Language Selection

English French German Italian Portuguese Spanish

Malicious Proprietary Software

Filed under
Microsoft
Software
  • Discord Is Not An Acceptable Choice For Free Software Projects

    Discord’s communication is not end to end (e2e) encrypted. It is encrypted only between the individual user and the servers operated by Discord Inc. Their spying extends to every single message sent and received by anyone, including direct messages betweeen users. The service can and does log every message sent, both in-channel and DMs. It is impossible to have a private conversation on Discord, as there will always be an unencrypted log of it stored by Discord. Discord can, at their option, provide those stored messages to any third party they wish, including cops or government snoops, for any reason, even without a legal order, without any obligation to tell you that they have done so.

  • [Attackers] Were Inside Citrix for Five Months

    Networking software giant Citrix Systems says malicious [attackers] were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents. The disclosure comes almost a year after Citrix acknowledged that digital intruders had broken in by probing its employee accounts for weak passwords.

  • [Vulnerable] firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts

    “Firmware is meant to be invisible to the user, and so it’s not surprising that most people don’t pay attention to it,” said Eclypsium CEO Yuriy Bulgin. “However, these components make up the foundation upon which every device, operating system, and application depends.”

    Researchers used unsigned firmware to show how an attacker could compromise an operating system remotely in order to steal network data. The highlighted flaws could also enable “direct-memory access” attacks which exploit a computer’s core operating system.

  • Aera Launches Cognitive ‘Business Brain’ Operating System [Ed: This is NOT an 'operating system". Terms misused these days.]

    Infor labels one of its core brands Infor OS and quite unashamedly uses the term operating system to explain the function of its industry-specific Enterprise Resource Planning (ERP) and Supply Chain Management (SCM) cloud software. Mountain View headquartered Aera Technology has used a similar naming convention within its branding and called its automation-centric cloud platform the Aera Cognitive Operating System.

  • Microsoft Defender ATP for Linux Now In Public Preview

    Microsoft Defender ATP for Linux is now available in a public preview that allows administrators and security professionals to test the product in six different Linux distributions.

  • Keen to check for 'abnormal' user behaviours? Microsoft talks insider risk, AWS imports and compliance at infosec shindig RSA [Ed: “Microsoft talks insider risk”; but Microsoft is the risk]

    As well as widening the preview of Microsoft Threat Protection, a system aimed at a more automated response to threats, the gang has also extended the cross-platform support for Microsoft Defender Advanced Threat Protection (ATP) to include a whole bunch of Linux distributions.

  • Microsoft plans to add Linux support for Chromium-based Edge

    Microsoft fought long and hard to maintain and push its own proprietary browser, even launching Edge, hoping to get away from the stigma against Internet Explorer. However, the dominating market share of Chromium-based browsers finally got to Microsoft, and the company announced it would rebuild Edge with the Chromium source code. Last month, we reported that Microsoft’s Chromium-based Edge was out of development and ready for public deployment.

This week as well (still)

Microsoft binary blobs in "Linux" news

  • Microsoft Defender ATP coming to Linux

    Last week, we reported that Microsoft plans to add Linux support for Chromium-based Edge. This week, Microsoft announced that it will be bringing another of its services to Linux: Microsoft Defender Advanced Threat Protection, which the company describes as follows:

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Python Programming

  • Python Meeting Düsseldorf - 2020-09-30

    The following text is in German, since we're announcing a regional user group meeting in Düsseldorf, Germany.

  • Making Concurrent HTTP requests with Python AsyncIO

    Python 3.4 added the asyncio module to the standard library. Asyncio allows us to run IO-bound tasks asynchronously to increase the performance of our program. Common IO-bound tasks include calls to a database, reading and writing files to disk, and sending and receiving HTTP requests. A Django web application is a common example of an IO-bound application. We’ll demonstrate the usage of concurrent HTTP requests by fetching prices for stock tickers. The only third party package we’ll use is httpx. Httpx is very similar to the popular requests package, but httpx supports asyncio.

  • Cogito, Ergo Sumana: Changes Coming To Pip In October 2020

    Changes Coming To Pip In October 2020: People who deal with Python: Changes are coming to pip, Python's package installation tool, in October 2020. Please share this migration guide and our video with your circles. [...] I'm working on improving the Python packaging toolchain, foundational work that will (in the long run) make the whole Python experience way less confusing. In the short term this may mess with some people's workflows, so we want lots of people to hear about it now.

  • Production ready Django App in Amazon Lightsail - Weblog

    This article is based in this documentation page and this video where Mike Coleman takes us how to deploy a Django application on Amazon Lightsail. It was also considered two articles from Bitnami (Getting started with Django, and Deploy a Django project).

  • Python's map(): Processing Iterables Without a Loop

    Python’s map() is a built-in function that allows you to process and transform all the items in an iterable without using an explicit for loop, a technique commonly known as mapping. map() is useful when you need to apply a transformation function to each item in an iterable and transform them into a new iterable. map() is one of the tools that support a functional programming style in Python.

