Linux and Open Source news headlines
Updated: 51 min 39 sec ago
There are a lot of reasons to choose a security-centric Linux distribution to test your network and system as in ethical hacking or penetration testing or security analysis. Are you looking? Luckily for you, there are a lot of them available for use. So let’s dive in and look at the best security centric Linux distributions.
If you're a SysAdmin, or work anywhere on the Ops side of DevOps, a rescue disc should be an essential part of your arsenal. With a bootable rescue system, either on a CD or on a thumb drive, you can recover a password, detect and remove a rootkit or other malware, repair a Master Boot Record, retrieve data from a damaged drive and more.
Intrinsyc’s Android 5.0-ready Open-Q 650 IP Camera Reference Design is built on a Snapdragon 650, and supports up to three 4K H.264/H.265 30fps streams. Intrinsyc Technologies has followed up on last year’s Open-Q 410 Wearable Camera Reference Design with a more powerful Open-Q 650 IP Camera Reference Design. Like the 410 model, the 650 IP […]
In early 2017, the Raspberry Pi Foundation announced a Google developer survey, which requested feedback from the maker community on what tools they wanted on the Raspberry Pi. The blog post says that Google has developed tools for machine learning, IoT, wearables, robotics, and home automation, and that the survey mentions face- and emotion-recognition, speech-to-text translation, natural language processing, and sentiment analysis.read more
Your Storage system has reached almost to the end of support and you want to migrate to newer technologies. Area of concern here is downtime and data-loss.Of course you can do this using backup and restore methodology or using pvmove. However, smart way for performing storage migration using lvconvert. This method does not involve downtime also it guarantees 100% against data-loss.
Atomic Host from Project Atomic is a lightweight, container-based OS built upon the principle of immutable infrastructure using the LDK (Linux, Docker, Kubernetes) stack. Atomic Hosts are built from standard RPM packages composed into filesystem trees using rpm-ostree. Atomic Host comes... Continue Reading →
Microsoft is feeding enemies of GNU/Linux and Free/Libre Open Source software (FLOSS) in order to sell its ‘protection’, which it names “IP Advantage” in a rather Orwellian fashion (same naming as back in the Novell days)
Are you interested in keeping track of what is happening in the open source cloud? Opensource.com is your source for news in OpenStack, the open source cloud infrastructure project.OpenStack around the webFrom news sites to developer blogs, there's a lot being written about OpenStack every week. Here are a few highlights.read more
Yes, SHA-1 has been cracked, but that doesn[he]#039[/he]t mean your code in Git repositories is in any real danger of being hacked.
Bruce Dubbs from the LFS and BLFS projects that allow experienced users to build their own Linux-based operating systems from scratch announced the release of Linux From Scratch 8.0 and Beyond LFS 8.0.
In this exercise, we learn about two of the most useful tools for troubleshooting networks. These tools will show what is happening as network traffic is transmitted and received. The tools are tcpdump and wireshark.
It has been widely speculated that NVIDIA will be unveiling a new flagship desktop GPU at the Game Developers Conference, which will be taking place in San Francisco this coming week. GDC just so happens to align perfectly with NVIDIA’s countdown timer.
Well, that didn't take long, and it looks like the recently released Linux 4.10 kernel series just got its first point release today, Linux kernel 4.10.1, marking the branch as stable and ready for deployment in stable OSes.
Last year, experts from Uber, Twitter, PayPal, and Hubspot, and many other companies shared how they use Apache Mesos at MesosCon events in North America and Europe. Their talks helped inspire developers to get involved in the project, try out an installation, stay informed on project updates, and generally get pumped to use and participate in Apache Mesos.
One of the world's oldest programming styles, the ladder logic that runs on industrial programmable logic controllers, remains dangerously vulnerable to attack, according to boffins from Singapore and India.
Manjaro ARM was built for ARM embedded devices and was doing a great job from over a year ago. Manjaro ARM supported devices like Raspberry Pi, Ocdroid, etc. Today a bad news came from Manjaro-arm team that it is going to shut down all the services. The team has to make this tough decision because of a low number of contributors. There were very fewer people to maintain and work on the development of this amazing distribution.
IBM OpenPOWER servers provide a firmware level security feature known as Trusted Boot. Trusted Boot helps defend against a boot code cyberattack by helping to verify that your server is running only authorized firmware. Integrity of your firmware is vital to the security of your system. Trusted Boot works by taking measurements of the executable boot code as the server boots and recording these measurements to a dedicated hardware security module known as the Trusted Platform Module (TPM). Together with a process known as remote attestation, you can use the data in the TPM to verify the integrity of your server's boot code.
This is the second edition of TWTWTW, a weekly blog proclaiming noteworthy news in the open source world. It provides a concise distilled commentary of notable open source related news from a different perspective. For the second edition, we present a succint catchup covering software, hardware, book releases, ending with a real Barry Bargain!
In most of the places I have worked there has been a centralized computer and application standard that was more or less mandatory for all employees. There are benefits of such an environment, which I will not go into in this piece, but for me, as an open source and Linux enthusiast, I try to use the tools I'm used to and like.