Language Selection

English French German Italian Portuguese Spanish

Linux

Dynamic Software Updating: Linux 4.0 and Beyond

Filed under
Linux

The rebootless patching support in Linux 4.0 is the descendant of two existing proposals, kpatch (from RedHat) and kGraft (from SUSE). 1 These two descend from earlier research, by Jeff Arnold and Frans Kaashoek, on a solution called Ksplice, which was bought by Oracle in 2011.

Read more

Also: Red Hat and Canonical talk Linux 4.0 integration as work on 4.1 causes hissy-fits

Who’s behind Linux now, and should you be afraid?

Filed under
Linux

If you think that Linux is still the "rebel code”—the antiestablishment, software-just-wants-to-be-free operating system developed by independent programmers working on their own time — then it's time to think again.

The Linux kernel is the lowest level of software running on a Linux system, charged with managing the hardware, running user programs, and maintaining security and integrity of the whole set up. What many people don’t realize is that development is now mainly carried out by a small group of paid developers.

Read more

Live-Patching Doesn't Change Much In Linux 4.1

Filed under
Linux

The live kernel patching support was one of the big additions to what became Linux 4.0, but with Linux 4.1 there aren't many improvements to show for the past cycle.

Jiri Kosina of SUSE is maintaining the kernel's livepatching code and explained in the 4.1 pull request, "These are mostly smaller things that got accumulated during the development cycle. The unified solution is still being worked on and is not mature enough for 4.1 yet."

Read more

The Companies That Support Linux: NI

Filed under
Linux
Interviews

Industries as diverse as finance, aviation, medicine, the military, manufacturing, and telecom are adopting real-time Linux to help control robots, data acquisition systems and other time-sensitive instruments and machines. NI’s integrated hardware and software platform, based on the NI Linux real-time OS, helps enterprises accelerate productivity and drive rapid innovation as they build these next-generation, real-time technologies, says Shelley Gretlein, director of platform software and customer education at NI.

Read more

Linux Kernel 4.0 Codenamed ‘Hurr Durr I’m A Sheep’ Released, Install/Upgrade In Ubuntu/Linux Mint

Filed under
Linux
News


Linux kernel 4.0 release hurr durr i'm a sheep

Linux Kernel 4.0 codenamed 'Hurr Durr I'm a sheep' (it's not a joke Smile has been announced by Linus Torvalds on the mailing list. 4.0 is not with some big changes but some small hardware support, driver improvements and bug fixes. There are more changes being given in this article below. If you want to upgrade to Linux Kernel 4.0 then you can follow this tutorial.

Read At LinuxAndUbuntu

Semplice 7.0.1 bugfix release

Filed under
GNU
Linux

It's my pleasure to announce the immediate release of the first bugfix release of Semplice 7.

Read more

Hanthana Linux 21 (Sinharaja) released

Filed under
GNU
Linux

This new release Hanthana Linux 21, is ship with several Desktop Enviroments such as Gnome, KDE, XFCE, Sugar and LXDE. There are several editions in Hanthana 21, for general usage (Hanthana 21 LiveDVD) , educational purpose you can use Hanthana 21 Edu and Hanthana 21 Dev can be use for Software Development purposes. For those who just use Office packages can download either Hanthana 21 Light) or Hanthana 21 Light2. Each of these editions comes with both i686 (32bit) and x86_64 (64bit) architectures and 10 ISO images available for download.

Read more

Tizen Leftovers

Filed under
Linux
  • Accuweather for Samsung Z1 Tizen Smart Phone

    Most of time we need to refer to the weather, what to wear, where to go, umbrella or no umbrella? This is where a reliable weather app comes in handy.

  • Nuance Clinical Documentation Tool Florence for Samsung Gear S

    Nuance Communications have announced their newest innovations that brings clinical documentation to smart devices, smart watches and the Internet of Things.

  • Game of Games for the Tizen Samsung Z1

    Here is a new game with a new twist. What you have to do is “Look at the image and guess the game”. A simple game that lets you learn and explore a trivia app that promises to cover every classic game!

  • ShareNote for Samsung Z1 Tizen SmartPhone

    ShareNote is an app that lets you easily store all the information that you might need as go by your day-to-day business. anything that comes to mind can be easily stored for future retrival

  • Redbend Provides Over-the-Air Software Management Solutions for Samsung’s Tizen Smartphones

    Redbend, is a company that catalyzes change in the connected world and boasts the ability of keeping more than 2 billion automotive, IoT and mobile devices updated, has announced that it will be providing its Over the Air (OTA) solution to the Tizen based Samsung Z1. Redbend’s OTA updating solutions will enhance the reliability and performance of the platform and software on Samsung Tizen handsets.

Clonezilla Live 2.4.1-6 Now Supports Cloning of Disk Partitions Bigger than 16TB

Filed under
GNU
Linux

Steven Shiau announced on April 14 the immediate availability for download and testing of a new development version of his Clonezilla Live operating system, version 2.4.1-6.

Read more

EFL and friends 1.14.0 beta 1 released

Filed under
GNU
Linux

With the latest release of EFL version 1.14.0 beta 1 you get a fresh new tarballs with the latest work. This is a beta release and if for general testing, bug finding and feedback.

Read more

Syndicate content

More in Tux Machines

diff -u: What's New in Kernel Development

Alexander Holler wanted to make it much harder for anyone to recover deleted data. He didn't necessarily want to outwit the limitless resources of our governmental overlords, but he wanted to make data recovery harder for the average hostile attacker. The problem as he saw it was that filesystems often would not actually bother to delete data, so much as they would just decouple the data from the file and make that part of the disk available for use by other files. But the data would still be there, at least for a while, for anyone to recouple into a file again. Alexander posted some patches to implement a new system call that first would overwrite all the data associated with a given file before making that disk space available for use by other files. Since the filesystem knew which blocks on the disk were associated with which files, he reasoned, zeroing out all relevant data would be a trivial operation. Read more

8 Linux Security Improvements In 8 Years

At a time when faith in open source code has been rocked by an outbreak of attacks based on the Shellshock and Heartbleed vulnerabilities, it's time to revisit what we know about Linux security. Linux is so widely used in enterprise IT, and deep inside Internet apps and operations, that any surprises related to Linux security would have painful ramifications. In 2007, Andrew Morton, a no-nonsense colleague of Linus Torvalds known as the "colonel of the kernel," called for developers to spend time removing defects and vulnerabilities. "I would like to see people spend more time fixing bugs and less time on new features. That's my personal opinion," he said in an interview at the time. Read more

Linux from Square One

Despite the fact I have a different view of which distros are best for kids — Qimo (pronounced “kim-o,” as in the last part of eskimo, not “chemo”) tops the list, as it should, but the French distro Doudou (add your own joke here) is unfortunately left out — the link there is informative. So for those who are just getting their proverbial feet wet in Linux, this is a godsend. Read more

Explaining Security Lingo

This post is aimed to clarify certain terms often used in the security community. Let’s start with the easiest one: vulnerability. A vulnerability is a flaw in a selected system that allows an attacker to compromise the security of that particular system. The consequence of such a compromise can impact the confidentiality, integrity, or availability of the attacked system (these three aspects are also the base metrics of the CVSS v2 scoring system that are used to rate vulnerabilities). ISO/IEC 27000, IETF RFC 2828, NIST, and others have very specific definitions of the term vulnerability, each differing slightly. A vulnerability’s attack vector is the actual method of using the discovered flaw to cause harm to the affected software; it can be thought of as the entry point to the system or application. A vulnerability without an attack vector is normally not assigned a CVE number. Read more