Language Selection

English French German Italian Portuguese Spanish

LXer

Syndicate content
Linux and Open Source news headlines
Updated: 1 hour 56 min ago

Linux tricks that can save you time and trouble

2 hours 4 min ago
Some command line tricks that can make you even more productive on the Linux command line.

The History of Various Linux Distros

3 hours 19 min ago
Linux has been around for almost 30 years. Here is a brief history of various popular Linux distros, the reasons for their creation and their philosophy.

Linux firewalls: What you need to know about iptables and firewalld

4 hours 33 min ago
This article is excerpted from my book, Linux in Action, and a second Manning project that’s yet to be released.The firewallA firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through. Here’s a simple example:read more

How To Install Asterisk on Debian 9

6 hours 45 min ago
Asterisk is the most popular and widely adopted open source framework for building communications applications. It is used by individuals, small businesses, large enterprises and governments worldwide.

Ubuntu 18.10 Cosmic Cuttlefish New Features

8 hours 3 sec ago
Ubuntu 18.10 which is codenamed as Cosmic Cuttlefish is around the corner, is planned to be released next month on 18th October 2018. You will be able to download this release from the official website as well upgrade manually from previous releases. This time there is no alpha or beta milestones rather testing weeks for releases.

Linux adds a code of conduct for programmers

Tuesday 18th of September 2018 06:39:51 AM
In the aftermath of Linus Torvalds apologizing for how he[he]#039[/he]s been running the Linux kernel community, Linux has adopted a new code of conduct. But some now claim this means Linux is being taken over by social justice warriors.

Canonical Releases Ubuntu 18.04.1 Desktop Image Optimized for Microsoft Hyper-V

Tuesday 18th of September 2018 04:11:10 AM
Canonical has announced today the availability of an optimized Ubuntu Desktop images in the Microsoft Hyper-V gallery for Windows 10 Pro users who want to try out the latest Ubuntu Linux operating system.

How to install ClamAV (Antivirus) & ClamTK on Linux

Tuesday 18th of September 2018 02:56:50 AM
Linux is known for its high standards of security & there are very low amount of viruses that has been known to infect a Linux system. But in the recent times as technology is...

Linux pinky Command Tutorial for Beginners (8 Examples)

Tuesday 18th of September 2018 01:42:29 AM
The finger command in Linux is a popular tool to fetch information related to system users. Pinky is a lightweight alternative that comes pre-installed (at least on Ubuntu).

4 scanning tools for the Linux desktop

Tuesday 18th of September 2018 12:28:09 AM
While the paperless world isn't here quite yet, more and more people are getting rid of paper by scanning documents and photos. Having a scanner isn't enough to do the deed, though. You need software to drive that scanner.But the catch is many scanner makers don't have Linux versions of the software they bundle with their devices. For the most part, that doesn't matter. Why? Because there are good scanning applications available for the Linux desktop. They work with a variety of scanners and do a good job.read more

Working with Linux File Links

Monday 17th of September 2018 11:13:49 PM
Connecting a filename to the actual data is managed by the filesystem using a table or data structure, which is called a title allocation table. In the Linux filesystem, an Inode is the actual entry point to a specific file’s data on the hard disk. To simplify, you can just consider that the Inode represents the actual data of a file.

How to Monitor your Desktop PC with Conky on Ubuntu 18.04 LTS

Monday 17th of September 2018 09:59:29 PM
Conky is a free, open source, lightweight system monitoring tool available for Linux and BSD. It is used to monitor and display information of CPU consumption, disk usage, GPU temperature, fan speed, GPU clock, RAM utilization and network speed on the Linux or FreeBSD desktop

Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch

Monday 17th of September 2018 08:45:09 PM
A package manager man-in-the-middle vulnerability put Alpine Linux Docker images at risk, but a patch is available now.

Globbing and Regex: So Similar, So Different

Monday 17th of September 2018 07:32:30 PM
Grepping is awesome, as long as you don't glob it up! This article covers some grepand regex basics.

How gaming turned me into a coder

Monday 17th of September 2018 06:18:10 PM
I think the first word I learned to type fast—and I mean really fast—was "fireball."Like most of us, I started my typing career with a "hunt-and-peck" technique, using my index fingers and keeping my eyes focused on the keyboard to find letters as I needed them. It's not a technique that allows you to read and write at the same time; you might call it half-duplex. It was okay for typing cd and dir, but it wasn't nearly fast enough to get ahead in the game. Especially if that game was a MUD.read more

How to Take Screenshots in Ubuntu with a Time Delay

Monday 17th of September 2018 05:03:50 PM
In this article, we will explain how to take screenshots with a time delay both through the UI and the command line on Ubuntu 18.04.

Linux kernel's Torvalds: 'I am truly sorry' for 'unprofessional' rants, I need a break to get help

Monday 17th of September 2018 03:49:30 PM
Project chief vows to learn to 'understand people’s emotions' after F-bomb explosionsLinux kernel firebrand Linus Torvalds has apologized for his explosive rants, and vowed to take a break from the open-source project and seek help.…

Getting started with openmediavault: A home NAS solution

Monday 17th of September 2018 02:35:10 PM
With so many cloud storage options readily available, some folks might question the value of having a home NAS (network-attached storage) server. After all, with your files on the cloud, you don't have to worry about managing the maintenance, updates, and security of your own server.read more

Star Trek Excelsior Episode 5-4: “E.U.L.A.” a Star Trek Fan Audio Drama.

Monday 17th of September 2018 01:17:13 PM
A Star Trek Audio Fan Audio Drama is not exactly the going topic for LXer, but the title "E.U.L.A." should tell you everything you need to know why this particular episode is on topic here. This episode does not depend on any prior episodes, so you can jump right in and experience an adventure full of fire, intrigue, and how licensing affects peoples lives.

More in Tux Machines

Linux firewalls: What you need to know about iptables and firewalld

A firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through. Here’s a simple example... Read more

Mozilla: Firefox GCC/LLVM Clang Dilemma, September 2018 CA Communication and CfP

  • Fedora Firefox – GCC/CLANG dilemma
    After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries. The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6. Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.
  • September 2018 CA Communication
    Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:
  • Emily Dunham: CFP tricks 1
    Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

today's howtos

Security: Quantum Computing and Cryptography, Time to Rebuild Alpine Linux Docker Container

  • Quantum Computing and Cryptography
    Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length. This is why cryptographers are hard at work designing and analyzing "quantum-resistant" public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn't. But even assuming aliens have developed the technology to its full potential, quantum computing doesn't spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we're working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we'll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory -- albeit with significant loss of capability. At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
  • This New CSS Attack Restarts iPhones & Freezes Macs
  • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
  • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg