Language Selection

English French German Italian Portuguese Spanish

LXer

Syndicate content
Linux and Open Source news headlines
Updated: 22 min 22 sec ago

Hacked! Unravelling a data breach

Friday 15th of October 2021 04:36:00 PM
This is a story about paying a steep price for a pair of cheap socks. The first loose thread in June One Tuesday morning as I was having my coffee and toast before kicking off the work day, I got a text from my credit card company alerting me to a suspected fraud charge.

Arch Linux vs Ubuntu: which to choose?

Friday 15th of October 2021 03:53:38 PM
Arch Linux and Ubuntu are two major Linux distributions that both get a lot of attention, have dedicated fanbases, and are used base-distributions for other systems that are forked off of them… But, how they do things are quite different, and some users might find one more to their liking than the other.

The newest Ubuntu Linux, Impish Indri, arrives

Friday 15th of October 2021 03:27:07 PM
First things first. An Indri, aka a Babakoto, is a very large lemur. Ubuntu 21.10, Impish Indri, is Canonical's latest Ubuntu Linux release. It's the short-term -- nine months of support -- predecessor to the company's next long-term support (LTS) version, Ubuntu 22.04.

You Can Now Upgrade Ubuntu 21.04 to Ubuntu 21.10, Here's How

Friday 15th of October 2021 02:44:44 PM
Ubuntu 21.10 is out today, so Ubuntu 21.04 users will probably want to upgrade their installations to the new release. And, for that, here's a step-by-step tutorial with screenshots.

The Compute Module Comes Of Age: Say Hello to the Real Cutting Edge Raspberry Pi

Friday 15th of October 2021 02:02:22 PM
If we wanted to point to an epoch-making moment for our community, we’d take you back to February 29th, 2012. It was that day on which a small outfit in Cambridge put on the market the first batch of their new product. That outfit was what would become the Raspberry Pi Foundation, and the product was a run of 10,000 Chinese made versions of their very first single board computer, the Raspberry Pi Model B. With its BCM2835 SoC and 512 megabytes of memory it might not have been the first board that could run a Linux distribution from an SD card, but it was certainly the first that did so for pocket money prices.

You Can Use Raspberry Pi 400 As a PC Keyboard and Mouse Combo

Friday 15th of October 2021 01:23:57 PM
If you’re a fan of Pimoroni, you’re probably familiar with its software lead Phil Howard (aka Gadgetoid) and his developments in the Raspberry Pi community. Today we’re sharing an awesome project he put together using our favorite keyboard PC, the Raspberry Pi 400. Using the right cable and a bit of code, the Raspberry Pi 400 can function as a regular, USB HID keyboard. The best Raspberry Pi projects are easy to recreate and the only accessory you need to pull this project off is a USB Type-C to USB Type-A cable.

Ubuntu 21.10 brings GNOME 40 debut and a focus on devs

Friday 15th of October 2021 12:22:25 PM
Ubuntu 21.10 comes out today, an interim release with nine months of support, and the first to use GNOME 40 for the desktop. The Ubuntu release cycle delivers a new LTS (Long Term Support) version every two years, the next one being 22.04 in April. This means that 21.10 is a handy preview of features that may not get production use until 22.04.

Ubuntu 21.10 Impish Indri Now Available for Download. This is What's new

Friday 15th of October 2021 11:20:53 AM
The final release of 2021 for Ubuntu - Ubuntu 21.10 Impish Indri is here, and we round up the release in this page.

Ubuntu 21.10 Official Flavors Released, Here’s What’s New

Friday 15th of October 2021 10:19:21 AM
As part of the today’s Ubuntu 21.10 “Impish Indri” release, all the official Ubuntu flavors have been updated to version 21.10 and I want you to be the first to read about their new features and improvements.

What Happens When You Run a Command in Linux?

