Language Selection

English French German Italian Portuguese Spanish

UNIX to Linux Porting: Project Considerations

Filed under
HowTos

Application porting refers to the process of taking a software application that runs on one operating system and hardware architecture, recompiling (making changes as necessary), and enabling it to run on another operating system and hardware architecture. In some cases, porting software from one platform to another may be as straightforward as recompiling and running verification tests on the ported application. In other cases, however, it is not as straightforward. In other cases, however, it is not as straightforward. Some large applications that were written for older versions of operating systems and compiled with native compilers may not adhere to present language standards and will be more difficult to port, requiring the full attention of project management.

The focus here is on software porting and migration process details and technical risks. All information in this chapter has been collected and gathered through countless porting engagements. This chapter presents best practices and methodologies to achieve high-quality ported applications. This chapter specifically appeals to those involved in software porting and migration projects, especially project managers and application architects.

Full Story.

More in Tux Machines

Project Releases

Security Leftovers

  • Krebs Goes Down, Opera Gets a VPN & More…
    Krebs on Security in record DDOS attack: Everybody’s go-to site for news and views of security issues, has been temporarily knocked offline in a DDOS attack for the record books. We first heard about the attack on Thursday morning after Brian Krebs reported that his site was being hit by as much as 620 Gbs, more than double the previous record which was considered to be a mind-blower back in 2013 when the anti-spam site Spamhaus was brought to its knees. Security sites such as Krebs’ that perform investigative research into security issues are often targets of the bad guys. In this latest case, Ars Technica reported the attack came after Krebs published the identity of people connected with vDOS, Israeli black hats who launched DDOS attacks for pay and took in $600,000 in two years doing so. Akamai had been donating DDoS mitigation services to Krebs, but by 4 p.m. on the day the attack began they withdrew the service, motivated by the high cost of defending against such a massive attack. At this point, Krebs decided to shut down his site.
  • Upgrade your SSH keys!
    When generating the keypair, you're asked for a passphrase to encrypt the private key with. If you will ever lose your private key it should protect others from impersonating you because it will be encrypted with the passphrase. To actually prevent this, one should make sure to prevent easy brute-forcing of the passphrase. OpenSSH key generator offers two options to resistance to brute-force password cracking: using the new OpenSSH key format and increasing the amount of key derivation function rounds. It slows down the process of unlocking the key, but this is what prevents efficient brute-forcing by a malicious user too. I'd say experiment with the amount of rounds on your system. Start at about 100 rounds. On my system it takes about one second to decrypt and load the key once per day using an agent. Very much acceptable, imo.
  • Irssi 0.8.20 Released
  • What It Costs to Run Let's Encrypt
    Today we’d like to explain what it costs to run Let’s Encrypt. We’re doing this because we strive to be a transparent organization, we want people to have some context for their contributions to the project, and because it’s interesting. Let’s Encrypt will require about $2.9M USD to operate in 2017. We believe this is an incredible value for a secure and reliable service that is capable of issuing certificates globally, to every server on the Web free of charge. We’re currently working to raise the money we need to operate through the next year. Please consider donating or becoming a sponsor if you’re able to do so! In the event that we end up being able to raise more money than we need to just keep Let’s Encrypt running we can look into adding other services to improve access to a more secure and privacy-respecting Web.
  • North Korean DNS Leak reveals North Korean websites
    One of North Korea’s top level DNS servers was mis-configured today (20th September 2016) accidentally allowing global DNS zone transfers. This allowed anyone who makes a zone transfer request (AXFR) to retrieve a copy of the nation’s top level DNS data. [...] This data showed there are 28 domains configured inside North Korea, here is the list: airkoryo.com.kp cooks.org.kp friend.com.kp gnu.rep.kp kass.org.kp kcna.kp kiyctc.com.kp knic.com.kp koredufund.org.kp korelcfund.org.kp korfilm.com.kp ma.gov.kp masikryong.com.kp naenara.com.kp nta.gov.kp portal.net.kp rcc.net.kp rep.kp rodong.rep.kp ryongnamsan.edu.kp sdprk.org.kp silibank.net.kp star-co.net.kp star-di.net.kp star.co.kp star.edu.kp star.net.kp vok.rep.kp
  • Yahoo’s Three Hacks
    As a number of outlets have reported, Yahoo has announced that 500 million of its users’ accounts got hacked in 2014 by a suspected state actor. But that massive hack is actually one of three interesting hacks of Yahoo in recent years.

Italian Military's LibreOffice Migration Underway; 100,000+ PCs To Be Migrated

As we reported exactly an year ago, Italian Military's plans to migrate its entire fleet of desktop PCs to LibreOffice is well underway and has reached its first milestone. Since the project got started about an year ago, the Italian military have switched over 8000 PC workstations to LibreOffice. Read more

Every Little Hacker needs a Little Linux Computer

I know what you’re probably all thinking, why isn’t this kid’s adorable face on every possible toddler related product currently on the market? Rest assured, I constantly remind my sister of how she could be exploiting his cuteness for millions of dollars- but I digress. Where were we? Oh right, Linux. Let’s talk hardware. If we’re building this little dude a Linux computer and we’re “ballin’ on a budget”, there’s no better choice than a Raspberry Pi. I mean he is a hacker in training, right? His typing (and well, hand coordination in general) isn’t that great yet, so we’ll need an over-sized keyboard. A big mouse pad, and a good wireless mouse will do well. Oh, and how about a VESA mount case for the Raspberry Pi so it stays out of the way? All of that should do nicely. Read more