Language Selection

English French German Italian Portuguese Spanish

Software

Manage your Photos: JPEG Photo Compression

Filed under
Software

Data compression is the process of storing data in a format that uses less space than the original representation would use. Compressing data can be very useful particularly in the field of communications as it enables devices to transmit or store data in fewer bits. Besides reducing transmission bandwidth, compression increases the amount of information that can be stored on a hard disk drive or other storage device.

There are 2 main types of compression. Lossy compression is a data encoding method which reduces a file by discarding certain information. When the file is uncompressed, not all of the original information will be recovered. Lossy compression is typically used to compress video, audio and images, as well as internet telephony. The fact that information is lost during compression will often be unnoticeable to most users. Lossy compression techniques are used in all DVDs, Blu-ray discs, and most multimedia available on the internet.

Images take up massive amounts of internet bandwidth because they often have large file sizes. They are the most popular resource type on the web. According to the HTTP Archive, 60% of the data transferred to fetch a web page is images composed of JPEGs, PNGs and GIFs. 45% of the images seen on sites crawled by HTTP Archive are JPEGs.

Read more

Need A Good Linux Hex Editor? 20 Linux Hex Viewers & Editors Reviewed

Filed under
GNU
Linux
Software

A hex editor is a computer program used for editing a binary file that contains machine-readable data. It paves the way of manipulating raw binary data for a particular application. “Hex” is the short form of hexadecimal, a numerical standard format that represents the binary program. A regular hex editor has three specific areas such as ‘character area’ on the right, ‘hexadecimal area’ in the middle and the ‘address area’ on the left. Additionally, some hex editors are designed to edit and parse sector data from the hard disk and floppy disk which are frequently called disk editor or sector editor. There are far ranges of Linux hex editor available in the market; that to a greater extent make a user squarely beneficial, and allow them to edit binary program.

Read more

Also: Announcing lymworkbook project

5 great alternatives to FL Studio to use on Linux

Filed under
GNU
Linux
Software

FL Studio is a robust digital audio workstation and musical creation tool for the Windows and Mac platforms. It’s commercial software and considered one of the best musical production programs available today. However, FL Studio does not work on Linux, and no support is planned in the future. So, if you’ve just switched to the Linux platform and want to create music, you’ll need a good alternative. Here are 5 great alternatives to FL Studio to use on Linux!

Read more

HowTos and Software

Filed under
Software
HowTos

Wine 4.15

Filed under
Software
  • Wine Announcement
    The Wine development release 4.15 is now available.
    
    What's new in this release (see below for details):
      - Initial implementation of the HTTP service.
      - Stack unwinding support on ARM64.
      - Better multi-monitor support on macOS.
      - RichEdit control optimizations.
      - Various bug fixes.
    
    
  • Wine 4.15 Brings Initial HTTP Service Implementation (HTTP.sys)

    Wine 4.15 is out for testing this US holiday weekend. With Wine 4.15 it brings an initial implementation of Windows' HTTP.sys as the HTTP protocol stack that is a kernel-mode driver that lists for HTTP requests and passes it onto Microsoft's IIS.

    An initial implementation of this HTTP.sys service is now in place as one of the major features to Wine 4.15. HTTP.sys has been the replacement to the Winsock API by IIS and is geared to provide better performance than the Windows Sockets API and other features. This big round of HTTP.sys work was led by Wine developer Zebediah Figura.

  • The Wine 4.15 development release is out now

    What's a Friday without a little Wine? Thankfully today we don't have to find out as the Wine 4.15 development release is now out.

Qmmp Music Player 1.3.4 Released with Stability Improvements

Filed under
Software

Qmmp, Qt based music player with winamp or xmms like user interface, released version 1.3.4 (and Qt4 version 0.12.4) a few days ago with stability improvements.

Read more

Software: Converseen, Hyperfine, NetFlow Software, and Pastel

Filed under
Software
  • Converseen – A Simple Graphical Batch Image Converter And Resizer

    Converseen is a free, cross-platform and opensource batch image processor written in C++ with Qt5 libraries. It allows us to convert, compress, resize, rotate and flip one or multiple images with a few mouse clicks! Converseen relies on ImageMagick for image processing. It supports 100s of image formats including popular formats such as DPX, EXR, GIF, JPEG, JPEG-2000, PDF, PhotoCD, PNG, Postscript, SVG, TIFF and more. Conversion is not just an image converter, it can also convert an entire PDF file into bunch of images.

  • Essential System Tools: hyperfine – command-line benchmarking tool

    This is the latest in our series of articles highlighting essential system tools. These are small, indispensable utilities, useful for system administrators as well as regular users of Linux based systems. The series examines both graphical and text based open source utilities. For details of all tools in this series, please visit Excellent Ways to Manage Your System – Essential System Tools.

