Language Selection

English French German Italian Portuguese Spanish

Linux Today

Syndicate content
Updated: 1 hour 31 min ago

Bodhi Linux 5.0 Installation Guide with Screenshots

Monday 8th of October 2018 12:00:00 PM

LinuxBuzz: Bodhi Linux 5.0 is a lightweight and elegant Linux distribution entirely based on Ubuntu.

Functional programming in Python: Immutable data structures

Monday 8th of October 2018 11:00:00 AM

Immutability can help us better understand our code.

Linux 4.19 rc7

Monday 8th of October 2018 02:00:00 AM

LKML: Given the current rate of change, and looking at the travel/conference schedule happening this month, it seems like we will be having a -rc8.

What are the biggest challenges for Open Source? Interview With Peter Ganten

Sunday 7th of October 2018 09:00:00 PM

ostechnix: What are the biggest challenges for open source?

Microsoft's Patent Trolls Are Alive and Well, Seeding Destruction Among Microsoft's Competition

Sunday 7th of October 2018 05:00:00 PM

TechRights: Richard Lloyd shows that Intellectual Ventures continues to distribute its patents, sometimes to patent trolls from Texas

Disable or Enable SSH Root Login and Secure SSH Access in CentOS 7

Sunday 7th of October 2018 01:00:00 PM

CentOS comes with root access disabled for the outside world by default.

Linux ss Command Tutorial for Beginners (8 Examples)

Sunday 7th of October 2018 01:00:00 AM

When it comes to accessing socket related information through the command line in Linux, the first tool that comes to mind is netstat.

How to Install Apache Kafka Distributed Streaming Platform on Ubuntu

Saturday 6th of October 2018 09:00:00 PM

HowToForge: Apache Kafka is a distributed streaming platform developed by Apache Software Foundation and written in Java and Scala.

How to Remove Files and Directories Using Linux Command Line

Saturday 6th of October 2018 05:00:00 PM

Linuxize: Learn how to remove (or delete) a file or directory in Linux from the command line, using the rm (remove) command.

How to use the SSH and SFTP protocols on your home network

Saturday 6th of October 2018 01:00:00 PM Use the SSH and SFTP protocols to access other devices, efficiently and securely transfer files, and more.

Rancher Takes on Multicloud Kubernetes Management

Friday 5th of October 2018 11:00:00 PM

ServerWatch: One thing that happens over time is that organizations can end up with multiple deployments of Kubernetes in different places, something that is commonly referred to as - multicloud.

20 Red Hat Clustering (Pacemaker) Interview Questions and Answers

Friday 5th of October 2018 09:00:00 PM

 LinuxTechi: Deploying services in high availability is one of the most important and complex task for Linux geeks.

Microsoft Uses LOT Network to Spread Lies and Promote Its Protection Racket

Friday 5th of October 2018 08:00:00 PM

TechRights: A Red Hat- and Google-centric aggregator of software patents adds Microsoft as a member even though Microsoft continues to arm and fund patent trolls

Using open source Connection Poolers and Load Balancers to Scale PostgreSQL on Linux

Friday 5th of October 2018 07:00:00 PM

Learn how  to Scale your PostgreSQL database using open source connection poolers and load balancers.

What is agile?

Friday 5th of October 2018 06:00:00 PM

Forget everything you've ever learned about agile development.

How to Fix 'SSH Too Many Authentication Failures' Error

Friday 5th of October 2018 05:00:00 PM

Tecmint: Sometimes, while trying to connect to remote systems via SSH, you may encounter the error Received disconnect from x.x.x.x port 22:2: Too many authentication failures'

What we learned building a Zuul CI/CD cloud

Friday 5th of October 2018 04:00:00 PM Learn about valuable insight one team gained while developing a community cloud to support OpenStack.

Inspur Advances Open Compute Project With New Rack Servers

Friday 5th of October 2018 02:00:00 PM

ServerWatch: Datacenter server vendor Inspur is advancing its portfolio with the new OCP Standard Rack Server solution.

Linux market share on Steam now at a 16 month high after a rounding error was fixed

Friday 5th of October 2018 01:00:00 PM

GamingOnLinux: As it turns out, the Linux market share reported in the hardware survey for September was higher than initially reported.

Linux strace Command Tutorial for Beginners (8 Examples)

Friday 5th of October 2018 11:00:00 AM

HowToForge: The Linux command line offers many tools that are helpful for software developers.

