Language Selection

English French German Italian Portuguese Spanish

Software

Proprietary Software Leftovers

Filed under
Software
  • GOWIN Semiconductor Adds Ubuntu Support to their GOWIN EDA FPGA Software for Improved Artificial Intelligence and IoT Development Toolchain Integration

    Traditional FPGAs have had a long history of development tool support for Windows and Red Hat, but in many cases lacked universal Linux support for other distributions such as Ubuntu. This has caused development burdens as Ubuntu has matured and become the most commonly supported operating system for Artificial Intelligence solution development. Neural network model development software such as Caffe, Tensorflow and Keras have found Ubuntu as the preferred operating system due to its open source support and scripting capabilities. As a result, having GOWIN’s FPGA EDA in the same operating system allows developers to seamlessly integrate FPGA synthesis, place and route and bitstream generation into their AI design and script work flows.

  • Kentucky official: Foreign actors, including Russians, North Koreans, target election system

    Previous attacks on election systems by foreign actors in the 2016 election focused on state-level systems, which have since beefed up security, though Dearing told legislators that "we’re now seeing those bad actors target the county level.”

  • New Workload Automation Platform Available on Linux and Windows Servers
  • War With Netflix and Disney Looms for India’s Top Local Streamer

    As global streaming giants Netflix Inc. and Walt Disney Co. spend millions of dollars to grab viewers in India, a country that could become their biggest overseas market, a homegrown rival is preparing to defend its turf.

    Zee5, the top domestic streaming platform set up by India’s biggest television broadcaster, is betting on local content to fend off big-spending rivals, Chief Executive Officer Tarun Katial said in an interview. The over-the-top, or OTT, service is playing to its advantage by adding more local-language shows and lower-price options to gain market share, he said.

  • DHS’s cyber wing responds to ransomware attack on pipeline operator [iophk: Windows TCO]

    The Department of Homeland Security’s cybersecurity agency recently responded to a ransomware attack on a natural gas compression facility that led the organization to shut down its operations for two days, the agency said Tuesday.

    The [attackers] were able to encrypt data on the organization’s IT and “operational technology” network, a broad term for a network that oversees industrial processes. No longer able to read data coming from across its enterprise, the facility shut down its various assets, including its pipelines, for two days.

  • Alert (AA20-049A): Ransomware Impacting Pipeline Operations [iophk: Windows TCO]

    CISA responded to a cyberattack affecting control and communication assets on the operational technology (OT) network of a natural gas compression facility. A cyber threat actor used a Spearphishing Link [T1192] to obtain initial access to the organization’s information technology (IT) network before pivoting to its OT network. The threat actor then deployed commodity ransomware to Encrypt Data for Impact [T1486] on both networks. Specific assets experiencing a Loss of Availability [T826] on the OT network included human machine interfaces (HMIs), data historians, and polling servers. Impacted assets were no longer able to read and aggregate real-time operational data reported from low-level OT devices, resulting in a partial Loss of View [T829] for human operators. The attack did not impact any programmable logic controllers (PLCs) and at no point did the victim lose control of operations. Although the victim’s emergency response plan did not specifically consider cyberattacks, the decision was made to implement a deliberate and controlled shutdown to operations. This lasted approximately two days, resulting in a Loss of Productivity and Revenue [T828], after which normal operations resumed. CISA is providing this Alert to help administrators and network defenders protect their organizations against this and similar ransomware attacks.

  • Chinese-linked [cracking] group using Windows backdoors to go after gambling industry targets

    A nation-state actor that has links with Chinese [attackers] is exploiting two new backdoors to run a cyber-espionage campaign against gambling entities in Southeast Asia, according to Trend Micro research.

    The new activity, which is also reportedly occurring in Europe and the Middle East, was first unearthed last year when cybersecurity consultancy Talent-Jump Technologies found a Microsoft Windows backdoor and contacted Trend Micro while conducting incident response for a company based in the Philippines.

