Language Selection

English French German Italian Portuguese Spanish

Ubuntu 14.04 gets new lock screen and borderless windows

Filed under
GNU
Linux
Ubuntu

Canonical is making it really hard not to like Ubuntu 14.04 LTS. Last week, I discussed about the improvements and new features which has landed in Ubuntu 14.04. Since then, two new features have been added. Both of them have been previewed in earlier development cycles but never made it to a release build, until now.

Now Canonical is introducing brand new lock screen in Ubuntu 14.04, which is simply gorgeous. We have seen glimpses of this lock screen in the past. The proposal for this change was given way back in 2011.The bug report can be found here. The new lock screen is handled by LightDM and so it resembles the login screen. Unlike the previous lock screen, it now integrates well with the rest of the OS. Some of the system indicators such as sound, calendar (no meetings requests are displayed), user switching menu and language indicator are accessible while the screen is locked. Locking the screen does not stop music or video playback.

Read more ►

More in Tux Machines

Security Leftovers

  • Windows flaw lets attackers take over A-V software

    A 15-year-old flaw in every version of Windows right from XP to Windows 10 allows a malicious attacker to take control of a system through the anti-virus software running on the system.

  • Google Continues to Make Strides in Improving Android Security
  • Google cites progress in Android security, but patching issues linger
  • Dark Matter
    Today, March 23rd 2017, WikiLeaks releases Vault 7 "Dark Matter", which contains documentation for several CIA projects that infect Apple Mac Computer firmware (meaning the infection persists even if the operating system is re-installed) developed by the CIA's Embedded Development Branch (EDB). These documents explain the techniques used by CIA to gain 'persistence' on Apple Mac devices, including Macs and iPhones and demonstrate their use of EFI/UEFI and firmware malware. Among others, these documents reveal the "Sonic Screwdriver" project which, as explained by the CIA, is a "mechanism for executing code on peripheral devices while a Mac laptop or desktop is booting" allowing an attacker to boot its attack software for example from a USB stick "even when a firmware password is enabled". The CIA's "Sonic Screwdriver" infector is stored on the modified firmware of an Apple Thunderbolt-to-Ethernet adapter.

today's howtos

Kernel Space/Linux

Red Hat News