    For this article, we look at hyperfine, a command-line benchmarking tool. It’s designed to measure the full execution time of a program. This open source tool is written in the Rust programming language.

    If you’re interesting in learning Rust, check out our recommended free Rust books.

  • 6 Best Open-Source NetFlow Software (FREE)

    There are several types of network monitoring available. One of them, possibly the most common, is SNMP monitoring. It can be used to give administrators a rather clear picture of how much data is carried over the networks they manage. But when they want a more detailed picture—such as learning WHAT the traffic is rather than just HOW MUCH there is—they have to turn to a different technology.

    NetFlow, a monitoring technology developed by Cisco and introduced a while back on the manufacturer’s devices has become the de facto standard when it comes to qualitative network monitoring. NetFlow monitoring tools can be expensive and out of the reach of many smaller businesses. Fortunately, several open-source NetFlow software packages are available and we’re about to review them.

  • Pastel Is A New Tool To Work With Colors From The Terminal

    Pastel is a new free and open source command line tool to work with colors / perform various color operations. It's written in Rust, and it can convert colors from one format to another, show and analyze colors on the terminal, generate a set of visually distinct colors, and there's even a color picker, along with much more.
    The tool has support for many different color formats and color spaces, including RGB, HSL, CIELAB, CIELCh as well as ANSI 8-bit and 24-bit representations.

Proprietary Software Leftovers

Filed under
Microsoft
Software
Mac
Security
  • BuyDRM launches Linux support for DRM

    BuyDRM has announced Linux support for its MultiKey Server, a multi-DRM software platform specifically designed for deployments in remote or limited connectivity environments.

  • Some airlines are banning Apple’s MacBook Pros even if they weren’t recalled

    In June, Apple recalled the 2015 MacBook Pro with Retina Display, sold between September 2015 and February 2017, because the battery “may pose a fire safety risk,” and the FAA soon reminded airlines not to carry those laptops with defective batteries on board. But some airlines are now banning Apple laptops whether they’ve got a bad battery or not, as reported by Bloomberg.

  • More Airlines Ban MacBook Pros in Checked Luggage

    All 15-inch versions of Apple Inc.’s MacBook Pro must be carried in the cabin and switched off, Qantas said in a statement Wednesday. The rule went into effect Tuesday morning. Rival Virgin Australia Holdings Ltd. went further on Aug. 26, banning all Apple laptops from checked-in luggage.

  • Popular PDF app was quietly plonking malware onto Android phones

    The security smart folks note that the app itself doesn't appear to be a malicious one, but rather it contains a trojan that gathers spyware and other malware from a malicious server and then runs in on a victim's phone. This trojan, dubbed Necro.n appears to have been sneaked into the app through the use of a legit-looking advertising library package.

    As such, the developers of the app, which has received some 100 million downloads, might not even realise their software is causing their users a malware headache.

  • [Cracker] Claims He Can ‘Turn Off 25,000 Cars’ At The Push Of A Button

    Your car’s immobilizer is supposed to be used for good. If a crook steals your car, it's possible for you to connect to the immobilizer, which tracks the vehicle and allows you to stop anyone from turning on the engine. But with one particular immobilizer - the U.K.-made SmarTrack tool from Global Telemetrics - an easy-to-hack vulnerability meant it was simple for researchers at Pen Test Partners to turn on the immobilizer permanently, without the customer knowing a thing.

    To prove it was possible, the researchers from British cybersecurity company Pen Test Partners hacked the vehicle of one of their own employees, disabling his car whilst they were in the U.K. and he was in Greece, not long before he was due to head to a wedding.

  • French cyberpolice, Avast and FBI neutralise global 'botnet' [iophk: Windows TCO]

    French police have neutralised a [cracking] operation that had taken control of more than 850,000 computers, mainly in Latin America, while also managing to remove the malware from the infected devices.

    The agents went into action last spring after the Czech antivirus firm Avast alerted them to the software worm, called Retadup, that was being controlled by a server in the Paris region.

  • Putting an end to Retadup: A malicious worm that infected hundreds of thousands [iophk: Windows TCO]

    Retadup is a malicious worm affecting Windows machines throughout Latin America. Its objective is to achieve persistence on its victims’ computers, to spread itself far and wide and to install additional malware payloads on infected machines. In the vast majority of cases, the installed payload is a piece of malware mining cryptocurrency on the malware authors’ behalf. However, in some cases, we have also observed Retadup distributing the Stop ransomware and the Arkei password stealer.

  • Authorities free 850,000 machines from grasp of Retadup worm [iophk: Windows TCO]

    After gaining persistence, Retadup goes on to distribute secondary malware on infected machines. It most commonly delivers a Monero cryptomining program, but also has been observed spreading over malware programs including Stop ransomware and the Arkei password stealer, Avast reports.

    The vast majority of Retadup victims whose infections were neutralized in last month’s crackdown are based in Latin American countries. However, the law enforcement operation itself specifically targeted C2 infrastructure based in France and the U.S.

  • Report finds majority of 2019 ransomware attacks have targeted state and local governments [iophk: Windows TCO]

    The majority of ransomware attacks in the U.S. in 2019 have targeted state and local governments, a report published Wednesday by cybersecurity group Barracuda Networks found.

    The report counted a total of 55 ransomware attacks on U.S. state and local government entities between January and July of 2019. These attacks involve a malicious actor or group encrypting a network and asking for money, often in the form of bitcoin, to allow the user access.

  • Threat Spotlight: Government Ransomware Attacks [iophk: this is disinformation which fails to steer potential victims away from Windows and towards GNU/Linux or one of the BSDs]

    Barracuda researchers have identified more than 50 cities and towns attacked so far this year. The team’s recent analysis of hundreds of attacks across a broad set of targets revealed that government organizations are the intended victims of nearly two-thirds of all ransomware attacks. Local, county, and state governments have all been targets, including schools, libraries, courts, and other entities.

    Here’s a closer look at state and local government ransomware attacks and solutions to help detect, block, and recover from them.

Nikola - Static Site Generator for your webz

Filed under
Software
Web

The modern web is all about dynamic content. But in most cases, this is a technological illusion. A large number of website uses dynamically generated pages, i.e. stuff gets read from a database and rendered on the screen when requested, even for things that don't necessarily require any interaction. This takes resources, and might even be considered less secure, because bad or malformed instructions could theoretically generate something undesired.

The old Web was all about static content - HTML pages with links and images and not much else. Not bad, very light on the resources, and as secure as the Web server what does it. But then, not much interaction happens, and updating content can be tedious. What if there was something midway between the two worlds? That would be Nikola, a static site generator.

Read more

7 Best SNMP Monitoring Tools For Linux

Filed under
GNU
Linux
Server
Software

SNMP monitoring is by far the most common type of network monitoring technology. It allows administrators of networks of any size to be kept informed of the status of the networks they manage as well as their utilization. Likewise, Linus is also a very common platform that many network administrators have turned to. Although it is not yet as common in the desktop world as the commercial offerings from some mega-vendors, it is very common in the server world. Even IBM has made it its OS of choice on many of its higher-range systems.

Read more

Syndicate content

More in Tux Machines

CAN-Bus HAT for Raspberry Pi 4 offers RTC and wide-range power

Copperhill’s third-gen, $65 “PiCAN3” HAT features Raspberry Pi 4 support and a SocketCAN-ready CAN-Bus 2.0B port. The HAT has an RTC and is powered by a 3A, 6-20V Switch Mode Power Supply that can also power the Pi. Copperhill Technologies has launched a CAN-Bus HAT for the Raspberry Pi 4 Model B designed for industrial and automotive applications. Like the PiCAN2. which we briefly covered last year as part of our report on Network Sorcery’s UCAN software for CAN-equipped Raspberry Pi boards, the HAT is equipped with a Microchip MCP2515 CAN controller and MCP2551 CAN transceiver. Read more

Android Leftovers

FreeBSD 12 & DragonFlyBSD 5.6 Running Well On The AMD Ryzen 7 3700X + MSI X570 GODLIKE

For those wondering how well FreeBSD and DragonFlyBSD are handling AMD's new Ryzen 3000 series desktop processors, here are some benchmarks on a Ryzen 7 3700X with MSI MEG X570 GODLIKE where both of these popular BSD operating systems were working out-of-the-box. For some fun mid-week benchmarking, here are those results of FreeBSD 12.0 and DragonFlyBSD 5.6.2 up against openSUSE Tumbleweed and Ubuntu 19.04. Back in July I looked at FreeBSD 12 on the Ryzen 9 3900X but at that time at least DragonFlyBSD had troubles booting on that system. When trying out the Ryzen 7 3700X + MSI GODLIKE X570 motherboard on the latest BIOS, everything "just worked" without any compatibility issues for either of these BSDs. Read more

How to break out of a hypervisor: Abuse Qemu-KVM on-Linux pre-5.3 – or VMware with an AMD driver

A pair of newly disclosed security flaws could allow malicious virtual machine guests to break out of their hypervisor's walled gardens and execute malicious code on the host box. Both CVE-2019-14835 and CVE-2019-5049 are not particularly easy to exploit as they require specific types of hardware or events to occur. However, if successful, either could allow a miscreant to run malware on the host from a VM instance. CVE-2019-14835 was discovered and reported by Peter Pi, a member of the Tencent Blade Team. It is found in the Linux kernel versions 2.6.34 up to version 5.3, where it is patched. Read more