Language Selection

English French German Italian Portuguese Spanish

Linux

Switching from Windows to Linux PC's; a response to the BP oil spill?

Filed under
Linux
Microsoft

ibtimes.com: Linux is being pushed as an alternative to Windows XP in the Government's hard push towards spending cuts in the public sector, ie. Government offices.

What Linux Hardware Upgrades Make Sense?

Filed under
Linux
Hardware

linuxplanet.com: While Linux runs great on most any hardware, it runs even better on a machine with ample memory and a recent CPU. Upgrade options abound for even the most hardware hacking averse. In this monthly roundup we'll take a look at options to get your Linux system running even better.

Running The Linux 2.6.35 Kernel

Filed under
Linux
  • Running The Linux 2.6.35 Kernel With A Core i7 Notebook
  • LinuxUsers Kernel column #90 – the state of the kernel

Sabayon 5.3 Xfce & Lxde - a few impressions

Filed under
Linux

all-things-linux.blogspot: In 5.3 Sabayon comes with a much cleaner more professional looking default background in dark blue. Not too heavy on the eyes the way I like it, however compared to previous releases it's also easy their most boring background so far.

Live Kernel Patches with Ksplice

Filed under
Linux

Avoid reboots of your system with live Kernel updates using Ksplice

Not Having Linux Skills is IT Malpractice

Filed under
Linux

linuxplanet.com: Some things seem so obvious I feel silly even saying them. And this is one of them: any IT staffer who only knows one operating system is not worth hiring.

10 differences between Linux and BSD

Filed under
Linux
BSD

blogs.techrepublic.com: Despite a common tendency to gloss over the differences, Linux and BSD have a number of characteristics that set them apart from one another. Jack Wallen points out several important distinctions.

LiMo rumoured set for recall to Linux mothership

Filed under
Linux
  • LiMo rumoured set for recall to Linux mothership
  • LiMo frustrated, may have to merge with Linux Foundation

Extending Debian membership to non-programming contributors

Filed under
Linux

lucas-nussbaum.net: Stefano raised again the issue of providing some kind of Debian membership to people that contribute to Debian in unusual ways like doing translation, documentation, marketing, design, etc. But what for?

Syndicate content

More in Tux Machines

Leftovers: Software

today's howtos

Leftovers: OSS

Security Leftovers

  • Secure Server Deployments in Hostile Territory, Part II
    There are a few other general security practices I put in place. First, as I mentioned before, because each host has a certificate signed by an internal trusted CA for Puppet, we take advantage of those certs to require TLS for all network communications between hosts. Given that you are sharing a network with other EC2 hosts, you want to make sure nobody can read your traffic as it goes over this network. In addition, the use of TLS helps us avoid man-in-the-middle attacks.
  • Hackers Can Disable a Sniper Rifle—Or Change Its Target
    At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
  • Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet
    Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac. It is documented here by iOS and OS X guru Stefan Esser. It's all possible thanks to an environment variable called DYLD_PRINT_TO_FILE that was added in Yosemite. It specifies where in the file system a component of the operating system called the dynamic linker can log error messages. If the environment variable is abused with a privileged program, an attacker can modify arbitrary files owned by the powerful user account root – files like the one that lists user accounts that are allowed administrator privileges.