Language Selection

English French German Italian Portuguese Spanish

Software

Fast download managers for Linux, Alternative to IDM

Filed under
Software

Download managers are great. They make the downloading process a lot easier and faster. However, the most popular download manager is IDM which is only available to Window. That is why in this quick guide, You will learn about the fast download managers for Linux that are alternative to IDM and even better in some cases.

Having a fast download manager in your system is very essential as we tend to download files from the internet and the default downloader that we have got with the browsers. These download managers are not very efficient and do not provide any modern needed features.

Here I have compiled a list of best and fast download managers for Linux. Let’s get started with the first one.

Read more

Software: QOwnNotes, Searchmonkey, Remote Touchpad and Google Maps Plugins for WordPress

Filed under
Software
  • Norbert Preining: QOwnNotes for Debian

    QOwnNotes is a cross-platform plain text and markdown note taking application. By itself, it wouldn’t be something to talk about, we have vim and emacs and everything in between. But QOwnNotes integrates nicely with the Notes application from NextCloud and OwnCloud, as well as providing useful integration with NextCloud like old version of notes, access to deleted files, watching changes, etc.

  • Searchmonkey – A powerful desktop search app for Linux

    In our day to day activities, we need to search for specific files in our Linux systems. These can be documents, texts, and even multimedia data including video and audio files. 

    Linux comes with a powerful command-line tool (Terminal), that enables users to search for data and text using various command-line arguments. One advantage of using the Terminal is it supports the use of regular expressions and scripting.

    Having said that, not everyone is well-versed with the many Linux commands; this brings forth the demand for having an interactive and reliable Graphical User Interface. One of such powerful tools is the Searchmonkey application.

  • Remote Touchpad: Control Mouse & Keyboard from Your Phone

    Remote Touchpad is an open-source utility allows to remote control the mouse and keyboard connected to your computer from the web browser of a smartphone or any other device with a touchscreen.

    Remote Touchpad supports Flatpak’s RemoteDesktop portal (experimental), Windows and X11.

    Simply run the utility on your machine. It outputs an URL along with QR code in a terminal window. To take control open the displayed URL or scan the QR code in your phone.

  • Top 10 Best Google Maps Plugin for WordPress (2020)

    A touch webpage is far more of use with an internet map. This guide shows the top 10 best Google maps plugin for WordPress. A traveling site will be that more pleasure for those who (and also you subscribers ) may view in a glance most of the locations you have already been. You will find a lot of motives to incorporate maps onto your own WordPress website, regardless of what your explanation is that you have to have a simple and effective means to perform nothing but that.

8 Essential Free Speech Tools

Filed under
Software

Speech synthesizers are text-to-speech systems used with computers. This type of software is programmed to include phonemes and the grammatical rules of a language, so that words are pronounced correctly. This article identifies the finest open source speech synthesizers that are available for the Linux platform. This category of software is particularly useful for increasing the accessibility of the internet, but there are many other applications for speech synthesizers.

Although this article focuses on open source software, we would take this opportunity to mention the IVONA Text to Speech System, software that is compatible with Linux. IVONA is an incredibly impressive text-to-speech system, generating exceptionally natural sounding voices. Unfortunately, the software is released under a proprietary license. While its open source competitors, eSpeak, Festival, and Praat Speech Analyser, sound somewhat robotic in comparison with the human-sounding IVONA, they do provide clear audio with text documents.

This article also highlights the best speech recognition software for Linux. Speech recognition is the translation of spoken words into text. This type of software helps users to operate their computer by speaking to it, and is a real blessing for anyone who finds it difficult to type, such as the elderly, or people with physical disabilities. Using speech recognition software, users can easily write emails, surf the net, manage their finances, chat to other users online, and perform many other computer activities.

To provide an insight into the quality of software that is available, we have compiled a list of 8 of the finest speech tools covering the spectrum of speech synthesizers, speech recognition software, speech recognition engines, and speech analysis. Here’s our recommended tools.