More in Tux Machines

Browsing the web with Min, a minimalist open source web browser

Does the world need another web browser? Even though the days of having a multiplicity of browsers to choose from are long gone, there still are folks out there developing new applications that help us use the web. One of those new-fangled browsers is Min. As its name suggests (well, suggests to me, anyway), Min is a minimalist browser. That doesn't mean it's deficient in any significant way, and its open source, Apache 2.0 license piques my interest. Read more

Security: Patches, FUD and Voting Machines

  • libssh 0.8.4 and 0.7.6 security and bugfix release

    libssh versions 0.6 and above have an authentication bypass vulnerability in the server code. By presenting the server an SSH2_MSG_USERAUTH_SUCCESS message in place of the SSH2_MSG_USERAUTH_REQUEST message which the server would expect to initiate authentication, the attacker could successfully authentciate without any credentials.

  • A Cybersecurity Weak Link: Linux and IoT [Ed: Blaming "Linux" for companies that put default passwords on all their products? Windows has back doors.]
  • Undetectably bypass voting machines' anti-tamper mechanism with a bit of a soda-can

    But University of Michigan grad student Matt Bernhard has demonstrated that he can bypass the tamper-evident seals in seconds, using a shim made from a slice of a soda can. The bypass is undetectable and doesn't damage the seal, which can be resecured after an attacker gains access to the system.

  • Security Seals Used to Protect Voting Machines Can Be Easily Opened With Shim Crafted from a Soda Can

    Bernhard, who is an expert witness for election integrity activists in a lawsuit filed in Georgia to force officials to get rid of paperless voting machines used in that state, said the issue of security ties and seals came up in the lawsuit earlier this year when Fulton County Elections Director Richard Barron told the court that his Georgia county relies on tamper-evident metal and plastic ties to seal voting machines and prevent anyone with physical access to the machines from subverting them while they sit in polling places days before an election.


    He noted that defeating ties and seals in non-tamper-evident ways isn’t the only method to wreak havoc on an election in Michigan. The state has a unique law that prohibits ballots from being used in a recount if the number of voters doesn't match the number of ballots cast at a precinct or if the seal on a ballot box is broken or has a different serial number than what it should have. Someone who wanted to wreak havoc on an election or alter an election outcome in Michigan could purposely tamper with ballot box seals in a way that is evident or simply replace them with a seal bearing a different serial number in order to get ballots excluded from a recount. The law came into sharp relief after the 2016 presidential election when Green Party candidate Jill Stein sought to get a statewide recount in Michigan and two other critical swing states and found that some precincts in Wayne County couldn't be recounted because the number of voters who signed the poll books—which get certified with a seal signed by officials—didn't match the number of ballots scanned on the voting machines.

OSS: Hedera Hashgraph, Service Providers, and Renaming the Bro Project

  • Hedera Hashgraph Distributed Ledger Technology Shares New Open-Source SDK [Ed: Hedera needs to delete GitHub, however, as the new head of GitHub killed Java projects like Hedera's]
    Hedera Hashgraph, one of the DApp facilitators within the blockchain industry recently announced that it has released its Software Development Kit (SDK) in Java.
  • Service Providers Should Adapt to Open Source World
    Finding differing opinions on open source with the telecom industry isn't hard to do, especially where orchestration is concerned. That's why a panel discussion on open source and MANO at the Light Reading NFV-Carrier SDN event in Denver seemed an odd place to find such outspoken agreement on that topic, but there it was. Four smart guys, none shy with their opinions, all seemed to agree on key points around open source, the need for standards, the role of vendors and the lack of internal software skills. But they also agreed that telecom service providers are struggling a bit to understand how to proceed in an open source world and still need some fundamental internal changes.
  • Renaming the Bro Project
    More than 20 years ago I chose the name "Bro" as "an Orwellian reminder that monitoring comes hand in hand with the potential for privacy violations", as the original Bro paper put it. Today that warning is needed more than ever ... but it's clear that now the name "Bro" is alas much more of a distraction than a reminder. On the Leadership Team of the Bro Project, we heard clear concerns from the Bro community that the name "Bro" has taken on strongly negative connotations, such as "Bro culture". These send a sharp, anti-inclusive - and wholly unintended and undesirable - message to those who might use Bro. The problems were significant enough that during BroCon community sessions, several people have mentioned substantial difficulties in getting their upper management to even consider using open-source software with such a seemingly ill-chosen, off-putting name.

Back End: Apache Kafka, 'Serverless'