Linux and Open Source news headlines
Updated: 1 hour 11 min ago
digiKam, darktable, RawTherapee, and other open source photo management applications allow you to read and tweak metadata, but it’s fair to say that none of them can compete with ExifTool in terms of sheer power, flexibility, and speed.
Setting up encryption on your wireless router is one of the most important things you can do for your network security, but your router probably offers various different options—WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) among the alphabet soup. How-To Geek explains which one to choose for a faster, more secure home network.
More facts needed before class-action suit can proceedA US District Court judge has cast doubt on an antitrust lawsuit filed against Google, describing the damages sought as "speculative."…
WordPress 4.1 is out and one of its best new features is a revised “distraction free writing mode.” I seem to remember that it had something like this before, but it was not as well implemented as it is in WordPress 4.1. Now, when you push the distraction free writing mode button, everything else fades away except what you need to write your post.
There are lots of Linux laptops, but none that have the Free Software Foundation's blessings. That may change.
A security vendor alleges there's a vulnerability in the Linux kernel. Developers disagree, but ironically an unrelated critical bug was found.
This year on Opensource.com, we published a fantastic number of interviews with open source professionals. Our writers had the opportunity to talk to many talented leaders, engineers, community managers, and more—all of them stars in their fields, at their companies. Here are my favorite 10 interviews on Opensource.com in 2014. I highly recommend you bookmark them today!
On our Comcast Xfinity router, WPA2-PSK (TKIP), WPA2-PSK (AES), and WPA2-PSK (TKIP/AES) are all different options. Choose the wrong option and you’ll have a slower, less-secure network.
Jim Zemlin's final blog post of the year, kindly contributed by The Linux Foundation: "As we review 2014, a new story emerges: software development has fundamentally shifted toward an open source model."
The history of computing can be traced by the popular buzzwords of the day. In fact, at some point we should run a contest where everyone submits their 5 all-time favorite computer industry buzzwords. There have been dumb terminals, smart terminals, client server, thin client, peer-to-peer, virtualization, containers, cloud, paas, saas, iaas…the list, and the acronyms stretch to the horizon.
OpenStack Release Manager Thierry Carrez and the OpenStackopenstack Technical Committee have proposed a major overhaul to the project structure at OpenStack.
As the virtualization of U.S. defense agencies commences, the technology’s many attributes—and drawbacks—are becoming apparent.Virtualization has enabled users to pack more computing power in a smaller space than ever before. It has also created an abstraction layer between the operating system and hardware, which gives users choice, flexibility, vendor competition and best value for their requirements. But there is a price to be paid in the form of expensive and cumbersome equipment, software licensing and acquisition fees, and long install times and patch cycles.read more
Also make sure you protect your online privacy, and not just with Tails, in total privacy guide
Purrs like a beauty once you get her runningReview As has become par for the course with Fedora, the latest – Fedora 21 – has arrived months behind schedule. To its credit, it's well worth the wait.…
How to create a jailed ssh user with Jailkit on Debian WheezyThis document describes how to install and configure Jailkit in Debian Wheezy Server. Jailkit is a set of utilities to limit user accounts to specific files using chroot() and or specific commands. Setting up a chroot shell, a shell limited to some specific command, or a daemon inside a chroot jail is a lot easier and can be automated using these utilities.
If you are a network admin who are involved in testing an intrusion detection system or network access control policy, you may often rely on offline analysis using collected packet dumps. When it comes to storing packet dumps, libpcap's packet dump format (pcap format) is the most widely used by many open-source packet sniffing and […]Continue reading...The post How to filter, split or merge pcap files on Linux appeared first on Xmodulo.Related FAQs:What are popular packet sniffers on Linux How to install and configure tinc VPN on Linux How to set up Samba as a Primary Domain Controller How to set up two-factor authentication for SSH login on Linux How to create a site-to-site IPsec VPN tunnel using Openswan in Linux
We all know that Hollywood movies are the worst place to see some accurate depiction of anything from real life and that includes computer terminals.
If you're anything like me, you've probably heard about this new thing from Canonical called "Snappy" Ubuntu Core, but at the same time trying to understand exactly what it is may leave you cross-eyed, especially with the buzzwords such as "cloud", "containers" and "apps" floating about. Once you get a handle on it, it's obvious that Canonical's new baby isn't terribly useful for those of us who are simply users, but perhaps it provides an interesting preview of what could come to the desktop version of Ubuntu in the future.
The crystal ball has been vague and fuzzy for quite some time. Every pundit and voice has opined on what the upcoming year will mean to whatever topic it is they hold dear to their heart. In my case, we're talking Linux and open source.