Read more

GNOME and KDE: GNOME Shell and Mutter, Qt, Plasma Mobile and Okular for Debian

Filed under
KDE
Software
GNOME
  • GNOME Shell + Mutter See Changes For Tracking Software Rendering, VNC To Toggle Animations

    GNOME Shell and Mutter saw a set of patches land today for GNOME 3.36 that have been around for a few months and deal with the tracking of software rendering and VNC usage where GNOME Shell should in turn disable animations to ease the rendering workload.

    The GNOME Settings Daemon has until now been responsible for controlling the animation heuristics when they should be disabled while now Mutter has added support for tracking software rendering situations and in turn GNOME Shell is relying upon that for determining when to disable desktop animations.

  • How not to lose the alpha channel

    Working on color imagery for QiTissue recently, I realized we were accidentally losing the alpha channel in multiple places. For efficiency reasons, we keep colors in memory using the QRgb type, and convert that to/from QString for serialization purposes via QColor as needed. Here’s what I discovered about why that doesn’t work, and some ways I fixed it.

    Firstly, be aware there is no QRgba in the Qt API . There is only QRgb, for 8bit color channels. It can hold an alpha value too, despite the lack of a trailing a in the type name. Then there is QRgba64 which uses 16bit per color channel. For our purposes, 8bit per channel is sufficient. So where do we lose the alpha channel, when QRgb can store it in principle?

  • Fosdem and Plasma Mobile Sprint

    From January 31st to February 8th I went on a little tour, first at the two days of Fosdem in Brussels, then to Berlin for a KDE sprint about Plasma Mobile.

    It was the first time i went to Fodem: it’s an awesome experience, even tough big and messy: which is the awesome of it… and the bad of it at the same time

    Even tough there were 800 talks I didn’t attend that many, some about the Elixir language, some about retrocomputing, some about iot stuff. At Fosdem the best thing to do there.. is meeting a lot of interesting people, rather than attending talks, which are very interesting never the less, which you can find videos here.

  • Norbert Preining: Okular update for Debian

    The quest for a good tabbed pdf viewer lead me okular. While Gnome3 has gone they way of “keep it stupid keep it simple” to appeal to less versed users, KDE has gone the opposite direction and provides lots of bells and knobs to configure their application. Not surprisingly, I am tending more and more to KDE apps away from the redux stuff of Gnome apps.

Malicious Proprietary Software

Filed under
Microsoft
Software
  • Discord Is Not An Acceptable Choice For Free Software Projects

    Discord’s communication is not end to end (e2e) encrypted. It is encrypted only between the individual user and the servers operated by Discord Inc. Their spying extends to every single message sent and received by anyone, including direct messages betweeen users. The service can and does log every message sent, both in-channel and DMs. It is impossible to have a private conversation on Discord, as there will always be an unencrypted log of it stored by Discord. Discord can, at their option, provide those stored messages to any third party they wish, including cops or government snoops, for any reason, even without a legal order, without any obligation to tell you that they have done so.

  • [Attackers] Were Inside Citrix for Five Months

    Networking software giant Citrix Systems says malicious [attackers] were inside its networks for five months between 2018 and 2019, making off with personal and financial data on company employees, contractors, interns, job candidates and their dependents. The disclosure comes almost a year after Citrix acknowledged that digital intruders had broken in by probing its employee accounts for weak passwords.

  • [Vulnerable] firmware lurks inside Dell, HP and Lenovo computers amid supply chain security efforts

    “Firmware is meant to be invisible to the user, and so it’s not surprising that most people don’t pay attention to it,” said Eclypsium CEO Yuriy Bulgin. “However, these components make up the foundation upon which every device, operating system, and application depends.”

    Researchers used unsigned firmware to show how an attacker could compromise an operating system remotely in order to steal network data. The highlighted flaws could also enable “direct-memory access” attacks which exploit a computer’s core operating system.

  • Aera Launches Cognitive ‘Business Brain’ Operating System [Ed: This is NOT an 'operating system". Terms misused these days.]