Friday 15th of October 2021 09:17:49 AM
Most Linux users are often unaware of the internal working of the operating system. You might be running Linux commands on the shell for a long time, but have you ever wondered what's happening behind the scenes when you hit Enter? By the end, you'll have a brief understanding of how the shell processes the typed command in Linux.

Want a piece of GitLab? It's going to cost you: IPO price per share settles at $77

Friday 15th of October 2021 08:16:17 AM
The one-stop shop approach by DevOps darling GitLab appears to have attracted an Initial Public Offering price of $77, giving the loss-making biz a potential valuation of $11bn. GitLab finally filed for an IPO in September and this week upped the estimated price per share to between $66 and $69. The eventual price has turned out to be $77, well above the initial $55 to $60 first estimated.

How to Set Environment Variables in Docker

Friday 15th of October 2021 07:14:45 AM
Docker is an open-source application that provides lightweight operating-system-level virtualization through the use of containers. It is a kind of virtualization technology that is specially designed to easily develop and deploy applications inside of neatly packaged virtual containerized environments. Docker containers are in essence a set of software packages that run as one application that’s isolated from others. We can deploy it to any machine without any compatibility issues. By using this, the software stays system agnostic, simpler to use, less work to develop, and easy to maintain.

LibreOffice 7.2.2 Community Released with 68 Bug Fixes, Update Now

Friday 15th of October 2021 06:13:13 AM
The Document Foundation announced today the release of LibreOffice 7.2.2 as the second maintenance update to the latest and greatest LibreOffice 7.2 open-source office suite series.

How to Install PHP Composer on Debian 11

Friday 15th of October 2021 05:11:41 AM
PHP Composer is a dependency manager for PHP. In this tutorial, we will show you how to install Composer on Debian 11. All the steps should work on other Debian-based distributions as well.

KDE Plasma 5.23 Release Brings a Fresh Look with Performance Updates

Friday 15th of October 2021 04:10:09 AM
The 25th-anniversary edition - KDE Plasma 5.23 is released with brand-new features and performance updates. Here's what's new.

Ubuntu Unity 21.10 Released to Keep the Unity7 Desktop Alive in 2021

Friday 15th of October 2021 03:10:43 AM
The Ubuntu Unity team released today Ubuntu Unity 21.10 as the latest version of their unofficial Ubuntu flavor featuring the good old Unity desktop environment.

Google adds VM support to Anthos, admits not everyone is ready for containerised everything

Friday 15th of October 2021 02:09:11 AM
Google has added support for workloads running in virtual machines to its Anthos hybrid Kubernetes platform. "While we have seen many customers make the leap to containerization, some are not quite ready to move completely off of virtual machines," wrote Google Application Modernization Platform vice-presidents Jeff Reed and Chen Goldberg.

How To Install Jenkins on Rocky Linux 8

Friday 15th of October 2021 01:21:58 AM
Jenkins is an open-source continuous build system. In this guide, we walk you through the process of installing and configuring a Jenkins server on a Rocky Linux 8 machine. This guide is also applicable for other Red Hat Linux and SUSE Linux OS.

ISO establishes SBOM standard for open source development with SPDX

Friday 15th of October 2021 12:20:26 AM
You’re in the news. But not with the headline you want. You’re not getting attention because of your choice of text editor or the number of spaces you use to indent code blocks. However motivating those preferences are for you and me, the non-technical world sees them as private choices. You find your code in the headlines for a different and unpleasant reason: open source dependency management.

9 ways to use open source every day

Thursday 14th of October 2021 11:18:54 PM
Recently I was invited to present on free and open resources that are available on the web. This presentation was part of a local effort to keep our community working—sponsored by the Foster Center at St. Bonaventure University near my home. Some of the resources I shared were not open source and merely cost $0, but many of the tools were also open source.

