Language Selection

English French German Italian Portuguese Spanish

Linux Today

Syndicate content
Updated: 3 hours 48 min ago

How to convert HTML to PDF with HTMLDoc on Debian 10

6 hours 46 min ago

HTMLDOC is an open-source program that can be used to convert HTML and Markdown source files to PostScript and PDF files.

How To Display Bash History Without Line Numbers

7 hours 46 min ago

This brief tutorial describes all the possible ways to display Bash history without line numbers on Linux.

An introduction to the vi editor

8 hours 46 min ago

The lowly and now middle-aged vi editor is still a favorite among *nix system administrators and remains an essential tool for command-line file creation and editing.

How to Delete Lines from a File Using sed Command?

9 hours 46 min ago

2DayGeek: sed command allows you to do lot of magic for file manipulation in Linux.

How to Copy/Move a Docker Container to Another Host

10 hours 46 min ago

Since Docker containers are little boxes of software, it can be easily copied and moved from computer to computer.

How to Transfer Files with Rsync over SSH

11 hours 46 min ago

Learn how to copy files with rsync over SSH.

How to Install and Configure OpenShift Origin PaaS Server on Ubuntu

Wednesday 21st of August 2019 02:00:00 AM

OpenShift is a free and open-source Platform-as-a-Service developed by Red Hat.

KNOPPIX Live GNU/Linux System Is Now Based on Debian GNU/Linux 10 "Buster"

Tuesday 20th of August 2019 10:00:00 PM

KNOPPIX 8.6 is now available based on the software repositories of the recently released Debian GNU/Linux 10 "Buster" operating system series

Six practical use cases for Nmap

Tuesday 20th of August 2019 09:00:00 PM

Nmap is a powerful network discovery and inventory tool for Linux.

System76 Unveils Graphical Firmware Updater for All Debian-Based Linux Distros

Tuesday 20th of August 2019 08:00:00 PM

The Firmware Manager project is System76's latest toy for the company's in-house built, Ubuntu-based Pop!_OS Linux distribution, but also compatible with any Debian-based GNU/Linux distro out there.

Hubstaff - Work Time Tracking Software for Productive Teams

Tuesday 20th of August 2019 07:00:00 PM

Hubstaff is a modern time tracking software for growing businesses.

A Raspberry Pi Based Open Source Tablet is in Making and it's Called CutiePi

Tuesday 20th of August 2019 06:00:00 PM

CutiePie is an 8-inch open-source tablet built on top of Raspberry Pi.

8 Useful mkdir Command Examples for Linux Users

Tuesday 20th of August 2019 04:00:00 PM

Learn mkdir command with 8 useful practical examples.

How to Create Availability Zones in OpenStack from Command Line

Tuesday 20th of August 2019 03:00:00 PM

Learn how to create and use host aggregate group and availability zones (AZ) in openstack from the command line

How to Remove Untracked Files in Git

Tuesday 20th of August 2019 12:00:00 PM

Linuxize: The files in the Git working directory can be either tracked or untracked.

Openwashing Report: It's Getting Worse, Fast. Everything is Apparently 'Open' Now Even Though It's Actually Proprietary.

Tuesday 20th of August 2019 02:00:00 AM

techrights: The latest examples (this past week's) of openwashing in the media, ranging from 5G to surveillance

RaspArch Project Now Lets You Run Arch Linux on Your Raspberry Pi 4 Computer

Monday 19th of August 2019 10:00:00 PM

RaspArch Build 190809 is now available to download and it is especially made for the recently released Raspberry Pi 4 Model B

How To Add a User to Sudoers On Debian 10 Buster

Monday 19th of August 2019 09:00:00 PM

Moreutils - A Collection Of More Useful Unix Utilities

Monday 19th of August 2019 08:00:00 PM

ostechnix: Moreutilis - A growing collection of more useful Unix utilities.

Share Your Keyboard and Mouse Between Linux and Raspberry Pi

Monday 19th of August 2019 07:00:00 PM

itsFOSS:This DIY tutorial teaches you to share mouse and keyboard between multiple computers using open source software Barrier.

More in Tux Machines

Security Leftovers

  • NSA Researchers Talk Development, Release of Ghidra SRE Tool

    The National Security Agency released its classified Ghidra software reverse-engineering (SRE) tool as open source to the cybersecurity community on April 4. NSA researchers Brian Knighton and Chris Delikat shared how Ghidra was built and the process of releasing it at Black Hat 2019. Ghidra is a framework developed by the NSA’s Research Directorate for the agency’s cybersecurity mission. It’s designed to analyze malicious code to give security pros a better understanding of potential vulnerabilities in their networks and systems.

