Language Selection

English French German Italian Portuguese Spanish

Login

Please allow up to an hour or so to receive your initial password. If you don't receive an email from us within a comfortable amount of time, you may email and request a password at r at schestowitz dot com. Please be sure to include your registered username.

You may also wish to check your spam folders as your initial email may have been misidentified as spam. Please also note that yahoo.com will not accept mail from TuxMachines.org due to ISP regulation listing in Spamhaus.

Thanks!
Spaces are allowed; punctuation is not allowed except for periods, hyphens, and underscores.
A valid e-mail address. All e-mails from the system will be sent to this address. The e-mail address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by e-mail.
Provide a password for the new account in both fields.

More in Tux Machines

Security Leftovers

  • Tuesday's security updates
  • Security updates for Wednesday
  • Security updates for Thursday
  • Small number of computer-aided rifles could be hacked in contrived scenario
    The internet is reeling today at the "news" that a rare make of computer-aided gunsight can under certain circumstances be hacked into, permitting a hacker to interfere with a suitably-equipped rifle's aim. The gunsight in question is the much-hyped but seldom purchased TrackingPoint kit, a system with a Linux machine at its heart which can be fitted to a range of different rifles. The TrackingPoint (details on its capabilities are at the end of this article) is mainly a curiosity. People who would be interested in it - experienced long-range marksmen - basically don't need it, and people who need it - those who have seldom or never fired a rifle - typically don't want it. And very few in either group can afford it.
  • Researchers Hack Linux-Powered, Self-Aiming Smart Rifle, Causing It To Change Targets
  • Remote code execution via serialized data
    Serialization and, more importantly, deserialization of data is unsafe due to the simple fact that the data being processed is trusted implicitly as being “correct.” So if you’re taking data such as program variables from a non trusted source you’re making it possible for an attacker to control program flow. Additionally many programming languages now support serialization of not just data (e.g. strings, arrays, etc.) but also of code objects. For example with Python pickle() you can actually serialize user defined classes, you can take a section of code, ship it to a remote system, and it is executed there.
  • To exec or transition that is the question...
  • CIL – Part1: Faster SELinux policy (re)build
  • FCC Rules Block use of Open Source
    The United States Federal Communications Commission (FCC) has introduced ‘software security requirements’ obliging WiFi device manufacturers to “ensure that only properly authenticated software is loaded and operating the device”. The document specifically calls out the DD-WRT open source router project, but clearly also applies to other popular distributions such as OpenWRT. This could become an early battle in ‘The war on general purpose computing’ as many smartphones and Internet of Things devices contain WiFi router capabilities that would be covered by the same rules.
  • Hacked Jeep Cherokee Exposes Weak Underbelly of High-Tech Cars
    The Jeep Cherokee brought to a halt by hackers last week exposed wireless networks as the weakest link in high-tech vehicles, underscoring the need to find fast over-the-air fixes to block malicious intrusions. Features that buyers now expect in most modern automobiles, such as driving directions and restaurant guides, count on a constant connection to a telecommunications network. But that link also makes cars vulnerable to security invasions like those that threaten computers in homes and businesses.

Open source Copyright Hub unveiled with '90+ projects' in the pipeline

The web has grown up without letting people own and control their own stuff, but a British-backed initiative might change all that, offering a glimpse of how the internet can work in the future. Their work will all be open sourced early next year. Britain's much-anticipated Copyright Hub was given ministerial blessing when it finally opened its kimono today, boasting a pipeline of over 90 projects covering commercial and free uses. Read more

DNF Might Handle System Upgrades in Fedora 23 Linux, Obsoletes and Retires Fedup

Kevin Fenzi posted a new message on the Fedora devel-announce mailing list a couple of days ago, informing all users and developers about a new proposal for the upcoming Fedora 23 Linux operating system, called DNF System Upgrades. Read more

Windows 10, The Matrix, and Linux Heros

Wow, it sure was a busy Thursday in the news feeds today. Windows 10 is getting a lot of headlines, some right in Open Source World. The Free Software Foundation issued a public statement urging folks to reject Windows 10 and LinuxBSDos.com advised dual-boot upgraders. The CEO of Mozilla even posted an open letter to Microsoft CEO concerning Windows 10. Elsewhere, Christine Hall blogged about the advancement of artificial intelligence, a LibreOffice update was announced, and Swapnil Bhartiya shared his pick of top five heros of Linux. Read more