    Infor labels one of its core brands Infor OS and quite unashamedly uses the term operating system to explain the function of its industry-specific Enterprise Resource Planning (ERP) and Supply Chain Management (SCM) cloud software. Mountain View headquartered Aera Technology has used a similar naming convention within its branding and called its automation-centric cloud platform the Aera Cognitive Operating System.

  • Microsoft Defender ATP for Linux Now In Public Preview

    Microsoft Defender ATP for Linux is now available in a public preview that allows administrators and security professionals to test the product in six different Linux distributions.

  • Keen to check for 'abnormal' user behaviours? Microsoft talks insider risk, AWS imports and compliance at infosec shindig RSA [Ed: “Microsoft talks insider risk”; but Microsoft is the risk]

    As well as widening the preview of Microsoft Threat Protection, a system aimed at a more automated response to threats, the gang has also extended the cross-platform support for Microsoft Defender Advanced Threat Protection (ATP) to include a whole bunch of Linux distributions.

  • Microsoft plans to add Linux support for Chromium-based Edge

    Microsoft fought long and hard to maintain and push its own proprietary browser, even launching Edge, hoping to get away from the stigma against Internet Explorer. However, the dominating market share of Chromium-based browsers finally got to Microsoft, and the company announced it would rebuild Edge with the Chromium source code. Last month, we reported that Microsoft’s Chromium-based Edge was out of development and ready for public deployment.

Software: Rav1e, Cockpit, SSH Tools and Curl

Filed under
Software
  • Rav1e 0.3.1 Is 25~40% Faster At Low Speed Levels For Rust-Based AV1 Encoding

    It was not even two full weeks ago that Rav1e 0.3 was released with speed optimizations and other AV1 encoding enhancements while released on Tuesday was Rav1e 0.3.1 with a change to boost encode speeds at lower levels.

    The principal change with Rav1e 0.3.1 for this Rust-written AV1 video encoder is 25~40% better performance at lower speed levels (two through five). This big speed-up is by disabling fine directional prediction and intra-block transform splitting within inter-frames. The consequence of disabling these features for the double digit percentage speed improvements is approximately 1~2% lower video quality at these levels, which the developers deemed to be an acceptable trade for the faster encode times.

  • Cockpit Project: Cockpit 213

    Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from version 213.

  • Tools for SSH key management

    I use SSH constantly. Every day I find myself logged in to multiple servers and Pis (both in the same room as me and over the internet). I have many devices I need access to, and different requirements for gaining access, so in addition to using various SSH/SCP command options, I have to maintain a config file with all the connection details.

  • Daniel Stenberg: The command line options we deserve

    A short while ago curl‘s 230th command line option was added (it was --mail-rcpt-allowfails). Two hundred and thirty command line options!

    A look at curl history shows that on average we’ve added more than ten new command line options per year for very long time. As we don’t see any particular slowdown, I think we can expect the number of options to eventually hit and surpass 300.

    Is this manageable? Can we do something about it? Let’s take a look.

Proprietary Software Leftovers

Filed under
Software
  • GOWIN Semiconductor Adds Ubuntu Support to their GOWIN EDA FPGA Software for Improved Artificial Intelligence and IoT Development Toolchain Integration

    Traditional FPGAs have had a long history of development tool support for Windows and Red Hat, but in many cases lacked universal Linux support for other distributions such as Ubuntu. This has caused development burdens as Ubuntu has matured and become the most commonly supported operating system for Artificial Intelligence solution development. Neural network model development software such as Caffe, Tensorflow and Keras have found Ubuntu as the preferred operating system due to its open source support and scripting capabilities. As a result, having GOWIN’s FPGA EDA in the same operating system allows developers to seamlessly integrate FPGA synthesis, place and route and bitstream generation into their AI design and script work flows.

  • Kentucky official: Foreign actors, including Russians, North Koreans, target election system

    Previous attacks on election systems by foreign actors in the 2016 election focused on state-level systems, which have since beefed up security, though Dearing told legislators that "we’re now seeing those bad actors target the county level.”

