Language Selection

English French German Italian Portuguese Spanish

Proprietary Software and DRM

Filed under
Software
  • Beware the looming Google Chrome HTTPS certificate apocalypse!

    Thanks to a decision in September by Google to stop trusting Symantec-issued SSL/TLS certs, from mid-April Chrome browser users visiting websites using a certificate from the security biz issued before June 1, 2016 or after December 1, 2017 will be warned that their connection is not private and someone may be trying to steal their information. They will have to click past the warning to get to the website.

    This will also affect certs that use Symantec as their root of trust even if they were issued by an intermediate organization. For example, certificates handed out by Thawte, GeoTrust, and RapidSSL that rely on Symantec will be hit by Google's crackdown. If in doubt, check your cert's root certificate authority to see if it's Symantec or not.

  • Watch Netflix in 1080p on Linux and unsupported browsers

    In fact, the only browsers that support 1080p playback on Netflix officially are Safari on Mac OS X, Internet Explorer on Windows, and Google Chrome on Chrome OS. That's bad news if you don't use any of the operating systems or prefer to use a different browser.

  • Station – A Smart Workstation for All Your Apps

    Today, we bring you a similar app and this one is bold enough to tag itself the “first smart workstation for busy people“. It goes by the name of Station, a free web app that combines all your web apps in one neat & productive User Interface.

  • Skype Now Easier To Install On Linux Desktop

More in Tux Machines

DragonFlyBSD 5.2.1 Released

While DragonFlyBSD 5.3/5.4 is exciting on the performance front for those making use of the stable DragonFly operating system releases, DragonFlyBSD 5.2.1 is available this week. This is the first and perhaps only point release over DragonFly 5.2.0 that premiered back in April. DragonFlyBSD 5.2 brought stabilization work for HAMMER2 to make it ready for more users, Spectre and Meltdown kernel work, and months worth of other important updates. Read more

Do European Governments Publish Open Source Software?

From time to time I come across news articles about Governmental bodies in Europe adopting the use of Open Source Software. This seems to be a slowly increasing trend. But if European Governments make software for themselves, or are having it made for them, do they publish that software as Open Source? This was a question that came up in a meeting at one of my clients. To find an answer, I asked my friends at the FSFE NL-team and did a Quick Scan. Here are the results. The short answer: Yes, they do! The longer answer: read on. Read more

Openwashing and FOSS FUD

  • Release: The Winemakers Co-Op to Debut Collaborative Wine: Open-Source Chardonnay June 3
  • Facebook open sources Katran networking tool, outlines automation system called Vending Machine [Ed: When surveillance giants are engaging in openwashing campaigns (all the core code is secret and abuses people)...]
  • Facebook Open Sources Katran Load Balancer; Details Network Provisioning Tool
  • Security and Open Source: Open Source Components Save Time but Need to be Closely Monitored [Ed: After Black Duck, Snyk and White Source another anti-FOSS firm spreads its FUD to sell services; ads disguised as 'articles'. Many of them this month, flooding FOSS news.]
    Chris Wysopal, CTO of Veracode, said that “the universal use of components in application development means that when a single vulnerability in a single component is disclosed, that vulnerability now has the potential to impact thousands of applications – making many of them breachable with a single exploit.”.
  • Linux Redis Automated Mining For Worm Analysis and Safety Advice [Ed: Rather old an issue]
    Since Redis has not authorized the disclosure of the attack method of root authority of Linux system, because of its ease-of-use, the hacking behaviors of mining and scanning of Linux services by using this issue have been endless. Among the many cases that handle this problem to invade the server for black production, there is a class of mining that USES this problem and can automatically scan the infected machine with pnscan. The attack has always been there, but it has shown a recent trend of increasing numbers, which has been captured many times, and we've been able to do a specific analysis of it.
  • Turla cyberespionage group switched to open-source malware [Ed: Crackers share code, so let's badmouth FOSS?]
    The Turla cyberespionage group has implemented some new tactics over the last few months incorporating some open-source exploitation tools instead of relying solely on their own creations to run campaigns. ESET researchers found that starting in March the Turla has been leveraging the open-source framework Metasploit to drop the group's proprietary Mosquito backdoor. The group has periodically used open-source hacking tools for other tasks, but ESET believes the group has never before used Metasploit as a first stage backdoor.
  • A Complete Beginner’s Guide to Not Getting Hacked
    Crackers are so to speak the evil hackers. Although these very often also do not offer the possibilities in order to do justice to the descriptions of the media. Then there are the would-be hackers, also called ScriptKiddies who use themTrojan2 and pre-programmed programs to get into computers and do damage. The “Kiddie” leads is a departure from the English “kid” (child), since young people are often behind such attacks. Due to their young age and lack of experience, ScriptKiddies often do not even know what they are doing. Let me give you an example. I have seen ScriptKiddies that use methods to intrude into Windows NT Calculator tried to break into a Linux machine. ScriptKiddies are often bored teenagers who try to have fun with the first tool. These tools are usually so simply knitted that actually, each normal, somewhat educated user can serve them. [...] According to Blendrit, co-founder at Tactica “One thing is clear: this language culture is constantly evolving, and many words find their way into the media, where they have a completely different meaning. Just as our most famous word, “hacker”, has fared.”

Kata Containers 1.0

  • Kata Containers 1.0
    The 1.0 release of Kata Containers is here! Thank you to the more than 40 individuals who have contributed to the first release of Kata Containers and to developing the Kata community.
  • VM-container chimera Kata Containers emerges from lab
    The open source Kata Containers project, an effort to combine the security advantages of virtual machines with the deployment and management advantages of software-based containers, hit its 1.0 milestone on Tuesday. Forged from a merger of Intel’s Clear Containers and Hyper’s runV announced last December, Kata Containers delivers an Open Container Initiative (OCI)-compatible runtime that addresses the downside of traditional container architecture, a shared kernel.
  • Kata Containers Project Releases 1.0 to Build Secure Container Infrastructure
  • Kata Containers 1.0
  • OpenStack Makes its Open Source CI/CD Platform Available to the Wider World
    The OpenStack Foundation made Zuul, an open source continuous integration/continuous development (CI/CD) platform, into an independent project. Zuul also released version 3 of its software. Zuul was originally developed for OpenStack CI testing and has since attracted contributors and users across many different organizations, including BMW, GoDaddy, OpenLab, and Wikimedia. It’s the third project to be managed by the OpenStack Foundation, joining OpenStack and Kata Containers.