  • Linux Is Being Hit with Zero-Day Exploits/ Zero-Day Attacks [Ed: This is not news. If you have a system that is unpatched for months, despite many warnings, it is a risk, no matter the OS/kernel.]

    It was once the popular opinion that Linux was immune to zero-day exploits. However, even before the Equifax exploit, vulnerabilities were found in Linux distributions like Fedora and Ubuntu. In particular, back in 2016, a security researcher discovered that you could exploit a Linux system by playing a specific music file. Then, in 2017, a group of attackers used Struckshock vulnerability to carry on the attack on Equifax. These zero-day attacks are Advanced Persistent Attacks that exploit recently discovered vulnerabilities. Read on to learn more about what are zero-day exploits and how they can affect a Linux system.

  • Intel, Google, Microsoft, and Others Launch Confidential Computing Consortium for Data Security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use.

  • Intel, Google, Microsoft, and others launch Confidential Computing Consortium for data security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use. Established by the Linux Foundation, the organization plans to bring together hardware vendors, developers, open source experts, and others to promote the use of confidential computing, advance common open source standards, and better protect data. “Confidential computing focuses on securing data in use. Current approaches to securing data often address data at rest (storage) and in transit (network), but encrypting data in use is possibly the most challenging step to providing a fully encrypted lifecycle for sensitive data,” the Linux Foundation said today in a joint statement. “Confidential computing will enable encrypted data to be processed in memory without exposing it to the rest of the system and reduce exposure for sensitive data and provide greater control and transparency for users.”

Linux-driven modules to showcase new MediaTek AIoT SoCs

Innocomm is prepping an “SB30 SoM” with the new quad -A35 MediaTek i300 followed by an “SB50 SoM” with an AI-equipped, octa-core -A73 and -A53 MediaTek i500. Both modules ship with Linux/Android evaluation kits. Innocomm, which has produced NXP-based compute modules such as the i.MX8M Mini driven WB15 and i.MX8M powered WB10, will soon try on some MediaTek SoCs for size. First up is an SB30 SoM due to launch in October that will run Linux or Android on MediaTek’s 1.5GHz, quad-core, Cortex-A35 based MediaTek i300 (MT8362) SoC. In November, the company plans to introduce an SB50 SoM based on the MediaTek i500 (MT8385). Read more

Devices: Raspberry Pi and More

Programming: Rust and Python Miscellany

  • This Week in Rust 300
  • Python String Interpolation with the Percent (%) Operator

    There are a number of different ways to format strings in Python, one of which is done using the % operator, which is known as the string formatting (or interpolation) operator. In this article we'll show you how to use this operator to construct strings with a template string and variables containing your data.

  • Your Guide to the CPython Source Code

    Are there certain parts of Python that just seem magic? Like how are dictionaries so much faster than looping over a list to find an item. How does a generator remember the state of the variables each time it yields a value and why do you never have to allocate memory like other languages? It turns out, CPython, the most popular Python runtime is written in human-readable C and Python code. This tutorial will walk you through the CPython source code. You’ll cover all the concepts behind the internals of CPython, how they work and visual explanations as you go.

  • Python 3.8 support in PyCharm

    The release of Python 3.8 brought new features to the Python coding realm. The language is evolving according to its community’s needs by addressing cases where new syntax or logic become necessary. From new ways of assigning expressions to restriction of usage of function declarations, calls, and variable assignations, this latest release presents new options to code. Of course, PyCharm couldn’t get behind, so we now support some of the major features coming with this new version. This article will walk you through the features currently supported by our latest PyCharm release. To try them out, get the latest version of PyCharm and download the current beta release of Python 3.8 from here. From there you will just need to switch to Python 3.8 as your interpreter in PyCharm (if you’re not sure how to switch the interpreter, jump into our documentation for help).

  • Python Arrays in a Nutshell

    Python arrays are homogenous data structure. They are used to store multiple items but allow only the same type of data. They are available in Python by importing the array module. Lists, a built-in type in Python, are also capable of storing multiple values. But they are different from arrays because they are not bound to any specific type. So, to summarize, arrays are not fundamental type, but lists are internal to Python. An array accepts values of one kind while lists are independent of the data type.