Language Selection

English French German Italian Portuguese Spanish


Syndicate content
Linux and Open Source news headlines
Updated: 1 hour 32 min ago

How log rotation works with logrotate

Wednesday 23rd of August 2017 11:07:08 PM
Log rotation on Linux systems is important – and more complicated than you might expect. Learn what logrotate is, how it works, why you should use it and how to use it.

Touch-panel PCs run Raspbian on Raspberry Pi CM3

Wednesday 23rd of August 2017 09:41:22 PM
Comfile has launched two IP65 protected, resistive touch panel PCs with 7- and 10.2-inch 800 x 480 displays, built around the Raspberry Pi Compute Module 3. In February, Saelig Co. announced distribution of Janz Tec’s Raspberry Pi 3-based emPC-A/RPI3 industrial controller. Now, Saelig has launched North American distribution of Korea-based Comfile’s ComfilePi line of touch […]

Managing tabular data in Groovy using Tika

Wednesday 23rd of August 2017 08:15:36 PM
I've been working on a data scraping project for a customer and started using Apache Tika after some experimentation showed me that it does a nice job of pulling text out of PDF files. This week, I was confronted with a new data source in DBF format, and it turns out Tika handles that as more

How to install Stress on Linux For generating work load

Wednesday 23rd of August 2017 06:49:49 PM
Want to put some stress|work load ( CPU or memory) on your Linux server. Learn how to install Stress on Linux so that,  you can easily manage the activity of putting work-load on your Linux server.

Why open source should be the first choice for cloud-native environments

Wednesday 23rd of August 2017 05:24:03 PM
Let's take a trip back in time to the 1990s, when proprietary software reigned, but open source was starting to come into its own. What caused this switch, and more importantly, what can we learn from it today as we shift into cloud-native environments?read more

Fun to Play Open Source Turn-Based Strategy Games

Wednesday 23rd of August 2017 03:58:17 PM
Many of the biggest computer games concentrate on explosion-filled genres. But there is a place for high quality turn-based strategy games. It’s a neglected genre in the mainstream, yet contains many marvelous titles. The genre might conjure thoughts of board games with dice and individualized pieces. But, now, they can use the latest technology to make more realistic and immersive experiences.

Children multiplication tables practice test with Bash script on Linux

Wednesday 23rd of August 2017 02:32:30 PM
The following post is a little bit different from my other posts as it does not solve any of your Linux configuration problems. Apologies there! This post is an attempt to kill multiple birds with one stone, hence expose children to a command line, avoid web flash and ads driven multiplication practice tests online and most importantly gain some multiplication skills along the way.

Using Ansible for deploying serverless applications

Wednesday 23rd of August 2017 01:06:44 PM
Ansible is designed as the simplest deployment tool that actually works. What that means is that it's not a full programming language. You write YAML templates that define tasks and list whatever tasks you need to automate your more

How to Detect and Clean Malware from a Linux Server with Maldet

Wednesday 23rd of August 2017 11:40:57 AM
Linux systems are not immune to malware. To protect yourself, you can use Maldet to detect and clean malware from a Linux server.

Integrating Web Applications with Apache

Wednesday 23rd of August 2017 10:15:11 AM
When you deploy a web application, how do end users access it?Often web applications are set behind a gateway device through whichend users can access it. One of the popular products to act asan application gateway on Linux is the Apache Web Server. Although it canfunction as a normal web server, it also has the ability to connect throughit to other web servers.

3 ways to trick out your terminal emulator

Wednesday 23rd of August 2017 08:49:24 AM
The command line is one of the most well-loved parts of a Linux distribution. Maybe not just because of what you can do with it, but how you can use it. Terminal windows are notorious for customization, and there[he]#8217[/he]s several...

Canonical Put Spotlight on Snap Apps for Ubuntu 17.10

Wednesday 23rd of August 2017 07:23:38 AM
The latest update to the GNOME Software (aka Ubuntu Software) in Ubuntu 17.10 brings two key changes to the desktop, both of which make Snap apps appear as first-class citizens and everything else, well, not.

More in Tux Machines

Games: Ostriv, Back to Bed, EVERSPACE, Hiveswap: Act 1

Openwashing and Microsoft FUD

BlueBorne Vulnerability Is Patched in All Supported Ubuntu Releases, Update Now

Canonical released today new kernel updates for all of its supported Ubuntu Linux releases, patching recently discovered security vulnerabilities, including the infamous BlueBorne that exposes billions of Bluetooth devices. The BlueBorne vulnerability (CVE-2017-1000251) appears to affect all supported Ubuntu versions, including Ubuntu 17.04 (Zesty Zapus), Ubuntu 16.04 LTS (Xenial Xerus) up to 16.04.3, Ubuntu 14.04 LTS (Trusty Tahr) up to 14.04.5, and Ubuntu 12.04 LTS (Precise Pangolin) up to 12.04.5. Read more

Security: Updates, 2017 Linux Security Summit, Software Updates for Embedded Linux and More

  • Security updates for Tuesday
  • The 2017 Linux Security Summit
    The past Thursday and Friday was the 2017 Linux Security Summit, and once again I think it was a great success. A round of thanks to James Morris for leading the effort, the program committee for selecting a solid set of talks (we saw a big increase in submissions this year), the presenters, the attendees, the Linux Foundation, and our sponsor - thank you all! Unfortunately we don't have recordings of the talks, but I've included my notes on each of the presentations below. I've also included links to the slides, but not all of the slides were available at the time of writing; check the LSS 2017 slide archive for updates.
  • Key Considerations for Software Updates for Embedded Linux and IoT
    The Mirai botnet attack that enslaved poorly secured connected embedded devices is yet another tangible example of the importance of security before bringing your embedded devices online. A new strain of Mirai has caused network outages to about a million Deutsche Telekom customers due to poorly secured routers. Many of these embedded devices run a variant of embedded Linux; typically, the distribution size is around 16MB today. Unfortunately, the Linux kernel, although very widely used, is far from immune to critical security vulnerabilities as well. In fact, in a presentation at Linux Security Summit 2016, Kees Cook highlighted two examples of critical security vulnerabilities in the Linux kernel: one being present in kernel versions from 2.6.1 all the way to 3.15, the other from 3.4 to 3.14. He also showed that a myriad of high severity vulnerabilities are continuously being found and addressed—more than 30 in his data set.
  • APNIC-sponsored proposal could vastly improve DNS resilience against DDoS