Language Selection

English French German Italian Portuguese Spanish

Jolla Users Blog

Syndicate content
Updated: 14 hours 26 min ago

More in Tux Machines

Security: Updates, "US Huawei Blackballing Efforts" and Microsoft's Back Doors Keep Crackers Busy

  • Security updates for Tuesday
  • US Huawei Blackballing Efforts Stall Due To Lack Of 'Actual Facts'
    During the Trump era, the US government has dramatically ramped up claims that Chinese hardware vendor Huawei is a nefarious spy for the Chinese government, blackballing it from the U.S. telecom market. From pressuring U.S. carriers to drop plans to sell Huawei phones to the FCC's decision to ban companies from using Huawei gear if they want to receive federal subsidies, this effort hasn't been subtle. While Huawei should never be confused with a saint (what telecom company would be?) there's several problems with the effort. The biggest being that despite a decade of hand-wringing and one eighteen month investigation by the US government, there's still no public evidence Huawei uses its network gear to spy on Americans. That's not sitting well with countries we've asked to join along in the fun.
  • Sorry, Linux. We know you want to be popular, but cyber-crooks are all about Microsoft for now
    Eight out of the ten most exploited vulnerabilities tracked by threat intelligence biz Recorded Future in 2018 targeted Microsoft products – though number two on its list was, surprise surprise, a Flash flaw. The most exploited vuln in the firm's hall of shame was a remote code execution flaw in Windows' VBScript engine that could pwn users who opened a booby-trapped web page with Internet Explorer. "Exploit kits associated with this vulnerability were noted to spread the malware Trickbot through phishing attacks," said Recorded Future in a report published today. The Flash vuln was none other than one exploited by North Korean state-backed hackers – first detected by South Korea's CERT, which discovered a flood of booby-trapped MS Office documents, web pages, spam messages and more.

Graphics and Games: NVIDIA, Orbital/Vulkan, Cataclysm and System Shock 3

  • NVIDIA Shows Off Quake II Path-Traced Using Vulkan RTX/Ray-Tracing
    ne of the demos NVIDIA is showing off this week at their GPU Technology Conference is Quake II being path-traced using a Vulkan port of the game and adapted to handle VK_NV_ray_tracing functionality paired with the latest GeForce RTX GPUs. Q2VKPT is a path-traced version of Quake II started by a former NVIDIA intern and is rendered using Vulkan and does support Linux.
  • Orbital: A PlayStation 4 Emulator That Is Emulating The PS4's AMD GPU Using Vulkan
    Orbital is an open-source project providing a virtualization-based PlayStation 4 emulator that is still in its early stages but what interests us is its technical details including the use of Vulkan/SPIR-V. Orbital leverages QEMU and other open-source components. At this stage it's not running any PS4 games but is able to boot into safe mode on PS4 5.xx kernels.
  • Cataclysm - Dark Days Ahead, a free and open source turn-based survival game had a huge update
    It occurred to me today, that no one here at GOL seems to have ever written about the free and open source turn-based survival game Cataclysm - Dark Days Ahead. Okay, so what is it? A classic roguelike with a survival theme, set in a post-apocalyptic procedurally generated world.
  • System Shock 3 may see Linux support, OtherSide still working on Underworld Ascendant for Linux
    OtherSide Entertainment have teased out a new short video of System Shock 3 and it may see Linux support. Not to be confused with the crowdfunded System Shock reboot that Nightdive Studios are currently working on. System Shock 3 is being made with some of the original team behind the first two games as well like Warren Spector, so it should remain faithful to the series while being a rather nice upgrade in visuals.

Stable kernels 5.0.3, 4.20.17, 4.19.30, 4.14.107 and 4.9.164

  • Linux 5.0.3
    I'm announcing the release of the 5.0.3 kernel. All users of the 5.0 kernel series must upgrade. The updated 5.0.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.0.y and can be browsed at the normal kernel.org git web browser: http://git.kernel.org/?p=linux/kernel/git/stable/linux-st...
  • Linux 4.20.17
  • Linux 4.19.30
  • Linux 4.14.107
  • Linux 4.9.164

Firefox 66 Released

Firefox now prevents websites from automatically playing sound. You can add individual sites to an exceptions list or turn blocking off. Read more Also: Firefox 66 Arrives - Blocks Auto-Playing Sounds, Hides Title Bar By Default For Linux