under development, they are at least promoting it as booting faster than Android.

    A brief blog post was put out today by Purism showing their Librem 5 development kit booting next to an HTC One Android smartphone. The Librem 5 smartphone did in fact boot much faster than the Android devices, but keeping in mind that's just one metric to care about for smartphones and most users rebooting their phones maybe once a week. The HTC One is already an aging Android device and no longer a flagship Google phone by any means, but the specs are at least more similar to the vintage comparable to the Librem 5.

Zorin OS 15 is here – Faster. Easier. More connected.

Filed under
OS
Linux
Ubuntu

We’re excited to launch the next major version of our operating system: Zorin OS 15. Creating a Linux desktop operating system that’s designed for everyone – not only the engineers & power users – has always been the mission of Zorin OS, ever since the first release nearly 10 years ago. Zorin OS 15 takes this decade-long effort and amplifies it to the next level. Every aspect of the user experience has been re-considered and refined in this new release, from how apps are installed, to how you get work done, to how it interacts with the devices around you. The result is a desktop experience that combines the most powerful desktop technology with the most user-friendly design.

As our phones become powerful and versatile tools for productivity, more of our work is happening between our devices. With the goal of making Zorin OS the best platform for getting things done, we want the transitions between using our devices to be as seamless as possible.

Read more

Also: Zorin OS 15 Linux Distro Officially Released, Based on Ubuntu 18.04.2 LTS

Syndicate content

More in Tux Machines

Developers Devising Plan To Ship Newer NVIDIA Drivers On Ubuntu Stable Releases

Currently NVIDIA's packaged drivers on Ubuntu can get a bit stale on Ubuntu stable releases since they aren't updated in-step with the latest driver releases. But a new stable release update (SRU) policy/exception similar to the Firefox approach is being made for Ubuntu so that new releases will end up working their way into currently supported Ubuntu series. The Canonical developers working on Ubuntu are really ramping up their support for NVIDIA's proprietary driver. On top of Ubuntu 19.10 to bundle the NVIDIA binary driver into the operating system's ISO image, they are working out the SRU details for shipping newer NVIDIA driver releases on existing Ubuntu stable releases. Read more

Security Leftovers

  • Microsoft Warns about Worm Attacking Exim Servers on Azure [Ed: Microsoft should also warn "customers" of Windows back doors for the NSA, but it does not (this one was patched ages ago; the Microsoft back doors aren't). Shouldn't Microsoft ask its proxies and partners, as usual, to come up with buzzwords and logos and Web sites for bugs in FOSS, then talk about how FOSS is the end of the world?]
  • The Highly Dangerous 'Triton' [Attackers] Have Probed the US Grid [Ed: It's Windows]
     

    Over the past several months, security analysts at the Electric Information Sharing and Analysis Center (E-ISAC) and the critical-infrastructure security firm Dragos have been tracking a group of sophisticated [attackers] carrying out broad scans of dozens of US power grid targets, apparently looking for entry points into their networks. Scanning alone hardly represents a serious threat. But these [attackers], known as Xenotime—or sometimes as the Triton actor, after their signature malware—have a particularly dark history. The Triton malware was designed to disable the so-called safety-instrument systems at Saudi Arabian oil refinery Petro Rabigh in a 2017 cyberattack, with the apparent aim of crippling equipment that monitors for leaks, explosions, or other catastrophic physical events. Dragos has called Xenotime "easily the most dangerous threat activity publicly known."