  • Pandas Count Occurrences in Column – i.e. Unique Values

    In this Pandas tutorial, you are going to learn how to count occurrences in a column. There are occasions in data science when you need to know how many times a given value occurs. This can happen when you, for example, have a limited set of possible values that you want to compare. Another example can be if you want to count the number of duplicate values in a column. Furthermore, we may want to count the number of observations there is in a factor or we need to know how many men or women there are in the data set, for example.

  • Cleaning Text Data With Python

    Machine Learning is super powerful if your data is numeric. What do you do, however, if you want to mine text data to discover hidden insights or to predict the sentiment of the text. What, for example, if you wanted to identify a post on a social media site as cyber bullying. The first concept to be aware of is a Bag of Words. When training a model or classifier to identify documents of different types a bag of words approach is a commonly used, but basic, method to help determine a document's class. A bag of words is a representation of text as a set of independent words with no relationship to each other. It is called a “bag” of words, because any information about the order or structure of words in the document is discarded.

  • Quit Virtualenv and use Docker

    Don't get me wrong, I really like virtualenv and it's pretty useful in some scenarios. But sometimes you have to deal with OS dependencies and that forces you to install new packages and it can get a bit messy in some scenarios.

Purism/Librem, Librem Mini, and Librem 5 Updates

  • Desktop and Phone Convergence

    The Librem 5 is more than a phone, it’s a full desktop computer in your pocket designed to be just as mobile as you are.

  • Video Editing with KDenLive and the Librem Mini part 2: Keyframe Animations

    Last week we introduced you to a premier workflow for film editors and videographers using free software and freedom-respecting hardware – the Librem Mini and a video editing suite called KDenLive. We also dived into the features of KDenLive and how to achieve certain tasks like using chroma key to remove backgrounds and place objects in new environments. In this article we are going to focus on another important video creation task: keyframe animations. In the video below, we will demonstrate how we achieved a visual in a promo video displaying the workstation power of the Librem Mini, during a transition from a KDenLive screen recording and video footage of a colorful miniature train ride for children on display. Using an image of the minature train captured in a screenshot of the very first frame in the video, I was able to animate the train over the footage of the prior scene to create a captivating custom transition.

  • Software Development Progress July and August 2020

    This is another incarnation of the software development progress for the Librem 5. This time for July and August 2020 (weeks 27-35). Some items are covered in more detail in separate blog posts at https://puri.sm/news. The idea of this summary is so you can have a closer look at the coding and design side of things. It also shows how much we’re standing on the shoulders of giants reusing existing software and how contributions are flowing back and forth between upstream and downstream projects. This quickly gets interesting since we’re upstream for some projects (e.g. calls, phosh, chatty) and downstream for others (e.g Debian, Linux kernel, GNOME). So these reports are usually rather link heavy pointing to individual merge requests on https://source.puri.sm/ or to the upstream side (like e.g. GNOME’s gitlab). New software releases have an extra section so if you’re using phosh, squeekbord, phoc, chatty, etc. outside of PureOS this section might be worth a quick look.

today's howtos

GNU/Linux in Hardware, Arduino for Amazon Surveillance

  • Jetson Nano based system can be powered over Ethernet

    Aaeon’s compact, $475 “Boxer-8222AI” embedded box runs Linux on a Jetson Nano along with 4x USB 3.1 Gen2, HDMI 2.0, RS-232, M.2, mini-PCIe, 40-pin GPIO, and 2x GbE ports, one with PoE/PD. In April, Aaeon unveiled two compact systems: the Nvidia Jetson Xavier NX-based Boxer-8251AI and similar Jetson Nano based Boxer-8221AI. At the time, the company mentioned an upcoming Boxer-8222AI, but without offering details. It has now launched the system, which runs the Ubuntu 18.04 based ACLinux 4.9 on the Jetson Nano.

  •  
  • Run the Linux command line on your iPad

    Run a virtualized system using Alpine Linux with iSH, which is open source, but must be installed using Apple's proprietary TestFlight app

  • Light[s]well is a voice-controlled custom lighting installation

    Designed by Brian Harms of NSTRMNT, Light[s]well is a beautifully crafted 4’x8′ light installation for a triple-height living room that’s voice-responsive thanks to the Arduino Alexa skill. Light[s]well is constructed out of 80/20 extrusions and fasteners, with individually addressable LED strips embedded in the channels of the structure. 74 sheets of laser-cut cardstock make up the undulating light-diffusing wave pattern. According to Harms, 30 LEDs per meter strips were used to give each gap in the cardstock two LEDs per structural metal beam, for a total of six LEDs per gap. The LEDs are controlled by a MKR1000 (via a logic level shifter) along with the Arduino IoT Cloud.