Language Selection

English French German Italian Portuguese Spanish

Open source technology, enabling innovation

Filed under
OSS

One of the most exciting projects to come out of the open source revolution is Kubernetes, a tool helping companies running their software on cloud services. It enables them to get the most out of the processing power they’re paying for by identifying machines that are being underutilised. So, if the software detects that a machine is not being optimised, it will load it up with another task so it’s working as hard as it can.

Read more

More in Tux Machines

Best Linux Distributions that Look Like MacOS

The Linux world is filled with several distributions born of the desire to solve a specified problem using unique design and build approaches. There are distros created for chemists, astrologers, music producers, and there are ones created to emulate macOS. Do you miss the UI/UX of your old Mac? Or do you want to turn up your computing experience by giving your laptop a shiny new look with an appearance difficult to distinguish from macOS? Today’s list is of the best Linux distributions that look like macOS. Read more

Daniel Stenberg: Mr Robot curl

Vasilis Lourdas reported that he did a “curl sighting” in the show and very well I took a closer peek and what do we see some 37 minutes 36 seconds into episode 8 season 4… (I haven’t followed the show since at some point in season two so I cannot speak for what actually has happened in the plot up to this point. I’m only looking at and talking about what’s on the screenshots here.) Elliot writes Python. In this Python program, we can see two curl invokes, both unfortunately a blurry on the right side so it’s hard to see them exactly (the blur is really there in the source and I couldn’t see/catch a single frame without it). Fortunately, I think we get some additional clues later on in episode 10, see below. He invokes curl with -i to see the response header coming back but then he makes some questionable choices. The -k option is the short version of --insecure. It truly makes a HTTPS connection insecure since it completely switches off the CA cert verification. We all know no serious hacker would do that in a real world use. Perhaps the biggest problem for me is however the following -X POST. In itself it doesn’t have to be bad, but when taking the second shot from episode 10 into account we see that he really does combine this with the use of -d and thus the -X is totally superfluous or perhaps even wrong. The show technician who wrote this copied a bad example… Read more

Ampere's Arm-based eMAG CPU is now available in a workstation

Avantek offers the workstation with a few graphics cards options including the AMD FirePro W2100 2GB, a Radeon Pro WX 5100 8GB, and the Nvidia Quadro GV100 32GB. The workstation is only offered running Linux with a few different flavors including Ubuntu, centOS and Linux SUSE / openSUSE. Read more

It's Not A VPN-busting Bug, It's A Social Media Enhancer For UNIX Users

Kidding aside, this vulnerability applies to most UNIX based OSes, with most Linux distros, Android, iOS, macOS, FreeBSD, and OpenBSD all affected. The attacker needs to be able to intercept your data, which means they need to already be on the same network span as your machine or by having control of the router or other exit point, but if they do they can use this flaw to determine the exact SEQ and ACK numbers in your encrypted session. That information can be used to successfully inject data, hijack the connection and possibly redirect your VPN session to imposter pages or other places on the web you really don’t want to go to. Not all VPNs are vulnerable, the researches quoted at The Register tested this on OpenVPN, WireGuard, and IKEv2/IPSe. Read more