  • New Workload Automation Platform Available on Linux and Windows Servers
  • War With Netflix and Disney Looms for India’s Top Local Streamer

    As global streaming giants Netflix Inc. and Walt Disney Co. spend millions of dollars to grab viewers in India, a country that could become their biggest overseas market, a homegrown rival is preparing to defend its turf.

    Zee5, the top domestic streaming platform set up by India’s biggest television broadcaster, is betting on local content to fend off big-spending rivals, Chief Executive Officer Tarun Katial said in an interview. The over-the-top, or OTT, service is playing to its advantage by adding more local-language shows and lower-price options to gain market share, he said.

  • DHS’s cyber wing responds to ransomware attack on pipeline operator [iophk: Windows TCO]

    The Department of Homeland Security’s cybersecurity agency recently responded to a ransomware attack on a natural gas compression facility that led the organization to shut down its operations for two days, the agency said Tuesday.

    The [attackers] were able to encrypt data on the organization’s IT and “operational technology” network, a broad term for a network that oversees industrial processes. No longer able to read data coming from across its enterprise, the facility shut down its various assets, including its pipelines, for two days.

  • Alert (AA20-049A): Ransomware Impacting Pipeline Operations [iophk: Windows TCO]

    CISA responded to a cyberattack affecting control and communication assets on the operational technology (OT) network of a natural gas compression facility. A cyber threat actor used a Spearphishing Link [T1192] to obtain initial access to the organization’s information technology (IT) network before pivoting to its OT network. The threat actor then deployed commodity ransomware to Encrypt Data for Impact [T1486] on both networks. Specific assets experiencing a Loss of Availability [T826] on the OT network included human machine interfaces (HMIs), data historians, and polling servers. Impacted assets were no longer able to read and aggregate real-time operational data reported from low-level OT devices, resulting in a partial Loss of View [T829] for human operators. The attack did not impact any programmable logic controllers (PLCs) and at no point did the victim lose control of operations. Although the victim’s emergency response plan did not specifically consider cyberattacks, the decision was made to implement a deliberate and controlled shutdown to operations. This lasted approximately two days, resulting in a Loss of Productivity and Revenue [T828], after which normal operations resumed. CISA is providing this Alert to help administrators and network defenders protect their organizations against this and similar ransomware attacks.

  • Chinese-linked [cracking] group using Windows backdoors to go after gambling industry targets

    A nation-state actor that has links with Chinese [attackers] is exploiting two new backdoors to run a cyber-espionage campaign against gambling entities in Southeast Asia, according to Trend Micro research.

    The new activity, which is also reportedly occurring in Europe and the Middle East, was first unearthed last year when cybersecurity consultancy Talent-Jump Technologies found a Microsoft Windows backdoor and contacted Trend Micro while conducting incident response for a company based in the Philippines.

Proprietary Software and Security

Filed under
Software
Security
  • TurboTax Is Still Tricking Customers With Tax Prep Ads That Misuse the Word “Free”

    On Dec. 30, the IRS announced it was revamping a long-standing agreement with the online tax preparation industry in which companies offer free filing to people with incomes below certain levels, a category that includes 70% of filers. The change in what’s known as the Free File program came in the wake of multiple ProPublica articles that revealed how the companies in the program steered customers eligible for free filing to their paid offerings. Under the updated agreement, the companies are now prohibited from hiding their Free File webpages from Google searches, and the IRS was allowed to create its own online tax-filing system.

    So far, it seems, the companies are abiding by their promise to make their Free File webpages visible in online searches. But the updated agreement appears to have a loophole: It doesn’t apply to advertising. Nothing in it, the agreement states, “limits or changes the rights” of participating companies to advertise “as if they were not participating in the Free File program.”