More in Tux Machines

Ubuntu 22.04 LTS (Jammy Jellyfish) Daily Builds Are Now Available for Download

Ubuntu developer Steve Langasek was the one to announce earlier this week that the upcoming Ubuntu 22.04 LTS (Jammy Jellyfish) operating system is officially open for development, with Python 3.10 supported by default. And now, early adopters and application developers interested in test driving the upcoming release can now download the daily builds for Jammy Jellyfish, which you can grab from Ubuntu’s main download servers. Read more

today's leftovers

  • GNU Parallel 20211022 ('Sinclair') released

    GNU Parallel 20211022 ('Sinclair') has been released. It is available for download at: lbry://@GnuParallel:4

  • Python Permutations of a List

    You might have heard or worked on permutations in Mathematics or Calculus. In the realm of mathematics, it’s a very well-known idea. The permutation is said to be a set of possible outcomes generated from a single set. Similarly, the Python language also supports permutation by utilizing some of its built-in methods and modules. Today, we will learn to get the possible permutations of a single list by using different methods in Python.

  • Enrico Zini: Scanning for imports in Python scripts

    I had to package a nontrivial Python codebase, and I needed to put dependencies in setup.py. I could do git grep -h import | sort -u, then review the output by hand, but I lacked the motivation for it. Much better to take a stab at solving the general problem

  • C++ recursive function

    A process in which a specific function calls itself either directly or indirectly is known to be a recursion, and that respective function is a recursive function. The recursion process deals with the iteration of several numbers to the same function. To terminate the execution of a recursion process, we need to have a base case followed by any condition. This tutorial uses the involvement of recursion functions in C++, so before reading this, you must be familiar with the basics of this programming language. Recursion is an effective approach to dissolve the issues like complex mathematical computations tasks. This is done by distributing the task into sub-tasks. This process is done by following the divide and conquer rule. It’s not a mandatory thing to always use a recursion process in your program for the repetition. Any problem that is resolved through recursion can also get solved through iteration. But the recursive function is more efficient in programming as the code is very short and easily understandable while performing the same task. The recursion process is always recommended for issues like searching and sorting, tree traversals, etc.

  • C++ iterator tutorial

    An iterator is a pointer-like object that points towards an element present inside the container like arrays, structures, etc. A pointer is used to move through the data inside the container. Iterators play an important role in connecting with the containers through the algorithms. The pointer is an absolute part of the pointer. A pointer can iterate through the containers having elements by navigating and pointing towards the specific element. But not all the iterators are the same as pointers. The big advantage of iterator is that it offers an interface for any container type. Iterators are capable of making the algorithms independent of the container type. In other words, iterators are applied to every data type and every container.

  • C++ Diamond Problem

    A diamond problem is an issue that occurs in programming languages, especially in C++, when you are using multiple inheritances. Multiple inheritances in C++ are commonly used as a tool when the code is very lengthy. So to handle the source code, we use classes to manage the program. However, the multiple inheritances cause a problem if it is not used properly. These problems mainly contain the DIAMOND problem. This tutorial aims to highlight the main factors of the diamond problem, how it occurs from the multiple inheritances, and all the solutions required to resolve it. To execute the programs regarding “C++ diamond inheritance” in the Linux operating system, you need to have an Ubuntu system installed and running on the Virtual machine. Two tools are used. One is any editing tool, and as such, we will use the default “text editor” of Linux. You may use other preferred editing tools. The second one is the Ubuntu terminal. On which, you will run the program and can see the output displayed. First, we will discuss multiple inheritances in the article, as the “diamond problem” occurs in the case of having inheritance in the source code.

  • Fun and Scary Code from Qt and KDE

    These are some really cool or obfuscated code snippets for your amusement. We didn’t want to rate them, so the order doesn’t mean anything at all Just to make sure that there’s no misunderstanding: This code really is/was in the Qt or KDE repositories.

  • Retiring the I18N_NOOP macros

    Since decades KDE’s translation and localization framework KI18n provides a mechanism for marking strings for message extraction and deferred translation, the I18N_NOOP prepprocessor macros. Those can be very error prone though, so for KDE Frameworks 5.89 there is now a proposed replacement.

