Linux and Open Source news headlines
Updated: 1 hour 18 min ago
Creating or editing files is one of the most common tasks that system admins perform every day. In this tutorial we are going to show you how to create and edit files on a Linux VPS.
Editor's Note: This article is paid for by Microsoft as a Diamond-level sponsor of LinuxCon North America, to be held Aug. 22-24, 2016, and was written by Linux.com.
Armed with a few simple open source commands, you can drastically reduce the effort involved in prepping your work for print.Going to print is an exciting time for any designer. Your hard work finally gets rendered into an attractive-looking PDF, you send it away to the great big print shop, and eventually you go to the magazine store or bookshop and find the results of your hard work on display for all to see.read more
The U.S. government's new Federal Source Code policy is a step in the right direction, but it would be better if "it mandated all agency source code be released under a free software license to the public in a given window of time."
First stable release of Apricity debuts
One month after the release of Slackware 14.2, MLED 14.2 is now available.
Microsoft has inadvertently demonstrated the intrinsic security problem of including a universal backdoor in its software after it accidentally leaked its so-called "golden key"—which allows users to unlock any device that's supposedly protected by Secure Boot, such as phones and tablets.The key basically allows anyone to bypass the provisions Microsoft has put in place ostensibly to prevent malicious versions of Windows from being installed, on any device running Windows 8.1 and upwards with Secure Boot enabled.
System administration professionals and home users alike share a need for the ability to be able to quickly and reliably make one-to-one copies of entire disks, both for the purposes of backup and recovery, as well as the process of easing deployments and complete refresh repairs and upgrades of existing systems.read more
UNC's professor Paul Jones explains that the concept of "free and open source" was a part of our culture long before there were computers, or even electronic technology, and that it's actually a rich part of our heritage. As for FOSS, he makes the case that it's now an ingrained part of the digital infrastructure.
Is it possible to produce professional media on Linux using free, open source software? We at Dototot believe so. We run Linux exclusively (Mint is our preferred flavor) and use free, open source software when viable.
Immediately after announcing the availability of Linux kernel 4.6.6 for GNU/Linux distributions, Greg Kroah-Hartman also informs us about the release of Linux kernel 4.4.17 LTS.
Flaws were being discussed public, but not officially revealed to usersThe developers of FreeBSD have announced they'll change the way they go about their business , after users queried why known vulnerabilities weren't being communicated to users.…
I've said it before, and I'll say it again: In open organizations, leaders can emerge from anywhere.read more
In my last article, "Fancy Tricks for Changing Numberic Base", I explored the surprising ability of the Linux shell to convertnumeric bases on the fly, including this sweet little snippet that convertsFF hexadecimal into decimal notation:[code]$ echo $(( 0xFF ))255[/code]
Anatine is a Brand New Free, open-source Desktop Twitter App for Linux, Windows, and OS X. Anatine describes as a pristine Twitter app, which build with Electron framework and emulating mobile Twitter website on your desktop.
KDE's Thomas Pfeiffer has had the great honor of announcing the availability of the first public release of the Kirigami UI (User Interface) framework for building mobile and convergent applications.
The vulnerability resides in the design and implementation of RFC 5961, a relatively new Internet standard that's intended to prevent certain classes of hacking attacks. In fact, the protocol is designed in a way that it can easily open Internet users to so-called blind off-path attacks, in which hackers anywhere on the Internet can detect when any two parties are communicating over an active transmission control protocol connection. Attackers can go on to exploit the flaw to shut down the connection, inject malicious code or content into unencrypted data streams, and possibly degrade privacy guarantees provided by the Tor anonymity network.
10787 files changed, 612208 insertions, 272098 deletions and lots of doc updatesLinux overlord Linus Torvalds has loosed the first release candidate for version 4.8 of the Linux Kernel.…
Versalogic’s sandwich-style “Osprey” SBC offers Atom E3800 SoCs, dual GbE ports, dual mini-PCIe slots, MIL-STD-202G ruggedization, and -40 to 85°C support. Like Versalogic’s recent BayCat and earlier Bengal single-board computers, the Osprey is based on Intel’s “Bay Trail” Atom E38xx family of SoCs. Unlike those boards, which conform to 4.2 x 3.8-inch (107 x 97mm) […]
A startup on a shoestring budget is working to clean up the Android security mess, and has even demonstrated results where other "secure" Android phones have failed, raising questions about Google's willingness to address the widespread vulnerabilities that exist in the world's most popular mobile operating system.