Language Selection

English French German Italian Portuguese Spanish

Myah OS 3 Tech Demo 1

Filed under
Linux

I'm proud to announce the availability of Myah OS 3 Tech Demo 1. This is the first test version for Myah OS generation 3. This is simply a live CD showing off the the base system. Myah OS is no longer based or related to any existing linux system. All packages have been compiled by me from build scripts I have written. Myah is now a i686 system. Since this is a completely new system there is still a lot of work to be done. This test release is for those who would like to see the work done so far. This is not meant to be a stable release in anyway it's not even an alpha version.

As I said Myah has been compiled from the ground up. Here are some of the apps and libraries that make up this new system.

XFCE 4.4.0 with all the extras. Themed for MyahOS.
kernel 2.6.20.2 aufs squashfs with lzm
Beryl you will need to configure xorg.conf file for your system.
Xorg 7.2
Mesa 6.5.3git
Firefox 2.0.0.1 with mplayer plugin java 1.6.0 flash 9 and all the codecs.
Xine
Mplayer
XMMS
Xpaint
TuxPaint
Xsane
Gimp
Abiword
Xchat
Gaim
Gpated
Xfburn
Wifi Radar
Cups
Graveman
Streamtuner
Xarchiver
xfce4-taskmanager
xfce4-mixer

The new system is also using a simple package management system I have created. It utilizes tar.bz2 compression. At this stage there is only installing and removing of packages. But it is intended to include simple dependency checking and network installing and updating.

If you would like to try out the Tech Demo, read the Manual, or get
involved please check out this page:

http://forum.myah.org/viewtopic.php?t=396

More in Tux Machines

Leftovers: Software

today's howtos

Leftovers: OSS

Security Leftovers

  • Secure Server Deployments in Hostile Territory, Part II
    There are a few other general security practices I put in place. First, as I mentioned before, because each host has a certificate signed by an internal trusted CA for Puppet, we take advantage of those certs to require TLS for all network communications between hosts. Given that you are sharing a network with other EC2 hosts, you want to make sure nobody can read your traffic as it goes over this network. In addition, the use of TLS helps us avoid man-in-the-middle attacks.
  • Hackers Can Disable a Sniper Rifle—Or Change Its Target
    At the Black Hat hacker conference in two weeks, security researchers Runa Sandvik and Michael Auger plan to present the results of a year of work hacking a pair of $13,000 TrackingPoint self-aiming rifles. The married hacker couple have developed a set of techniques that could allow an attacker to compromise the rifle via its Wi-Fi connection and exploit vulnerabilities in its software. Their tricks can change variables in the scope’s calculations that make the rifle inexplicably miss its target, permanently disable the scope’s computer, or even prevent the gun from firing. In a demonstration for WIRED (shown in the video above), the researchers were able to dial in their changes to the scope’s targeting system so precisely that they could cause a bullet to hit a bullseye of the hacker’s choosing rather than the one chosen by the shooter.
  • Get root on an OS X 10.10 Mac: The exploit is so trivial it fits in a tweet
    Yosemite, aka version 10.10, is the latest stable release of the Mac operating system, so a lot of people are affected by this vulnerability. The security bug can be exploited by a logged-in attacker or malware on the computer to gain total unauthorized control of the Mac. It is documented here by iOS and OS X guru Stefan Esser. It's all possible thanks to an environment variable called DYLD_PRINT_TO_FILE that was added in Yosemite. It specifies where in the file system a component of the operating system called the dynamic linker can log error messages. If the environment variable is abused with a privileged program, an attacker can modify arbitrary files owned by the powerful user account root – files like the one that lists user accounts that are allowed administrator privileges.