Open Hardware/Modding: Game Boy, RISC-V, and More

  • An Open Source Game Boy Printer That Doesn’t Print | Hackaday

    While we’ll admit seeing your Game Boy Camera shots come out on a little slip of thermal paper was pretty neat back in 1998, anyone who’s still using the Game Boy Printer these days is probably more interested in getting their images in digital form. Which is why the open source NeoGB Printer is so exciting. A collaborative effort between [Rafael Zenaro], [Raphaël BOICHOT], and [Brian Khuu], the project combines an ESP32 development board and some common components with their GPLv3 firmware to fully emulate the Game Boy Printer hardware. Once plugged into your Game Boy, any of the 110 titles that support Nintendo’s paper-pushing peripheral will recognize the NeoGB Printer as the real deal and happily send along the image.

  • Alibaba unveils RISC-V XuanTie processors - LinuxStoney

    Alibaba, one of the largest Chinese IT companies, announced the discovery of developments related to XuanTie E902, E906, C906 and C910 processor cores, based on the 64-bit architecture of the RISC-V instruction set. The open XuanTie kernels will develop under the new names OpenE902, OpenE906, OpenC906, and OpenC910. Diagrams, descriptions of hardware blocks in Verilog language, simulator and accompanying project documentation are published on GitHub under the Apache 2.0 license. Separately published adapted to work with chips XuanTie versions of compilers GCC and the LLVM , library Glibc to , tools of Binutils , loader the U-the Boot , the Linux kernel , middleware interface OpenSBI (RISC machines-the V the Supervisor Binary Interface), a platform for the creation of embedded Linux-based systems Yocto Project , and See also patches for launching the Android platform.

  • Mechanical Linkage CAD For Everyone | Hackaday

    The documentation says that it appears to run under Wine as well if you prefer to run it under Linux.

  • Mapping Dance syncs movement and stage lighting using tinyML | Arduino Blog

    Being able to add dynamic lighting and images that can synchronize with a dancer is important to many performances, which rely on both music and visual effects to create the show. Eduardo Padrón aimed to do exactly that by monitoring a performer’s moves with an accelerometer and triggering the appropriate AV experience based on the recognized movement. Padrón’s system is designed around a Raspberry Pi 4 running an MQTT server for communication with auxiliary IoT boards. Movement data was collected via a Nano 33 BLE Sense and its onboard accelerometer to gather information and send it to a Google Colab environment. From here, a model was trained on these samples for 600 epochs, achieving an accuracy of around 91%. After deploying this model onto the Arduino, he was able to output the correct gesture over USB where it interacts with the running Python script. Once the gesture is received, the MQTT server publishes the message to any client devices such as an ESP8266 for lighting and plays an associated video or sound.

Security Leftovers

  • Missouri Governor Doubles Down On 'View Source' Hacking Claim; PAC Now Fundraising Over This Bizarrely Stupid Claim

    Hey Missouri: stop electing technically illiterate dipshits. First you had Claire McCaskill, one of the key sponsors of FOSTA (who is still defending it years later). You got rid of her, but replaced her with Josh Hawley, who seems to think his main job in the Senate (besides whipping up support for insurrectionists and planning his run for the Presidency) is to destroy the internet and reshape it according to his own personal vision.

  • Irving Wladawsky-Berger: The Complex Interplay Between Cybersecurity and Regulatory Compliance

    Cybersecurity threats have significantly increased since March of 2020 when much of the economy was forced online to help us cope with the Covid crisis, including a number of high profile attacks by international criminal groups and adversarial governments. This past June, FBI Director Christopher Wray compared the danger of ransomware attacks on US firms by Russian criminal groups to the 9/11 terrorist attacks. When Biden and Putin met in Geneva a few weeks later, cyberweapons control was at the top of the agenda, a spot previously occupied by the control of nuclear weapons. It’s been clear for a while that in a world increasingly governed by digital data and transactions, our existing cybersecurity methods have been far from adequate. To learn more about this very important area, earlier this year I joined CAMS, MIT’s interdisciplinary cybersecurity initiative, and started attending its research seminars. At a recent seminar, I heard a very interesting presentation on Compliance and Cybersecurity by CAMS research affiliate Angelica Marotta. Her seminar was based on Convergence and divergence of regulatory compliance and cybersecurity, a recent paper she co-authored with MIT professor Stuart Madnick.