Proprietary Software and Security

Filed under
Software
Security
  • TurboTax Is Still Tricking Customers With Tax Prep Ads That Misuse the Word “Free”

    On Dec. 30, the IRS announced it was revamping a long-standing agreement with the online tax preparation industry in which companies offer free filing to people with incomes below certain levels, a category that includes 70% of filers. The change in what’s known as the Free File program came in the wake of multiple ProPublica articles that revealed how the companies in the program steered customers eligible for free filing to their paid offerings. Under the updated agreement, the companies are now prohibited from hiding their Free File webpages from Google searches, and the IRS was allowed to create its own online tax-filing system.

    So far, it seems, the companies are abiding by their promise to make their Free File webpages visible in online searches. But the updated agreement appears to have a loophole: It doesn’t apply to advertising. Nothing in it, the agreement states, “limits or changes the rights” of participating companies to advertise “as if they were not participating in the Free File program.”

  • Ransomware Shuts Gas Compressor for 2 Days in Latest Attack [iophk: Windows TCO]

    It appears likely that the attacker explored the facility’s network to “identify critical assets” before executing the ransomware attack, according to Nathan Brubaker, a senior manager at the cybersecurity firm FireEye Inc. This tactic -- which has become increasingly popular among hackers -- makes it “possible for the attacker to disable security processes that would normally be enough to detect known ransomware indicators,” he said.

  • Twitter says Olympics, IOC accounts [cracked]

    Twitter (TWTR.N) said on Saturday that an official Twitter account of the Olympics and the International Olympic Committee’s (IOC) media Twitter account had been [cracked] and temporarily locked.

    The accounts were [cracked] through a third-party platform, a spokesperson for the social media platform said in an emailed statement, without giving further details.

  • Olympics, IOC accounts were [cracked], Twitter says

    The social media company Twitter on Saturday said that the official Twitter accounts for the Olympics as well as the International Olympic Committee (IOC) have both been [cracked] and temporarily locked.

  • Apple warns revenue will be lower than expected because of coronavirus impact

    In a rare investor update on Monday, Apple said the global effects of the coronavirus outbreak are having have a material impact on the company bottom line. The company does not expect to meet its own revenue guidance for the second quarter due to the impact of the virus, and warns that “worldwide iPhone supply will be temporarily constrained.” Store closures and reduced retail traffic in China are also expected to have a significant impact.

    All of Apple’s iPhone manufacturing partner sites have been reopened but are “ramping up more slowly than we had anticipated,” which means that fewer iPhones than expected will be manufactured. As a result, “[t]hese iPhone supply shortages will temporarily affect revenues worldwide,” says Apple.

  • We decided to leave AWS

    For past adventures, I mostly use third-party email delivery services like Postmark, SendGrid, SES, etc. Unfortunately their pricing models are based on the number of emails, which are not compatible with the unlimited forwards/sends that SimpleLogin offers. In addition, we want SimpleLogin to be easily self-hosted and its components fit on a single server. For these reasons, we decide to run our MTA (Mail Transfer Agent) on EC2 directly.

  • [Old] Kerberos (Sleepy: How does Kerberos work? – Theory

    The objective of this series of posts is to clarify how Kerberos works, more than just introduce the attacks. This due to the fact that in many occasions it is not clear why some techniques works or not. Having this knowledge allows to know when to use any of those attacks in a pentest.

    Therefore, after a long journey of diving into the documentation and several posts about the topic, we’ve tried to write in this post all the important details which an auditor should know in order to understand how take advantage of Kerberos protocol.

    In this first post only basic functionality will be discussed. In later posts it will see how perform the attacks and how the more complex aspects works, as delegation.

  • [Old] Kerberos (II): How to attack Kerberos?

    These attacks are sorted by the privileges needed to perform them, in ascending order. Thus, to perform the first attacks only connectivity with the DC (Domain Controller) is required, which is the KDC (Key Distribution Center) for the AD (Active Directory) network. Whereas, the last attack requires a user being a Domain Administrator or having similar privileges.

  • Kerberos (III): How does delegation work?

    In this article, we will focus on understand how the different kinds of delegation work, including some special cases. Additionally, some scenarios where it could be possible to take advantage of these mechanisms in order to leverage privilege escalation or set persistence in the domain will be introduced.

    Before starting with the explanations, I will assume that you already understand Kerberos’ basic concepts. However, if expressions like TGT, TGS, KDC or Golden ticket sound strange to you, you should definitely check the article “How does Kerberos works?” or any related Kerberos’ introduction.

Proprietary Software and Games for GNU/Linux

Filed under
GNU
Linux
Software

Komikku is a GTK Manga App for Linux

Filed under
Software

If you read a lot of manga and you use the Ubuntu desktop check out Komikku, a relatively new Manga reader app for Linux written in Python and GTK.

Now, usually when I highlight a GTK app on this blog you’d assume that I’m talking about a desktop app. But with GTK apps now running on mobile (like the Librem 5, for instance) a new breed of Linux software is emerging, built with mobile first use cases in mind.

And Komikku is one such app.

Alex, aka BabyWogue, aka the Linux YouTube guy who uses a robot voice and anime wallpaper in every video, recently shared a concise video overview of Komikku (it’s how I heard about it in the first place) and how it runs on …a desktop...

Read more

Also: BingWall is —Yes, a Bing Wallpaper App for Ubuntu

Rclone Browser (Fork) 1.8.0 Gets Proxy Support, Option To Create Public Link

Filed under
Software
Web

Rclone Browser (fork), a Qt5 GUI for Rclone, was updated to version 1.8.0, getting proxy support, an option to display the complete directory tree for a remote, and the ability to create a public link to easily share files, among others.

Rclone Browser is a cross-platform (Windows, macOS and Linux) Qt5 GUI for Rclone, a command line tool to synchronize (and mount) files from remote cloud storage services like Google Drive, OneDrive, Nextcloud, Dropbox, Amazon Drive and S3, Mega, and others.

This GUI can be used to simplify operations like copying a file from one cloud storage to another or to the local drive, mount cloud storages on your system with a click, and browsing the contents of various cloud storage remotes in a tabbed interface.

Read more

Getting started with OpenTaxSolver

Filed under
Software

OpenTaxSolver is an open source application for US taxpayers to calculate their state and federal income tax returns. Before I get into the software, I want to share some of the information I learned when researching this article. I spent about five hours a day for a week looking into open source options for doing your taxes, and I learned about a lot more than just tax software.

The Internal Revenue Service's (IRS's) Use of federal tax information (FTI) in open source software webpage offers a large amount of information, and it's especially relevant to anyone who may want to start their own open source tax software project.

Read more

Second Shortwave Beta

Filed under
Software
GNOME

Today I can finally announce the second Shortwave Beta release! I planned to release it earlier, but unfortunately the last few weeks were a bit busy for me.

Read more

Best Wallpaper Slideshow Apps for Linux

Filed under
Software

Many Linux users love to customize and personalize their desktop environment. Linux offers plenty of choices to customize almost every part of the desktop including automatic switching of desktop background at periodic intervals. This article will list some wallpaper slideshow apps that can find and apply desktop backgrounds automatically based on your interests.

Read more

Wine 5.2 release

Filed under
Software

The Wine development release 5.2 is now available.

What's new in this release (see below for details):
- More compatible codepage mapping tables.
- Support for using the null display driver as a real driver.
- Better UTF-8 support in the Resource and Message Compilers.
- Fixes for using ucrtbase as C runtime.
- Various bug fixes.

The source is available from the following locations...

Read more

Also: Wine 5.2 With Better Handling For The Null Display Driver, UTF-8 Support

The Wine 5.2 development release is out

Open Source Audio-Video: 8 Replacements for Expensive Applications

Filed under
Software

Open source audio-video software offers an alternative to paying for expensive proprietary software. And in many cases, the open source options are as good as or better than the comparable commercial, proprietary solutions. In fact, users site the top reasons why they use open source software as: the features, freedom from vendor lock-in and the quality of the solutions. Price and total cost of ownership weren't even on the list. In other words, people are using open source because the software is so good, and the fact that it is free is just a side benefit.

The list of audio-video software below includes a variety of open source software for home users and SMBs. All of these applications can replace commercial products that can carry high prices. Even if buyers choose to purchase support or other services for their open source software, the open source options are generally much more affordable than the comparable proprietary solutions.

Read more

Also: Record screencast or web cam video with VokoscreenNG an open source program for Windows and Linux

Syndicate content