  • A Researcher Found a Bunch of Voting Machine Passwords Online
    A little more than a week ago, the Department of Homeland Security confirmed that it was going to forensically analyze computer equipment associated with part of the 2016 elections in North Carolina in association with questions about Russian hacking. The news prompted an information security researcher to announce that he’d found evidence of other election security issues in North Carolina last fall, which he’d kept quiet until now. Chris Vickery, the director of cyber-risk research at UpGuard, a cybersecurity services firm, tweeted June 7 that he had found an unlocked online repository that contained what he said were passwords for touchscreen voting machines. The repository, he said, also contained other information, including serial numbers for machines that had modems, which theoretically could have allowed them to connect to the internet. Vickery said that after he found the open repository in September 2018, he immediately told state officials, who locked the file. State officials have told Mother Jones that the passwords were nearly 10 years old and encrypted—a claim disputed by Vickery and a Democratic technology consultant in North Carolina—but admitted that the file shouldn’t have been publicly available online.
  • TPM now stands for Tiny Platform Module: TCG shrinks crypto chip to secure all the Things [Ed: Misusing the word "trust" to obliterate computer freedom and general-purpose computing]
    The Trusted Computing Group (TCG), a nonprofit developing hardware-based cybersecurity tools, has started work on the "world's tiniest" Trusted Platform Module (TPM). TPMs are silicon gizmos designed to protect devices by verifying the integrity of essential software – like firmware and BIOS − and making sure no dodgy code has been injected into the system prior to boot. These are widely used to protect servers. Now TCG wants to adopt the technology for devices that are so small that the inclusion of a full TPM chip might be impractical due to cost, space and power considerations. The first tiny TPM prototype, codenamed Radicle, was demonstrated last week at a TCG members' meeting in Warsaw, Poland. [...] We have to mention that for years, TCG and its TPMs were criticised by the open-source software community, which suspected the tech could be used for vendor lock-in – GNU father Richard Stallman called trusted computing "treacherous computing", but it looks like his worst fears have not come to pass. That doesn't mean TPMs haven't seen their share of dark days: back in 2017, it emerged that security chips made by Infineon contained a serious flaw, with experts estimating that 25 to 30 per cent of all TPMs used globally were open to attack.
  • What Is a Buffer Overflow
    A buffer overflow vulnerability occurs when you give a program too much data. The excess data corrupts nearby space in memory and may alter other data. As a result, the program might report an error or behave differently. Such vulnerabilities are also called buffer overrun. Some programming languages are more susceptible to buffer overflow issues, such as C and C++. This is because these are low-level languages that rely on the developer to allocate memory. Most common languages used on the web such as PHP, Java, JavaScript or Python, are much less prone to buffer overflow exploits because they manage memory allocation on behalf of the developer. However, they are not completely safe: some of them allow direct memory manipulation and they often use core functions that are written in C/C++.
  • Any iPhone can be hacked
    Apple’s so called secure iPhones can be turned over by US coppers using a service promoted by an Israeli security contractor. Cellebrite publicly announced a new version of its product known as a Universal Forensic Extraction Device or UFED, one that it's calling UFED Premium. In marketing that update, it says that the tool can now unlock any iOS device cops can lay their hands on, including those running iOS 12.3. Cellebrite claims UFED Premium can extract files from many recent Android phones as well, including the Samsung Galaxy S9 but no-one ever called them secure and safe. What is unusual is that Cellebrite is making  broad claims about turning over Apple gear. This is not a cat-and-mouse claim where they exploit a tiny flaw which one day might be fixed. It would appear that Cellebrite has its paw on a real howler.
  • Cellebrite Claims It Can Unlock ‘Any’ iPhone And iPad, 1.4 Billion Apple Devices Hackable
    Israel-based Cellebrite has announced a new version of its system Universal Forensic Extraction Device (UFED) — UFED Premium — which is capable of unlocking any iPhone, high-end Android device, or an iPad. The forensics company has suggested that UFED Premium is meant to help the police in unlocking iPhones and Android smartphones and getting data from locked smartphones.
  • Web-based DNA sequencers getting compromised through old, unpatched flaw
    DnaLIMS is developed by Colorado-based dnaTools. It provides software tools for processing and managing DNA sequencing requests. These tools use browsers to access a UNIX-based web server on the local network, which is responsible for managing all aspects of DNA sequencing. A simple Google search shows that dnaLIMS is used by a number of scientific, academic and medical institutions.
  • Generrate Cryptographically Secure RANDOM PASSWORD
  • DMARC, mailing list, yahoo and gmail
    Gmail was blocking one person’s email via our list (he sent that using Yahoo and from his iPhone client), and caused more than 1700 gmail users in our list in the nomail block unless they check for the mailman’s email and click to reenable their membership. I panicked for a couple of minutes and then started manually clicking on the mailman2 UI for each user to unblock them. However, that was too many clicks. Suddenly I remembered the suggestion from Saptak about using JavaScript to do this kind of work. Even though I tried to learn JavaScript 4 times and failed happily, I thought a bit searching on Duckduckgo and search/replace within example code can help me out.
  • Tired of #$%& passwords? Single Sign-on could be savior

    So how is single sign-on more secure, if Facebook is in charge? It's not, say security experts. "They’ve shown they can’t be trusted with our information," says Rudis.

  • Are SSO Buttons Like “Sign-in With Apple” Better Than Passwords?
    Apple recently announced a new product that could prevent users from giving away their email ID to every other site on the internet. It’s expected to launch sometime later in 2019. Called “Sign-in with Apple,” it is similar to other Single Sign-on services provided by Google and Facebook. The button lets you login to websites without creating a new user account every time.
  • App Makers Are Mixed on ‘Sign In With Apple’

    But other app makers have mixed feelings on what Apple has proposed. I spoke to a variety of developers who make apps for iOS and Android, one of whom asked to remain anonymous because they aren’t authorized to speak on behalf of their employer. Some are skeptical that Sign In with Apple will offer a solution dramatically different from what’s already available through Facebook or Google. Apple’s infamous opacity around new products means the app makers don’t have many answers yet as to how Apple’s sign in mechanism is going to impact their apps. And one app maker went as far as referring to Apple’s demand that its sign-in system be offered if any other sign-in systems are shown as “petty.”

  • Chinese Cyberattack Hits Telegram, App Used by Hong Kong Protesters

    “This case was not an exception,” he wrote.

    The Hong Kong police made their own move to limit digital communications. On Tuesday night, as demonstrators gathered near Hong Kong’s legislative building, the authorities arrested the administrator of a Telegram chat group with 20,000 members, even though he was at his home miles from the protest site.

  • Security News This Week: Telegram Says China Is Behind DDoS

    As protests erupted in the streets of Hong Kong this week, over a proposed law that would allow criminal suspects to be extradited to mainland China, the secure messaging app Telegram was hit with a massive DDoS attack. The company tweeted on Wednesday that it was under attack. Then the app’s founder and CEO Pavel Durov followed up and suggested the culprits were Chinese state actors. He tweeted that the IP addresses for the attackers were coming from China. “Historically, all state actor-sized DDoS (200-400 Gb/s of junk) we experienced coincided in time with protests in Hong Kong (coordinated on @telegram). This case was not an exception,” he added. As Reuters notes, Telegram was DDoSed during protests in China in 2015, as well. Hong Kong does not face the strict [Internet] censorship that exists in mainland China, although activists have expressed concern about increased pressure from Beijing on the region.

  • Nextcloud signs public letter, opposing German plan to force decryption of chat

10 Excellent Free Mind Mapping Software for Linux Users

Mind maps are diagrams used to organize information visually in hierarchical ways that show relationships among the elements that make up the map. Drawing mind maps have been proven to be highly effective for getting information in and out of the brain especially when combined with logical note-taking that typically details or summarizes the roles of the map’s components along the way. There are various mind mapping software out there ranging from free to paid to open source options. Today, my job is to list the best mind mapping software available to users for free. They are all modern, easy enough to use, and offer sufficient consumer support. Read more

today's howtos