Language Selection

English French German Italian Portuguese Spanish

DW Latest Releases

Syndicate content DistroWatch
Latest distribution releases
Updated: 1 hour 42 min ago

10/21 MorpheusArch 2018.3

1 hour 42 min ago

10/21 NuTyX 10.4

1 hour 42 min ago

10/21 Ultimate 6.0 "Lite"

1 hour 42 min ago

10/21 Feren 2018.10

1 hour 42 min ago

10/20 Runtu 18.04 "Xfce"

1 hour 42 min ago

10/20 GhostBSD 18.10-RC1

1 hour 42 min ago

10/19 Pop!_OS 18.10

1 hour 42 min ago

10/20 Kodachi 4.3

1 hour 42 min ago

10/20 blackPanther 18.1

1 hour 42 min ago

10/22 Archman 2018.10 "KDE"

1 hour 42 min ago

10/20 FreeBSD 12.0-BETA1

1 hour 42 min ago

10/18 HardenedBSD 1100056.7

Sunday 21st of October 2018 11:58:04 PM

10/18 Ubuntu Studio 18.10

Sunday 21st of October 2018 11:58:04 PM

10/18 Xubuntu 18.10

Sunday 21st of October 2018 09:58:04 PM

10/18 Ubuntu Kylin 18.10

Sunday 21st of October 2018 07:58:04 PM

10/18 Ubuntu Budgie 18.10

Sunday 21st of October 2018 11:58:03 AM

10/18 Ubuntu MATE 18.10

Sunday 21st of October 2018 09:58:04 AM

10/18 Lubuntu 18.10

Saturday 20th of October 2018 09:58:04 PM

10/18 Ubuntu 18.10

Saturday 20th of October 2018 03:58:03 PM

10/18 Kubuntu 18.10

Saturday 20th of October 2018 03:58:03 PM

More in Tux Machines

Android Leftovers

5 tips for choosing the right open source database

So, your company has a directive to adopt more open source database technologies, and they've recruited you to select the right direction. Whether you are an open source technology veteran or a newcomer, this is a daunting and overwhelming task. Over the past several years, open source technology adoption has steadily increased in the enterprise space. With its popularity comes a crowded marketplace with open source software companies promising that their solution will solve every problem and fit every workload. Be wary of these promises. Choosing the right open source technology—especially a database—is an important and difficult decision you can't make lightly. Read more

Today in Techrights

Security: Cracking, Elections and Apache

  • Hack [sic] on 8 adult websites exposes oodles of intimate user data

    A recent [crack] of eight poorly secured adult websites has exposed megabytes of personal data that could be damaging to the people who shared pictures and other highly intimate information on the online message boards. Included in the leaked file are (1) IP addresses that connected to the sites, (2) user passwords protected by a four-decade-old cryptographic scheme, (3) names, and (4) 1.2 million unique email addresses, although it’s not clear how many of the addresses legitimately belonged to actual users.

  • Professors discuss election security, voting systems at panel

    Amid questions of election security and potential system hacking in the upcoming midterm elections, Engineering prof. J. Alex Halderman spoke at the University of Michigan Alumni Center Thursday night about vulnerabilities in U.S. voting systems. Last June, Halderman appeared before the Senate Select Committee on Intelligence to testify about such.

    [...]

    “If an attack takes place, we won’t necessarily see the physical evidence," Halderman said. "The physical evidence that it took place is a discrepancy between what’s written on a piece of paper and what a computer total of that paper says. Because elections are so complicated, they’re so noisy, because the [crackers] can hide their traces in various ways, we won’t necessarily see when something like this happen for the first time. We've got to be ready.”

  • Apache Access Vulnerability Could Affect Thousands of Applications
    A recently discovered issue with a common file access method could be a major new attack surface for malware authors. Vulnerabilities in Apache functions have been at the root of significant breaches, including the one suffered by Equifax. Now new research indicates that another such vulnerability may be putting thousands of applications at risk. Lawrence Cashdollar, a vulnerability researcher and member of Akamai's Security Incident Response Team, found an issue with the way that thousands of code projects are using Apache .htaccess, leaving them vulnerable to unauthorized access and a subsequent file upload attack in which auto-executing code is uploaded to an application.