Language Selection

English French German Italian Portuguese Spanish

HowTos

Get your RSS feeds and podcasts in one place with this open source tool

Filed under
Software
HowTos

RSS news feeds are an exceptionally handy way to keep up to date on various websites. In addition to Opensource.com, I follow the annual SysAdvent sysadmin tools feed, some of my favorite authors, and several webcomics. RSS readers allow me to "batch up" my reading, so I'm not spending every day on a bunch of different websites.

Read more

today's leftovers and howtos

Filed under
Misc
HowTos
  • Road Map for 2020

    Following the last year's leitmotif of "bridging worlds", we turn our attention to the removal of the hurdles faced by aspiring developers and users. During the annual road-map discussion on our mailing list, we identified four tangible approaches towards that goal. First, making Sculpt OS more user friendly. Second, reinforcing trust in Genode by fostering the framework's high quality. Third, making the tooling around Genode a joy to use. And finally, the illustration of Genode's versatility in the form practical use cases.

  • Genode OS Draws Up 2020 Plans Of USB Audio, A Kernel Written In Ada

    The Genode operating system framework that's been going strong for over a decade and continuing to employ a micro-kernel architecture continues to plan for an interesting future.

    The twelve year old Genode OS open-source project has drawn up an interesting road-map for 2020. Some of their plans for this year include:

    - 64-bit ARM (specifically the i.MX8 SoC) support for its general purpose Sculpt OS operating system.

  • Incentivizing Accessible Design

    When scholars contemplate the legal tools available to policymakers for encouraging innovation, they primarily think about patents. If they are keeping up with the most recent literature, they may also consider grants, prizes, and taxes as means to increase the supply of innovation. But the innovation policy toolkit is substantially deeper than that. To demonstrate its depth, this Article explores the evolution of designs that help people with disabilities access the world around them. From artificial limbs to the modern wheelchair and the reshaping of the built environment, a variety of legal doctrines have influenced, for better and for worse, the pace and direction of innovation for accessible design.

    This Article argues that two of the most important drivers of innovation for accessible design have been social welfare laws and antidiscrimination laws. Both were responsible, in part, for the revolution in accessibility that occurred in the second half of the twentieth century. Unlike standard innovation incentives, however, these laws operate on the “demand side.” Social welfare laws and antidiscrimination laws increase the ability and willingness of parties to pay for accessible technology, ultimately leading to greater supply. But in doing so, these laws generate a different distribution of the costs and benefits of innovation. They also produce their own sets of innovation distortions by allowing third parties to make decisions about the designs that people with disabilities have to use.

    The law can promote innovation, and it can hinder it. The law’s relationship to the wheelchair, the most important accessibility innovation of the twentieth century, produced both results. Policymakers have choices about which legal incentives doctrines they can use and how they can use them. This Article evaluates those tools, and it provides guidelines for their use to encourage accessible technology in particular and innovation generally.

  • Introduction to the Linux terminal commands

    Those of you just beginning to learn the basics of Linux may be interested in a great video published by the YouTube channel Explaining Computers. The Linux Terminal tutorials are aimed at those of you moving from the Microsoft Windows operating system as well as users of the Raspberry Pi mini PC and similar. The 20 minute video covers a range of Linux terminal commands and Linux concepts, including navigating and manipulating drives and directories using the commands pwd, ls, lsblk, cd, mkdir, rmdir, cp, and mv.

    If you would like to play around with the Linux commands but don’t have a Linux system you can also use a terminal emulator. A program that allows the use of the terminal in a graphical environment. Here are some free, commonly-used terminal emulators by operating system : Mac OS X: Terminal (default), iTerm 2 – Windows: PuTTY – Linux: Terminal, KDE Konsole, XTerm

  • How to install Microsoft fonts on Linux

today's howtos

Filed under
HowTos

Schedule Jobs in Linux With ‘at’ Command

Filed under
HowTos

The at command in Linux can be used to schedule jobs that do not run on a regular schedule. Learn how to use the at command.
Read more

today's howtos

Filed under
HowTos
  • 20 ps Command Examples to Monitor Linux Processes
  • Where are the config files in GNOME

    When you install a new distribution, you end up with a generic desktop. GNOME, when you choose standard Ubuntu. This works but the great joy of running Linux is to have it all your way. So, get your own tweaks in there. How can you change your desktop? In GNOME, you have tools and files to change it. In this post you will learn where to find the files and use the tools.

