Linux and Open Source news headlines
Updated: 1 hour 33 sec ago
We recently interviewed Fedora user Eric Mesa on how he uses Fedora. This is part of a series here on the Fedora Magazine where we will profile Fedora users and how they use Fedora to get things done.
Debian is on its way to becoming what could be the first operating system to prove the origin of its binaries, technologist Micah Lee says. The feat will allow anyone to independently confirm that Debian binaries were built from a reported source package.
After announcing the first point release of Parsix GNU/Linux 7.0 (Nestor) on February 13, 2015, as reported on Softpedia on that day, Alan Baghumian had the pleasure of announcing the immediate availability for download and testing of the Parsix GNU/Linux 7.5 Test 1 (codename Rinaldo) distribution, which brings a small number of changes and improvements compared to the last stable version of the OS, Parsix GNU/Linux 7.0r1.
Interested in keeping track of what's happening in the open source cloud? Opensource.com is your source for news in OpenStack, the open source cloud infrastructure project.
Linus Torvalds has decided it's time for version 4.0 of the Linux kernel.
WPScan is a WordPress vulnerability scanner. You can use it for problem location in case there are any vulnerable WordPress themes or WordPress plugins on your website. Today, we will make a short presentation about how to install it on your Linux VPS. It is very easy to install as well as very easy to use.
Since HTTP/2 is largely based on SPDY, Nginx has a solid foundation already in the code to capitalize on, and in turn it'll make implementation of HTTP/2 easier and more streamlined," Garrett said. "The larger part of SPDY-enabled websites run on Nginx."
In the shell scripting we don't have any debugger tool but with the help of command line options (-n, -v and -x ) we can do the debugging.
Besiege is a physics based building game in which you construct medieval siege engines and lay waste to immense fortresses and peaceful hamlets.
Not surprisingly, the controversy over Lenovo installing Superfish adware into its consumer PCs has resulted in a lawsuit.
Devilspie 2 is a program that detects windows as they are created, and performs scripted actions on them. The scripts are written in LUA, allowing a great deal of customization. This tutorial will show you the installation of Devilspie 2 on Ubuntu 14.04 and give you a introduction into Devilspie scripting.
Arquetype 21 is available. Arquetype is a robust and stable operative system based on Fedora includes benefits of global engineering. Explore it, Arquetype works on intuitive interfaces and is made to be easy for all kind of users. If you want to develop on Linux, Arquetype give you preinstalled tools. We are free open source project and an alternative to other OS, with the most advanced desktop environment for user experience. Feel free to discover all options that Linux desktops offers to you, with speed and stability for your computer operation.
Weather Company CIO Bryson Koehler outlines five reasons why he believes in open source, explaining why his organization has been a big adopter of open source software.
The GNOME Chess app of the GNOME desktop environment has also been updated as part of the GNOME 3.16 Beta 1 release, which was announced by Matthias Clasen this past weekend. GNOME Chess (formerly glChess) is a software that lets users play the game of chess under GNOME and other open-source desktop environments.
Manjaro is a Linux distribution based on well-tested snapshots of the Arch Linux repositories and 100% compatible with Arch. A new version based on the upcoming Xfce 4.12 has been released in anticipation of the actual launch.
The list of software known to use the same HTTPS-breaking technology recently found preinstalled on Lenovo laptops has risen dramatically with the discovery of at least 12 new titles, including one that's categorized as a malicious trojan by a major antivirus provider...... Web searches for many of these titles uncover forum posts in which computer users complain that some of these applications are hard to remove once they're installed. Richard noted that he was unable to find documentation from any of the publishers explaining what effect Komodia software had on end-user PCs such as its ability to sniff passwords and other sensitive data from encrypted Web sessions.
This project provides brief instructions on how to build a Raspberry Pi-based cable shutter release and deploy a simple web app that can be used to control it.
After letting users decide the version numbering of the Linux kernel software, as Softpedia reported two weeks ago based on the Linus Torvalds’ Google+ poll for Linux kernel 3.20/4.0. Apparently, users decided that it was time for a change, so we’re happy to announce the immediate availability for testing of the first RC (Release Candidate) version of the forthcoming Linux 4.0 kernel.
There are many reasons why people use Bodhi Linux. Some use it because they really like the Enlightenment desktop, and Bodhi has pioneered the integration of Enlightenment to create a distro that is both beautiful, elegant and functional. Others use it because they want an operating system that stays out of their way. Again, although Enlightenment offers plenty of whistles and bells for those who need or want them, it can also be configured to be highly minimalist and use a very small amount of system resources.
Owners of Lenovo computers are, therefore, not the only folks at risk of man-in-the-middle (MitM) attacks. So exchanging your Lenovo computer for another Windows brand won’t do you much good.A real solution, a final solution, is one that does not involve the parties that caused the problem in the first place. And that solution is this: