Language Selection

English French German Italian Portuguese Spanish

bigbearomaha's blog

Exploring Strange New Worlds...

Filed under
Just talk

I've seen it discussed before, but it sometimes doesn't really hit me until I see where someone who is talking around it, completely misses it.

Of course, I'm talking about the Star Trek influence. How close are we to realizing Star Trek Technology?

Personal Computing on the fly

Filed under
Linux

The cloud. It's the talk of the town and has been growing for awhile now.

Linux Can Take Over If It Sticks To What It Does Best. Appliances

Filed under
Linux

Everyone is always so fixated on desktop Linux and why it can't get decent numbers in the desktop market.

The answer is obvious. You can't come late into the game when someone has a huge installed base and expect to win based on free over easy.

Looking at the computer experience

Filed under
Linux

Just a bit of rambling about Linux, as well as reflections and meanderings about computer history in general

A Year Into Linux Mint Debian Edition

Filed under
Reviews

LMDE is a mixed bag. On one hand, you get a Debian install with the Mint specific user software that makes the end user a very nice experience. On the other hand, it's still being tweaked and played with. This can lead to some frustration with apps that haven't had all the kinks worked out yet.

Tabletop RPG's in a Linux World

Everyone knows about video games and the issues facing them in Linux. Not as many people are aware though that tabletop role Playing Games are experiencing a bit of a surge in popularity and that Linux and other open source software are able to assist in that growth.

What Does Linux and Role Playing Games Have in Common?

As a recently revived Game Master/DM going back to my RPG roots in Advanced Dungeons & Dragons, 1st Edition after about a 20 year absence, I find that computer technology has impacted Role Playing Games far beyond being able to play online.

Big Bear's Helpful Hints-Google Docs Spreadsheets

Filed under
Howtos

I like to jot down things that I learn how to do on the spur of the moment so that I can find it later.

I admit, in the 80's there was quite of bit of "herbal remedy" usage and my short term memory isn't what it could be. That's my story and I'm sticking to it.

I've decided that I might as well potentially help some other folks who might want to know about some of the things I discover, so I thought why not here?

For my very first post, I wanted to figure out how to sum cells across multiple pages in Google Docs spreadsheets.

Tomboy and Dropbox, the Dynamic Duo

Filed under
Linux

I just saw an article headline about Tomboy and it's strengths. It made me think about all the reasons I use Tomboy and perhaps my favorite reason for using it.

I use Dropbox because I like having access to files regardless of what computer I'm using or where I'm at. It is extremely helpful to me.

Looking for help to bring a new app to the world

Aloha folks,

For those programmers, packagers, etc... who might be looking to help on a new project, maybe you will find this interesting.

Cloud computing on Linux can help small business

Big companies like RedHat are getting into Software as a Service, otherwise known as "cloud computing".

School computer introductions

Filed under
Just talk

After reading an article recently on a similar topic, I got to thinking about what I was introduced to relating to computers when I was in school.

I was in high school when I got my first real introduction to computers.

Paranoia and criticism, how it was meant and how it is taken

Filed under
Linux

It's interesting to see how many people automatically associate criticism with "Anti-X distro".

One Linux to rule them all

There is a whole lot of noise being made about Googles OS announcement.

Most of it being made by raving distro fanboys who believe that by pledging their allegiance to one distro will make part of the 'cool crowd'

"No thanks Google, we have Ubuntu/Debian/Gentoo/pick one"

OpenSource Software Bounty Hunters

Wanted!

OpenSource developers to make software people actually want and need.

Bounty offered

See Sheriff for details

One computers' Linux experience

I suppose , in answer to the question "When will Linux be ready for the user desktop?"

It was ready almost two years ago in this house. Children use it daily, as well as computer phobic wives and memory challenged mad computer geniuses. (The 'genius' part is up for speculation.)

HackMy...phase II

For those of you who don't know, Hackmy... forums started out as a "advanced" forum for users of PCLinuxOS.

HackMy has moved to a new host and has a whole new look and goal though. Hackmy is now open to users of Linux, ANY distro.

How about "just using" instead of "migrating"?

Filed under
Linux

Take a big, deep breath and repeat after me, "There is no perfect OS, there is no perfect OS".

OK, fine, now read this.

The worlds best Linux Distro is now available.

Filed under
Humor

Here it is, the earth shaking, mind breaking, hip shaking est Linux distro ever. It will do "all dat" and more.

Want to know more about it? Knock on the big green emerald doors and ask to see the wizard.

Some Reasons NOT to use Linux. Ever. At all.

Filed under
Just talk

Reasons to not even bother trying Linux, ever : ( cue drum roll... )

Syndicate content

More in Tux Machines

Android Leftovers

One Mix Yoga 3 mini laptop demostrated running Ubuntu

If you are in interested in seeing how the Ubuntu Linux operating system runs on the new One Mix Yoga 3 mini laptop. You are sure to be interested in the new video created by Brad Linder over at Liliputing. “ I posted some notes about what happened when I took Ubuntu 19.04 for a spin on the One Mix 3 Yoga in my first-look article, but plenty of folks who watched my first look video on YouTube asked for a video… so I made one of those too.” The creators of the One Mix Yoga 3 have made it fairly easy to boot an alternative operating system simply by plugging in a bootable flash drive or USB storage device. As the mini laptop is powering up simply hit the delete key and you will be presented by the BIOS/UEFI menu. Simply change the boot priority order so that the computer will boot from a USB device and you are in business. Read more

Security: Curl, Fedora, Windows and More

  • Daniel Stenberg: openssl engine code injection in curl

    This flaw is known as CVE-2019-5443. If you downloaded and installed a curl executable for Windows from the curl project before June 21st 2019, go get an updated one. Now.

  • Fedora's GRUB2 EFI Build To Offer Greater Security Options

    In addition to disabling root password-based SSH log-ins by default, another change being made to Fedora 31 in the name of greater security is adding some additional GRUB2 boot-loader modules to be built-in for their EFI boot-loader. GRUB2 security modules for verification, Cryptodisk, and LUKS will now be part of the default GRUB2 EFI build. They are being built-in now since those using the likes of UEFI SecureBoot aren't able to dynamically load these modules due to restrictions in place under SecureBoot. So until now using SecureBoot hasn't allowed users to enjoy encryption of the boot partition and the "verify" module with ensuring better integrity of the early boot-loader code.

  • Fedora 31 Will Finally Disable OpenSSH Root Password-Based Logins By Default

    Fedora 31 will harden up its default configuration by finally disabling password-based OpenSSH root log-ins, matching the upstream default of the past four years and behavior generally enforced by other Linux distributions. The default OpenSSH daemon configuration file will now respect upstream's default of prohibiting passwords for root log-ins. Those wishing to restore the old behavior of allowing root log-ins with a password can adjust their SSHD configuration file with the PermitRootLogin option, but users are encouraged to instead use a public-key for root log-ins that is more secure and will be permitted still by default.

  • Warning Issued For Millions Of Microsoft Windows 10 Users

    Picked up by Gizmodo, acclaimed Californian security company SafeBreach has revealed that software pre-installed on PCs has left “millions” of users exposed to hackers. Moreover, that estimate is conservative with the number realistically set to be hundreds of millions. The flaw lies in PC-Doctor Toolbox, systems analysis software which is rebadged and pre-installed on PCs made by some of the world’s biggest computer retailers, including Dell, its Alienware gaming brand, Staples and Corsair. Dell alone shipped almost 60M PCs last year and the company states PC-Doctor Toolbox (which it rebrands as part of ‘SupportAssist’) was pre-installed on “most” of them. What SafeBreach has discovered is a high-severity flaw which allows attackers to swap-out harmless DLL files loaded during Toolbox diagnostic scans with DLLs containing a malicious payload. The injection of this code impacts both Windows 10 business and home PCs and enables hackers to gain complete control of your computer. What makes it so dangerous is PC-makers give Toolbox high-permission level access to all your computer’s hardware and software so it can be monitored. The software can even give itself new, higher permission levels as it deems necessary. So once malicious code is injected via Toolbox, it can do just about anything to your PC.

  • Update Your Dell Laptop Now to Fix a Critical Security Flaw in Pre-Installed Software

    SafeBreach Labs said it targeted SupportAssist, software pre-installed on most Dell PCs designed to check the health of the system’s hardware, based on the assumption that “such a critical service would have high permission level access to the PC hardware as well as the capability to induce privilege escalation.” What the researchers found is that the application loads DLL files from a folder accessible to users, meaning the files can be replaced and used to load and execute a malicious payload. There are concerns the flaw may affect non-Dell PCs, as well. The affected module within SupportAssist is a version of PC-Doctor Toolbox found in a number of other applications, including: Corsair ONE Diagnostics, Corsair Diagnostics, Staples EasyTech Diagnostics, Tobii I-Series Diagnostic Tool, and Tobii Dynavox Diagnostic Tool. The most effective way to prevent DLL hijacking is to quickly apply patches from the vendor. To fix this bug, either allow automatic updates to do its job, or download the latest version of Dell SupportAssist for Business PCs (x86 or x64) or Home PCs (here). You can read a full version of the SafeBreach Labs report here.

  • TCP SACK PANIC Kernel Vulnerabilities Reported by Netflix Researchers

    On June 17th, Researchers at Netflix have identified several TCP networking vulnerabilities in FreeBSD and Linux kernels.

  • DNS Security - Getting it Right

    This paper addresses the privacy implications of two new Domain Name System (DNS) encryption protocols: DNS-over-TLS (DoT) and DNS-over-HTTPS (DoH). Each of these protocols provides a means to secure the transfer of data during Internet domain name lookup, and they prevent monitoring and abuse of user data in this process. DoT and DoH provide valuable new protection for users online. They add protection to one of the last remaining unencrypted ‘core’ technologies of the modern Internet, strengthen resistance to censorship and can be coupled with additional protections to provide full user anonymity. Whilst DoT and DoH appear to be a win for Internet users, however, they raise issues for network operators concerned with Internet security and operational efficiency. DoH in particular makes it extremely difficult for network operators to implement domain-specific filters or blocks, which may have a negative impact on UK government strategies for the Internet which rely on these. We hope that a shift to encrypted DNS will lead to decreased reliance on network-level filtering for censorship.

Drawpile 2.1.11 release

Version 2.1.11 is now out. In addition to bug fixes, this release adds one long awaited feature: the ability to detach the chat box into a separate window. Another important change is to the server. IP bans now only apply to guest users. When a user with a registered account is banned, the ban is applied to the account only. This is to combat false positives caused by many unrelated people sharing the same IP address because of NAT. Read more Also: Drawpile 2.1.11 Released! Allow to Detach Chat Box into Separate