Language Selection

English French German Italian Portuguese Spanish

Linux Today

Syndicate content
Updated: 2 hours 15 min ago

Linux productivity: Why it's needed and the top 10 apps

4 hours 13 min ago

In this article, we will cover why increasing productivity on your Linux machine is important, along with the Top 10 apps to do so.

Wine Developers Concerned With Ubuntu Dropping 32-bit Support With Ubuntu 19.10

Sunday 23rd of June 2019 09:00:00 PM

The news that Ubuntu will drop support for the 32-bit x86 architecture was discussed recently by the Wine developers, on the Wine-devel mailing list.

Linux 5.2 rc6

Sunday 23rd of June 2019 05:00:00 PM

Linus Torvalds: I really was hoping that we'd continue to have an increasingly quiet and shrinking rc series. But that was not to be.

How to Understand Linux Top Command Output and Usage?

Sunday 23rd of June 2019 01:00:00 PM

2DayGeek: Learn, how to use top command to find performance issue in Linux.

Fragmentation: Understanding Disk and RAM Fragmentation

Saturday 22nd of June 2019 05:00:00 PM

EnterpriseStorageForum: Disk fragmentation is a common occurrence in modern operating systems and applications as data storage is often allocated in an non-sequential approach.

DevSecOps: 4 key considerations for beginners

Saturday 22nd of June 2019 01:00:00 PM

It isn't entirely up to the developer to implement DevSecOps standards within the organization.

Why culture is more important than tech adoption in a software-driven world

Saturday 22nd of June 2019 02:00:00 AM

To be successful in the cloud you need so much more than an agreement to adopt cloud technologies.

How to find files on the Ubuntu command line

Friday 21st of June 2019 10:00:00 PM

This article shows you how to find files using the Terminal which is the command line application in Ubuntu OS.

Using SSH and Tmux for screen sharing

Friday 21st of June 2019 09:00:00 PM

When screen sharing fails, use these SSH-based workarounds

How To Enable Or Disable SSH Access For A Particular User Or Group In Linux?

Friday 21st of June 2019 08:00:00 PM

Easy ways to enable or disable SSH access for a user or group in Linux.

For Loop Python Programming

Friday 21st of June 2019 07:00:00 PM

The for loop is one of the most widely used loops in programming

Setting Up Bind As a Private DNS Server on RHEL 8

Friday 21st of June 2019 06:00:00 PM

The Domain Name System (DNS) is a method used to translate human-readable domain names (or Fully Qualified Domain Names (FQDN)) to machine-readable IP addresses

Microsoft Attempting to Destroy the Careers of Its Critics, Including Free Software Proponents

Friday 21st of June 2019 05:00:00 PM

 techrights: Microsoft isn't changing and has not changed

How to Develop Own Custom Linux Distribution From Scratch

Friday 21st of June 2019 04:00:00 PM

Have you ever thought of making your own Linux Distribution?

BPF for security—and chaos—in Kubernetes

Friday 21st of June 2019 02:00:00 PM

At KubeCon + CloudNativeCon Europe 2019 there were multiple sessions with BPF in the title where developers talked about how BPF can be used to help with Kubernetes security, monitoring, and even chaos engineering testing

Free Command in Linux

Friday 21st of June 2019 01:00:00 PM

The free command provides information about the total amount of physical and swap memory as well as the free and used memory and swap space in the system.

Tech Giants Join Linux Foundation's Connected-Cities Efforts

Friday 21st of June 2019 12:00:00 PM

Why would tech giants like Facebook, Google, and IBM be interested in jumping on the connected-cities bandwagon?

rga: Search Text In PDF, Ebooks, Office Documents, Archives And More (ripgrep Wrapper)

Friday 21st of June 2019 02:00:00 AM

rga (or ripgrep-all) is a command line tool to recursively search all files in a directory for a regex pattern, that runs on Linux, macOS and Windows.

Run Docker Container in Background (Detached Mode)

Thursday 20th of June 2019 10:00:00 PM

Tecmint: Under Docker, an image developer can define image defaults related to detached or foreground running, and other useful settings.

More in Tux Machines

There's A Professional Grade Digital Cinema Camera Powered By Linux

Digital camera startup Octopus Cinema has been designing the "OCTOPUSCAMERA" as a digital cinema camera that's professional grade yet is an open platform with removable/upgradeable parts and this camera platform itself is running Linux. The OCTOPUSCAMERA supports up to 5K full frame recording, weighs less than 1kg, and is powered by Linux. It's a rather ambitious device and they aim to be shipping in 2020. Read more Also: Old Linus Torvalds is back: Linux page caching sparks 'bulls**t' outburst [Ed: Anti-Linux writers of the CBS tabloid ZDNet are mobbing Torvalds into silence again]

Android Leftovers

One Mix Yoga 3 mini laptop demostrated running Ubuntu

If you are in interested in seeing how the Ubuntu Linux operating system runs on the new One Mix Yoga 3 mini laptop. You are sure to be interested in the new video created by Brad Linder over at Liliputing. “ I posted some notes about what happened when I took Ubuntu 19.04 for a spin on the One Mix 3 Yoga in my first-look article, but plenty of folks who watched my first look video on YouTube asked for a video… so I made one of those too.” The creators of the One Mix Yoga 3 have made it fairly easy to boot an alternative operating system simply by plugging in a bootable flash drive or USB storage device. As the mini laptop is powering up simply hit the delete key and you will be presented by the BIOS/UEFI menu. Simply change the boot priority order so that the computer will boot from a USB device and you are in business. Read more

Security: Curl, Fedora, Windows and More

  • Daniel Stenberg: openssl engine code injection in curl

    This flaw is known as CVE-2019-5443. If you downloaded and installed a curl executable for Windows from the curl project before June 21st 2019, go get an updated one. Now.