  • Driftnet command tutorial and examples

    Sniffing consists of intercepting packets through a network to get their content. When we share a network, intercepting the traffic going through it is pretty easy with a sniffer, that’s why protocol encryption such as https is so important, when traffic is unencrypted even credentials go in plain text and can be intercepted by attackers.
    This tutorial focuses on intercepting media, specifically images using the Driftnet sniffer, as you will see it will be only possible to capture images going through unencrypted protocols like http rather than https, and even unprotected images within sites protected with SSL (insecure elements).

  • Top 48 Linux Interview Questions & Answers

    Are you preparing for a Linux interview? We have prepared some of the commonly asked Linux interview questions and their answers.

    If you are a beginner (with some knowledge of Linux or having certification) or with professional Linux administration experience, then following Q & A help for your interview preparation.

  • Configuring a Cisco switch from a Linux Terminal with Minicom

    As much as I like playing in the terminal, the jury is still out as to how much I like working with Cisco. To be as objective as possible, I need to tell myself that: 1, I am not familiar with the command set or how they like to do things so I must be open minded; 2, Relax, the command line is a happy place to be and 3, this is new territory, don?t get frustrated, just write it down and enjoy the learning process. Also, my brother in-law, whose career is in network administration just loves this Cisco business so it turned out to be quite educational. The scope of this article is not how to set up a router, just, this is how I was able to get going with it.

    The specific Cisco switch I configured was a Catalyst 3560 series PoE-48. I am sure these direction will work with other similar devices. Since I am an openSUSE user, the directions are tailored as such.

Syndicate content

More in Tux Machines

today's howtos

GameMode 1.5

  • Feral's GameMode 1.5 Now Supports Changing The CPU Governor Differently For iGPUs

    With Feral's GameMode 1.5 the big change facing users is for those running integrated graphics. In a change led by an Intel open-source graphics driver developer, GameMode now supports setting an alternative CPU frequency scaling governor for integrated graphics use-cases. Up to now GameMode has defaulted to always using the "performance" CPU frequency scaling governor for normally delivering the best performance, but for integrated graphics that in some situations can lead to lower performance. Due to the integrated graphics and CPU cores sharing the same power envelope, ramping up the CPU performance can throw the graphics performance out of balance and at least for some games lead to lower performance. So with GameMode 1.5, the user can now opt for "powersave" or an alternative governor instead when using an iGPU.

  • Feral Interactive's open source 'GameMode' system performance booster has a new release

    Feral Interactive don't just port a lot of games to Linux, they also work on some open source bits here and there. One of their projects is GameMode, which just got a new release. GameMode is a "daemon/lib combo for Linux that allows games to request a set of optimisations be temporarily applied to the host OS and/or a game process". In simple terms, it can help ensure your Linux PC is giving the game all it can to run smoothly. Looks like someone new is handling the project too, with Alex Smith having left Feral Interactive.

Mozilla on Privacy Badger, Rust and Digital ID Systems

  • Firefox Extension Spotlight: Privacy Badger

    People can't be expected to understand all of the technically complex ways their online behavior is tracked by hidden entities. As you casually surf the web, there are countless techniques different third party actors use to secretly track your online movement. So how are we supposed to protect our privacy online if we don't even understand how the game works? To help answer this, the good folks at the Electronic Frontier Foundation (a non-profit devoted to defending digital privacy) built Privacy Badger--a browser extension designed to give you highly advanced tracking protection, while requiring you to do nothing more than install it on Firefox. No configuration, no advanced settings, no fuss. Once you have Privacy Badger installed, it automatically scours every website you visit in its relentless hunt for hidden trackers. And when it finds them, blocks them.

  • This Week In Rust: This Week in Rust 322
  • What could an “Open” ID system look like?: Recommendations and Guardrails for National Biometric ID Projects

    Digital ID systems are increasingly the battlefield where the fight for privacy, security, competition, and social inclusion is playing out. In our ever more connected world, some form of identity is almost always mediating our interactions online and offline. From the corporate giants that dominate our online lives using services like Apple ID and Facebook and Google’s login systems to government IDs which are increasingly required to vote, get access to welfare benefits, loans, pay taxes, get on transportation or access medical care. Part of the push to adopt digital ID comes from the international development community who argue that this is necessary in order to expand access to legal ID. The UN Sustainable Development Goals (SDGs) call for “providing legal identity for all, including birth registration” by 2030. Possessing legal identity is increasingly a precondition to accessing basic services and entitlements from both state and private services. For the most marginalised communities, using digital ID systems to access essential services and entitlements from both state and private services are often one of their first interactions with digital technologies. Without these commonly recognized forms of official identification, individuals are at risk of exclusion and denial of services. However, the conflation of digital identity as the same as (or an extension of) “legal identity”, especially by the international development community, has led to an often uncritical embrace of digital ID projects. In this white paper, we survey the landscape around government digital ID projects and biometric systems in particular. We recommend several policy prescriptions and guardrails for these systems, drawing heavily from our experiences in India and Kenya, among other countries. In designing, implementing, and operating digital ID systems, governments must make a series of technical and policy choices. It is these choices that largely determine if an ID system will be empowering or exploitative and exclusionary. While several organizations have published principles around digital identity, too often they don’t act as a meaningful constraint on the relentless push to expand digital identity around the world. In this paper, we propose that openness provides a useful framework to guide and critique these choices and to ensure that identity systems put people first. Specifically, we examine and make recommendations around five elements of openness: multiplicity of choices, decentralization, accountability, inclusion, and participation.

Red Hat/IBM: Red Hat Enterprise Linux, OpenShift 4.3 and OpenSCAP

  • Red Hat Enterprise Linux 8 for SAP Solutions on IBM POWER9: An open foundation to power intelligent business decisions

    At Red Hat Summit 2019, we unveiled Red Hat Enterprise Linux 8, the next generation of the world’s leading enterprise Linux platform, which provides the scale, flexibility and innovation to drive enterprise workloads across the hybrid cloud. Even with the advancements across the platform, we recognize that there’s no singular panacea to overcome every unique IT challenge. To meet these needs, Red Hat delivers specialized offerings built around Red Hat Enterprise Linux to address specific hardware, applications and environment requirements, and Red Hat Enterprise Linux 8 continues this strategy with the availability of Red Hat Enterprise Linux 8 for SAP Solutions on IBM Power Systems (POWER9).

  • OpenShift 4.3: Quay Container Security Integration

    In the Red Hat OpenShift 4.2 Web UI Console, we introduced a new Cluster Overview Dashboard as the landing page when users first log in. The dashboard is there to help users resolve issues more efficiently and maintain a healthy cluster. With the latest 4.3 release, we added an image security section to the cluster health dashboard card. This section will appear on the dashboard when the Container Security Operator gets installed.

  • Deploying OpenSCAP on Satellite using Ansible

    In many environments today, security is one of the top priorities. New information security vulnerabilities are discovered regularly, and these incidents can have a significant impact on businesses and their customers. Red Hat customers I talk to are frequently looking for tools they can use to help evaluate and secure their environments. One of these tools is OpenSCAP, which is included in Red Hat Enterprise Linux (RHEL), and can perform compliance and vulnerability scanning on RHEL servers. Satellite makes OpenSCAP easier to use by allowing you to deploy the OpenSCAP agent to hosts, manage the OpenSCAP policies centrally, and to view OpenSCAP reports from the Satellite web interface.