Language Selection

English French German Italian Portuguese Spanish

Software: Feed Readers, Kiwi TCMS, Laverna, Tig, Flash Player and More

Filed under
Software
  • 5 Best Feed Reader Apps for Linux

    RSS feeds were once most widely used, to collect news and articles from different sources at one place. It is often perceived that RSS usage is in decline. However, there are still people (like me) who believe in opening an application that accumulates all the website’s articles at one place, which they can read later even when they are not connected to the internet.

    Feed Readers makes it easier by collecting all the published items on a website for anytime access. You don’t need to open several browser tabs to go to your favorite websites, and bookmarking the one you liked.

    In this article, I’ll share some of my favorite feed reader applications for Linux desktop.

  • Kiwi TCMS 4.1.4

    We're happy to announce Kiwi TCMS version 4.1.4! This is a bug-fix and enhancement update which upgrades to the latest Django version, resolves several issues and includes lots of internal code updates.

  • Laverna – A Cross-Platform Privacy-Focused Note Taking App

    FossMint has a number of Markdown note-taking app articles under its belt and it is with pleasure that we bring you another fantastic one, Laverna.

    Laverna is a modern open source Markdown editor with a sleek UI and a focus on user privacy. It is written in JavaScript to provide users with a speedy enough performance to stand in as an Evernote alternative.

    With Laverna, you can take notes and create to-do lists, both of which you can organize using notebooks. During editing, you can decide to work in normal, preview, or distraction – free mode.

  • Tig – A Command Line Browser for Git Repositories
  • What’s A Suitable Flash Player Alternative To Adobe Flash Player

    More people are willing to break away from Adobe Flash Player – perhaps because it won’t be long before support for it will end. While many are making a move from Flash, Adobe is still offering releases for it such as the Flash Player 24 branch. Of course, with numerous threats plaguing the player, people wonder if they are any viable options available.

  • New PELUX 1.0 Automotive Software Leverages Open Source Technologies
  • Epiq Solutions Unveils Highly Integrated RF + Linux® Module to Simplify Wireless Product Development Cycle
  • DOSBox Part 1: Introduction, Startup Scripts and The Keymapper

    This guide provides the necessary skills that will be used in each successive guide. The main focus of this series is to provide practical examples and tutorials for achieving certain tasks using DOSBox. Later tutorials will cover handling floppy disk images and booting from them, same with hard drive images, running Windows 3.11, and other advanced tasks.

  • Capsule8 Launches Zero-Day Threat Detection Platform for Linux [Ed: Capsule8 seems to be proprietary and nothing that is secret code should be trusted anywhere near secure systems]

    Security startup Capsule8 officially launched the 1.0 release of its zero-day threat detection platform on April 11, after more than a year of active development.

    Capsule8 1.0 is intended to help secure both container as well as non-container based Linux workloads from unknown zero-day threats. Among the risks that Capsule8 aims to help mitigate are side-channel memory attacks, like the recently disclosed Meltdown and Spectre vulnerabilities.

  • Introducing Snallygaster - a Tool to Scan for Secrets on Web Servers

    A few days ago I figured out that several blogs operated by T-Mobile Austria had a Git repository exposed which included their wordpress configuration file. Due to the fact that a phpMyAdmin installation was also accessible this would have allowed me to change or delete their database and subsequently take over their blogs.

More in Tux Machines

GNU: The GNU C Library, IRC Break, and GNUstep

  • Intel CET With Indirect Branch Tracking & Shadow Stack Land In Glibc
    Landing yesterday in Glibc for Intel's Control-flow Enforcement Technology (CET) were the instructions for Indirect Branch Tracking (IBT) and Shadow Stack (SHSTK). These Intel CET bits for the GNU C Library amount to a fair amount of code being added. The commit message explains some of the CET steps taken. The Control-flow Enforcement Technology behavior can be changed for SHSTK/IBT at run-time through the "GLIBC_TUNABLES" environment variable.
  • No Friday Free Software Directory IRC meetup on Friday July 20th
    No meeting will be taking place this week due to travel, but meetings will return to our regular schedule starting on Friday, July 27th.
  • Graphos GNUstep and Tablet interface
    I have acquired a Thinkpad X41 Tablet and worked quite a bit on it making it usable and then installing Linux and of course GNUstep on it. The original battery was dead and the compatible replacement I got is bigger, it works very well, but makes the device unbalanced. Anyway, my interest about it how usable GNUstep applications would be and especially Graphos, its (and my) drawing application. Using the interface in Tablet mode is different: the stylus is very precise and allows clicking by pointing the tip and a second button is also possible. However, contrary to the mouse use, the keyboard is folded so no keyboard modifiers are possible. Furthermore GNUstep has no on-screen keyboard so typing is not possible.

Oracle Solaris 11.3 and Solaris 11.4

  • Oracle Solaris 11.3 SRU 34 Brings GCC 7.3, Other Package Updates
    While Solaris 11.4 is still in the oven being baked at Oracle, the thirty-fourth stable release update of Solaris 11.3 is now available.
  • Oracle Solaris 11.3 SRU 34 released
    Full details of this SRU can be found in My Oracle Support Doc 2421850.1. For the list of Service Alerts affecting each Oracle Solaris 11.3 SRU, see Important Oracle Solaris 11.3 SRU Issues (Doc ID 2076753.1).
  • Oracle Solaris 11.4 Open Beta Refresh 2
    As we continue to work toward release of Oracle Solaris 11.4, we present to you our third release of Oracle Solaris 11.4 open beta.
  • Oracle Solaris 11.4 Public Beta Updated With KPTI For Addressing Meltdown
    In addition to sending down a new SRU for Solaris 11.3, the Oracle developers left maintaining Solaris have issued their second beta of the upcoming Solaris 11.4. Oracle Solaris 11.4 Open Beta Refresh 2 is an updated version of their public beta of Solaris 11.4 originally introduced in January. They say this is the last planned public beta with the general availability release now nearing availability.

Security: Back Doors in Voting Machines, Two-Factor Authentication, Introduction to Cybersecurity, and Reproducible Builds

  • Top Voting Machine Vendor Admits It Installed Remote-Access Software on Systems Sold to States
    The nation's top voting machine maker has admitted in a letter to a federal lawmaker that the company installed remote-access software on election-management systems it sold over a period of six years, raising questions about the security of those systems and the integrity of elections that were conducted with them. In a letter sent to Sen. Ron Wyden (D-OR) in April and obtained recently by Motherboard, Election Systems and Software acknowledged that it had "provided pcAnywhere remote connection software … to a small number of customers between 2000 and 2006," which was installed on the election-management system ES&S sold them. The statement contradicts what the company told me and fact checkers for a story I wrote for the New York Times in February. At that time, a spokesperson said ES&S had never installed pcAnywhere on any election system it sold. "None of the employees, … including long-tenured employees, has any knowledge that our voting systems have ever been sold with remote-access software," the spokesperson said.
  • PSA: Make Sure You Have a Backup for Two-Factor Authentication
  • An Introduction to Cybersecurity: The First Five Steps
    You read all these headlines about the latest data breaches, and you worry your organization could be next. After all, if TalkTalk, Target, and Equifax can’t keep their data safe, what chance do you have? Well, thankfully, most organizations aren’t quite as high profile as those household names, and probably don’t receive quite so much attention from cybercriminals. At the same time, though, no organization is so small or insignificant that it can afford to neglect to take sensible security measures. If you’re just starting to take cybersecurity seriously, here are five steps you can take to secure your organization more effectively than 99 percent of your competitors.
  • Reproducible Builds: Weekly report #168

today's howtos