Language Selection

English French German Italian Portuguese Spanish

Software

Faster booting with Upstart

Filed under
Software

h-online.com: A good portion of the boot time on current Linux systems is spent on system initialisation and starting dozens of daemons sequentially. The Ubuntu 9.10 development team have started to parallelise and accelerate the boot process through the large scale use of Upstart.

GNOME Keyring

Filed under
Software
Security

mdeslaur.blogspot: For the past week or so, people have been talking about a “security issue” in Seahorse. This sums up my opinion on the matter: This isn't a security issue, and there is no good way to fix it.

Value added equals useless bloat

Filed under
OS
Linux
Software

toolbox.com/blogs: What is it with installing programs these days? Just about any program you wish to install comes with some useless so called value added junk which does nothing but use up computer resources and slow it down. I am not just talking about windows programs either.

Blender Game Competition 2010

Filed under
Software
Gaming

freegamer.blogspot: Blender (everyones favorite GPL 3D modeling application) also has a build in game engine. And what would be nicer than having a nice competition for game creation?

Linux gets its own version of Symantec Backup Exec System Recovery

Filed under
Software

techtarget.com.au: Symantec has released a new version of its bare-metal restore software that adds support for Linux servers and tightens integration for centralized management of server backups.

Moovida: A Music Player for the Masses

Filed under
Software

ostatic.com: If you're like most computer users, your hard drive is probably stuffed to the gills with movies, pictures, music, and media files you want to hang on to. If you're trying to figure out a good way to manage them all, have a look at Moovida.

GNOME 3.0 May Not Come Until September 2010

Filed under
Software

phoronix.com: Back in July of 2008 we learned of GNOME 3.0 as plans were laid out during the GUADEC '08 conference to make the GNOME 2.30 release their "3.0" version in March of 2010. However, it looks like GNOME 3.0 may not hit in H1'2010 but rather September of next year.

Head to Head: Google Chrome 4 Beta vs. Firefox 3.6

Filed under
Software
Moz/FF

pcmag.com: In the last couple of days, both Google's Chrome browser and Mozilla's Firefox have come out with new betas claiming improved performance. Why not compare these new betas head-to-head?

Previewing Gnome Shell in Ubuntu

Filed under
Software

workswithu.com: In order get a taste of what this desktop of the future will look like, I’ve spent the last few days using the development version. Here’s what I’ve found.

Free and Open Source Bioinformatics Software for Linux

Filed under
Software

junauza.com: Bioinformatics s the field of science in which biology, computer science, and information technology merge into a single discipline. I have a here a list of some of the most capable free and open source Bioinformatics software for Linux:

Syndicate content

More in Tux Machines

Today in Techrights

Security Leftovers

  • One-stop counterfeit certificate shops for all your malware-signing needs

    The Stuxnet worm that targeted Iran's nuclear program almost a decade ago was a watershed piece of malware for a variety of reasons. Chief among them, its use of cryptographic certificates belonging to legitimate companies to falsely vouch for the trustworthiness of the malware. Last year, we learned that fraudulently signed malware was more widespread than previously believed. On Thursday, researchers unveiled one possible reason: underground services that since 2011 have sold counterfeit signing credentials that are unique to each buyer.

  • How did OurMine hackers use DNS poisoning to attack WikiLeaks? [Ed: False. They did not attack Wikileaks; they attacked the DNS servers/framework. The corporate media misreported this at the time.
    The OurMine hacking group recently used DNS poisoning to attack WikiLeaks and take over its web address. Learn how this attack was performed from expert Nick Lewis.
  • Intel didn't give government advance notice on chip flaws

    Google researchers informed Intel of flaws in its chips in June. The company explained in its own letter to lawmakers that it left up to Intel informing the government of the flaws.

    Intel said that it did not notify the government at the time because it had “no indication of any exploitation by malicious actors,” and wanted to keep knowledge of the breach limited while it and other companies worked to patch the issue.

    The company let some Chinese technology companies know about the vulnerabilities, which government officials fear may mean the information was passed along to the Chinese government, according to The Wall Street Journal.

  • Intel hid CPU bugs info from govt 'until public disclosure'

    As iTWire reported recently, Intel faces a total of 33 lawsuits over the two flaws. Additionally, the Boston law firm of Block & Leviton is preparing a class action lawsuit against Intel chief executive Brian Krzanich for allegedly selling a vast majority of his Intel stock after the company was notified of the two security flaws and before they became public.

  • Intel did not tell U.S. cyber officials about chip flaws until made public [iophk: "yeah right"]

    Current and former U.S. government officials have raised concerns that the government was not informed of the flaws before they became public because the flaws potentially held national security implications. Intel said it did not think the flaws needed to be shared with U.S. authorities as hackers [sic] had not exploited the vulnerabilities.

  • LA Times serving cryptocurrency mining script [iophk: "JS"]

    The S3 bucket used by the LA Times is apparently world-writable and an ethical hacker [sic] appears to have left a warning in the repository, warning of possible misuse and asking the owner to secure the bucket.

  • Facebook's Mandatory Malware Scan Is an Intrusive Mess

    When an Oregon science fiction writer named Charity tried to log onto Facebook on February 11, she found herself completely locked out of her account. A message appeared saying she needed to download Facebook’s malware scanner if she wanted to get back in. Charity couldn’t use Facebook until she completed the scan, but the file the company provided was for a Windows device—Charity uses a Mac.

  • Tinder plugs flaw that enabled account takeover using just a phone number

    As Tinder uses Facebook profile pics for its users to lure in a mate or several, the 'dating' app is somewhat tied to the social network. When a swipe-hungry Tinder user comes to login to their account they can either do so via Facebook or use their mobile number.

  • `

Android Leftovers

Report from Debian SnowCamp and a Look at Solyd XK, a Debian-Based Distribution

  • Report from Debian SnowCamp: day 1
  • Report from Debian SnowCamp: day 2
    Of course, we’re still sorely lacking volunteers who would really care about mentors.debian.net; the codebase is a pile of hacks upon hacks upon hacks, all relying on an old version of a deprecated Python web framework. A few attempts have been made at a smooth transition to a more recent framework, without really panning out, mostly for lack of time on the part of the people running the service. I’m still convinced things should restart from scratch, but I don’t currently have the energy or time to drive it… Ugh.
  • Installing Solyd XK, a Debian based Linux distribution : Cooking With Linux
    It's time for some more "Cooking With Linux" without a net, meaning the video you are about to watch was recorded live. Today, I'm going to install a new Linux distribution (new to me, anyhow) called Solyd XK.