  • Fedora's GRUB2 EFI Build To Offer Greater Security Options

    In addition to disabling root password-based SSH log-ins by default, another change being made to Fedora 31 in the name of greater security is adding some additional GRUB2 boot-loader modules to be built-in for their EFI boot-loader. GRUB2 security modules for verification, Cryptodisk, and LUKS will now be part of the default GRUB2 EFI build. They are being built-in now since those using the likes of UEFI SecureBoot aren't able to dynamically load these modules due to restrictions in place under SecureBoot. So until now using SecureBoot hasn't allowed users to enjoy encryption of the boot partition and the "verify" module with ensuring better integrity of the early boot-loader code.

  • Fedora 31 Will Finally Disable OpenSSH Root Password-Based Logins By Default

    Fedora 31 will harden up its default configuration by finally disabling password-based OpenSSH root log-ins, matching the upstream default of the past four years and behavior generally enforced by other Linux distributions. The default OpenSSH daemon configuration file will now respect upstream's default of prohibiting passwords for root log-ins. Those wishing to restore the old behavior of allowing root log-ins with a password can adjust their SSHD configuration file with the PermitRootLogin option, but users are encouraged to instead use a public-key for root log-ins that is more secure and will be permitted still by default.

  • Warning Issued For Millions Of Microsoft Windows 10 Users

    Picked up by Gizmodo, acclaimed Californian security company SafeBreach has revealed that software pre-installed on PCs has left “millions” of users exposed to hackers. Moreover, that estimate is conservative with the number realistically set to be hundreds of millions. The flaw lies in PC-Doctor Toolbox, systems analysis software which is rebadged and pre-installed on PCs made by some of the world’s biggest computer retailers, including Dell, its Alienware gaming brand, Staples and Corsair. Dell alone shipped almost 60M PCs last year and the company states PC-Doctor Toolbox (which it rebrands as part of ‘SupportAssist’) was pre-installed on “most” of them. What SafeBreach has discovered is a high-severity flaw which allows attackers to swap-out harmless DLL files loaded during Toolbox diagnostic scans with DLLs containing a malicious payload. The injection of this code impacts both Windows 10 business and home PCs and enables hackers to gain complete control of your computer. What makes it so dangerous is PC-makers give Toolbox high-permission level access to all your computer’s hardware and software so it can be monitored. The software can even give itself new, higher permission levels as it deems necessary. So once malicious code is injected via Toolbox, it can do just about anything to your PC.

  • Update Your Dell Laptop Now to Fix a Critical Security Flaw in Pre-Installed Software

    SafeBreach Labs said it targeted SupportAssist, software pre-installed on most Dell PCs designed to check the health of the system’s hardware, based on the assumption that “such a critical service would have high permission level access to the PC hardware as well as the capability to induce privilege escalation.” What the researchers found is that the application loads DLL files from a folder accessible to users, meaning the files can be replaced and used to load and execute a malicious payload. There are concerns the flaw may affect non-Dell PCs, as well. The affected module within SupportAssist is a version of PC-Doctor Toolbox found in a number of other applications, including: Corsair ONE Diagnostics, Corsair Diagnostics, Staples EasyTech Diagnostics, Tobii I-Series Diagnostic Tool, and Tobii Dynavox Diagnostic Tool. The most effective way to prevent DLL hijacking is to quickly apply patches from the vendor. To fix this bug, either allow automatic updates to do its job, or download the latest version of Dell SupportAssist for Business PCs (x86 or x64) or Home PCs (here). You can read a full version of the SafeBreach Labs report here.

  • TCP SACK PANIC Kernel Vulnerabilities Reported by Netflix Researchers

    On June 17th, Researchers at Netflix have identified several TCP networking vulnerabilities in FreeBSD and Linux kernels.

  • DNS Security - Getting it Right

    This paper addresses the privacy implications of two new Domain Name System (DNS) encryption protocols: DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH). Each of these protocols provides a means to secure the transfer of data during Internet domain name lookup, and they prevent monitoring and abuse of user data in this process. DoT and DoH provide valuable new protection for users online. They add protection to one of the last remaining unencrypted ‘core’ technologies of the modern Internet, strengthen resistance to censorship and can be coupled with additional protections to provide full user anonymity. Whilst DoT and DoH appear to be a win for Internet users, however, they raise issues for network operators concerned with Internet security and operational efficiency. DoH in particular makes it extremely difficult for network operators to implement domain-specific filters or blocks, which may have a negative impact on UK government strategies for the Internet which rely on these. We hope that a shift to encrypted DNS will lead to decreased reliance on network-level filtering for censorship.