Language Selection

English French German Italian Portuguese Spanish

KDE

Kat - Desktop Search Environment Updated

Filed under
KDE
Software

Kat is a framework designed to allow KDE applications to index and retrieve files. Today marks the release of version 0.6.3 fixing serveral bugs.

KDE kcheckpass Privilege Escalation Vulnerability

Filed under
KDE
Security

A vulnerability has been reported in kcheckpass, which potentially can be exploited by malicious, local users to gain escalated privileges. Patch available.

KDE and digiKam Receive TUX 2005 Readers' Choice Award

Filed under
KDE

With its Issue #6, TUX Magazine published the winners of its first annual Readers' Choice Awards, placing KDE in the first place in the "Favorite Desktop Environment" category and digiKam first in the "Favorite Digital Photo Management Tool".

Usability Events at aKademy 2005

Filed under
KDE

Usability has grown over the year since the last aKademy. During the Coding Marathon portion of the conference, the KDE-Usability group gave several presentations and tutorials so developers can learn more about usability, and get live usability support while they hacked away.

aKademy 2005 Concludes on Sunday

Filed under
KDE

The 2005 KDE conference aKademy in Malaga, Spain, ends on Sunday 4th of September. The Beach Party on Saturday night will be the grand finale of this event .

Collaboration and Integration at Developer's Conference

Filed under
KDE

The aKademy 2005 KDE Developers Conference finished yesterday with a second day of talks to prepare for KDE 4. Topics of the day included integration with other programming platforms, marketing KDE and accessibility.

aKademy Awards

Filed under
KDE

This year's aKademy saw a whole new innovation: The KDE Appreciation Awards, also known as the "aKademy Awards". Their purpose is to recognize outstanding contribution to the KDE community.

aKademy Developers Conference Prepares for KDE 4

Filed under
KDE

The 2005 KDE aKademy continued today with the opening of the developer conference: two days of talks describing upcoming KDE technologies, giving programming tips and, of course, plenty of informal hacking and discussion sessions between the developers.

aKademy 2005 Concludes

Filed under
KDE

The KDE Users and Administrators Conference has finished after two successful days of talks, discussion and partying.

aKademy 2005 Kicked Off!

Filed under
KDE

Following yesterday's rousing KDE e.V. meeting, aKademy 2005 officially kicked off today with dual presentation tracks filled with content designed for users and system administrators.

Syndicate content

More in Tux Machines

Open Source platforms to now help students

The technical institutes in the State are now asked to use free and open-source software developed by a team, headed by the Ministry of Human Resource Development (MHRD). The MHRD has also promoted their FOSSEE (Free and Open Source Software for Education) projects which uses tools so that students can easily use them. Recently, the MHRD made a decision that FOSSEE should be promoted amongst the student community so they can aim at reducing dependency on proprietary software in educational institutions. The MHRD Minister Ramesh Pokhriyal Nishank too took to twitter urging students to use FLOSS tools in various languages to meet academic and research requirements. Read more

today's howtos

  • A guided tour of Linux file system types

    While it may not be obvious to the casual user, Linux file systems have evolved significantly over the last decade or so to make them more resistant to corruption and performance problems. Most Linux systems today use a file system type called ext4. The “ext” part stands for “extended” and the 4 indicates that this is the 4th generation of this file system type. Features added over time include the ability to provide increasingly larger file systems (currently as large as 1,000,000 TiB) and much larger files (up to 16 TiB), more resistance to system crashes and less fragmentation (scattering single files as chunks in multiple locations) which improves performance.

  • Testing the Linux Malware Detect.
  • Kushal Das: Remember to mark drive as removable for tails vm install

    If you are installing Tails into a VM for testing or anything else, always remember to mark the drive as a removable USB drive. Otherwise, the installation step will finish properly, but, you will get errors like the following screenshot while booting from the drive.

  • How to Set DNS Nameservers on Ubuntu 18.04

Security Leftovers

  • NSA Researchers Talk Development, Release of Ghidra SRE Tool

    The National Security Agency released its classified Ghidra software reverse-engineering (SRE) tool as open source to the cybersecurity community on April 4. NSA researchers Brian Knighton and Chris Delikat shared how Ghidra was built and the process of releasing it at Black Hat 2019. Ghidra is a framework developed by the NSA’s Research Directorate for the agency’s cybersecurity mission. It’s designed to analyze malicious code to give security pros a better understanding of potential vulnerabilities in their networks and systems.

  • Linux Is Being Hit with Zero-Day Exploits/ Zero-Day Attacks [Ed: This is not news. If you have a system that is unpatched for months, despite many warnings, it is a risk, no matter the OS/kernel.]

    It was once the popular opinion that Linux was immune to zero-day exploits. However, even before the Equifax exploit, vulnerabilities were found in Linux distributions like Fedora and Ubuntu. In particular, back in 2016, a security researcher discovered that you could exploit a Linux system by playing a specific music file. Then, in 2017, a group of attackers used Struckshock vulnerability to carry on the attack on Equifax. These zero-day attacks are Advanced Persistent Attacks that exploit recently discovered vulnerabilities. Read on to learn more about what are zero-day exploits and how they can affect a Linux system.

  • Intel, Google, Microsoft, and Others Launch Confidential Computing Consortium for Data Security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use.

  • Intel, Google, Microsoft, and others launch Confidential Computing Consortium for data security

    Major tech companies including Alibaba, Arm, Baidu, IBM, Intel, Google Cloud, Microsoft, and Red Hat today announced intent to form the Confidential Computing Consortium to improve security for data in use. Established by the Linux Foundation, the organization plans to bring together hardware vendors, developers, open source experts, and others to promote the use of confidential computing, advance common open source standards, and better protect data. “Confidential computing focuses on securing data in use. Current approaches to securing data often address data at rest (storage) and in transit (network), but encrypting data in use is possibly the most challenging step to providing a fully encrypted lifecycle for sensitive data,” the Linux Foundation said today in a joint statement. “Confidential computing will enable encrypted data to be processed in memory without exposing it to the rest of the system and reduce exposure for sensitive data and provide greater control and transparency for users.”

Linux-driven modules to showcase new MediaTek AIoT SoCs

Innocomm is prepping an “SB30 SoM” with the new quad -A35 MediaTek i300 followed by an “SB50 SoM” with an AI-equipped, octa-core -A73 and -A53 MediaTek i500. Both modules ship with Linux/Android evaluation kits. Innocomm, which has produced NXP-based compute modules such as the i.MX8M Mini driven WB15 and i.MX8M powered WB10, will soon try on some MediaTek SoCs for size. First up is an SB30 SoM due to launch in October that will run Linux or Android on MediaTek’s 1.5GHz, quad-core, Cortex-A35 based MediaTek i300 (MT8362) SoC. In November, the company plans to introduce an SB50 SoM based on the MediaTek i500 (MT8385). Read more