  • Supply Chain Attack: NPM Library Used By Facebook And Others Was Compromised [Ed: Microsoft is serving malware]

    Here at Hackaday we love the good kinds of hacks, but now and then we need to bring up a less good kind. Today it was learned that the NPM package ua-parser-js was compromised, and any software using it as a library may have become victim of a supply chain attack. What is ua-parser-js and why does any of this matter? In the early days of computing, programmers would write every bit of code they used themselves. Larger teams would work together to develop larger code bases, but it was all done in-house. These days software developers don’t write every piece of code. Instead they use libraries of code supplied by others.

  • Malware Discovered in Popular NPM Package, ua-parser-js [Ed: Microsoft is serving malware again, but nobody even mentions Microsoft]

    Versions of a popular NPM package named ua-parser-js was found to contain malicious code. ua-parser-js is used in apps and websites to discover the type of device or browser a person is using from User-Agent data. A computer or device with the affected software installed or running could allow a remote attacker to obtain sensitive information or take control of the system.

  • Big Tech is pushing a 'national cloud.' Critics say Big Tech would profit from it.

    A steady drumbeat from some of the most influential executives in the technology industry has emerged in recent months to push the idea that the U.S. government should invest in a "national research cloud" — a hub for U.S. research into artificial intelligence where researchers from academia and smaller tech companies could share data sets and other resources.

    It's an idea that has been backed by a government commission led by ex-Google CEO Eric Schmidt and including executives from Amazon, Microsoft and Oracle, which recommended that the Biden administration create a hub for U.S. research into artificial intelligence. The White House has warmed up to the idea, ordering another report on it due next year with an eye toward competing with China on the development of artificial intelligence.

  • Windows ransomware gang moves earnings, others slam US after REvil takedown

    A number of Windows ransomware gangs have reacted to the reported takedown of the REvil gang, with one of them, Darkside, now known as BlackMatter, moving some of the bitcoin it holds, according to a statement from the cryptocurrency tracking firm Elliptic.

  • The True Cost of Upgrading Your Phone

    But financial advisers see this differently. By some estimates, an investment of $1,000 in a retirement account today would balloon to about $17,000 in 30 years.

    In other words, $700 to $1,000 — the price range of modern smartphones — is a big purchase. Fewer than half of American adults have enough savings set aside to cover three months of emergency expenses, according to the Pew Research Center. Yet one in five people surveyed by the financial website WalletHub thought a new phone was worth going into debt for.

  • Geriatric Microsoft Bug Exploited by APT Using Commodity RATs [iophk: Windows TCO]

    Disguised as an IT firm, the APT is hitting targets in Afghanistan & India, exploiting a 20-year-old+ Microsoft Office bug that’s as potent as it is ancient.

  • Malicious campaign uses a barrage of commodity RATs to target Afghanistan and India [iophk: Windows TCO]

    A typical infection would consist of a malicious document, such as an RTF file exploiting CVE-2017-11882, a stack overflow vulnerability that enables arbitrary code execution on a vulnerable version of Microsoft Office.

    The recon phase deployed a custom file enumerator and infector module. This module aimed to discover all the different Office files on an infected endpoint. The infector module is meant to weaponize all .doc, .docx and .rtf files present in removable drives connected to the system to exploit CVE-2017-11882.

    The attack phase consists of deploying RAT payloads, such as DcRAT and QuasarRAT, to the victim's endpoint instead of the file recon and infector modules seen previously. All the malware observed in the attack phase of the campaign consisted of commodity RATs compiled and deployed with minimal changes.