  • Ransomware Shuts Gas Compressor for 2 Days in Latest Attack [iophk: Windows TCO]

    It appears likely that the attacker explored the facility’s network to “identify critical assets” before executing the ransomware attack, according to Nathan Brubaker, a senior manager at the cybersecurity firm FireEye Inc. This tactic -- which has become increasingly popular among hackers -- makes it “possible for the attacker to disable security processes that would normally be enough to detect known ransomware indicators,” he said.

  • Twitter says Olympics, IOC accounts [cracked]

    Twitter (TWTR.N) said on Saturday that an official Twitter account of the Olympics and the International Olympic Committee’s (IOC) media Twitter account had been [cracked] and temporarily locked.

    The accounts were [cracked] through a third-party platform, a spokesperson for the social media platform said in an emailed statement, without giving further details.

  • Olympics, IOC accounts were [cracked], Twitter says

    The social media company Twitter on Saturday said that the official Twitter accounts for the Olympics as well as the International Olympic Committee (IOC) have both been [cracked] and temporarily locked.

  • Apple warns revenue will be lower than expected because of coronavirus impact

    In a rare investor update on Monday, Apple said the global effects of the coronavirus outbreak are having have a material impact on the company bottom line. The company does not expect to meet its own revenue guidance for the second quarter due to the impact of the virus, and warns that “worldwide iPhone supply will be temporarily constrained.” Store closures and reduced retail traffic in China are also expected to have a significant impact.

    All of Apple’s iPhone manufacturing partner sites have been reopened but are “ramping up more slowly than we had anticipated,” which means that fewer iPhones than expected will be manufactured. As a result, “[t]hese iPhone supply shortages will temporarily affect revenues worldwide,” says Apple.

  • We decided to leave AWS

    For past adventures, I mostly use third-party email delivery services like Postmark, SendGrid, SES, etc. Unfortunately their pricing models are based on the number of emails, which are not compatible with the unlimited forwards/sends that SimpleLogin offers. In addition, we want SimpleLogin to be easily self-hosted and its components fit on a single server. For these reasons, we decide to run our MTA (Mail Transfer Agent) on EC2 directly.

  • [Old] Kerberos (Sleepy: How does Kerberos work? – Theory

    The objective of this series of posts is to clarify how Kerberos works, more than just introduce the attacks. This due to the fact that in many occasions it is not clear why some techniques works or not. Having this knowledge allows to know when to use any of those attacks in a pentest.

    Therefore, after a long journey of diving into the documentation and several posts about the topic, we’ve tried to write in this post all the important details which an auditor should know in order to understand how take advantage of Kerberos protocol.

    In this first post only basic functionality will be discussed. In later posts it will see how perform the attacks and how the more complex aspects works, as delegation.

  • [Old] Kerberos (II): How to attack Kerberos?

    These attacks are sorted by the privileges needed to perform them, in ascending order. Thus, to perform the first attacks only connectivity with the DC (Domain Controller) is required, which is the KDC (Key Distribution Center) for the AD (Active Directory) network. Whereas, the last attack requires a user being a Domain Administrator or having similar privileges.

  • Kerberos (III): How does delegation work?

    In this article, we will focus on understand how the different kinds of delegation work, including some special cases. Additionally, some scenarios where it could be possible to take advantage of these mechanisms in order to leverage privilege escalation or set persistence in the domain will be introduced.

    Before starting with the explanations, I will assume that you already understand Kerberos’ basic concepts. However, if expressions like TGT, TGS, KDC or Golden ticket sound strange to you, you should definitely check the article “How does Kerberos works?” or any related Kerberos’ introduction.

Proprietary Software and Games for GNU/Linux

Filed under
GNU
Linux
Software

Komikku is a GTK Manga App for Linux

Filed under
Software

If you read a lot of manga and you use the Ubuntu desktop check out Komikku, a relatively new Manga reader app for Linux written in Python and GTK.

Now, usually when I highlight a GTK app on this blog you’d assume that I’m talking about a desktop app. But with GTK apps now running on mobile (like the Librem 5, for instance) a new breed of Linux software is emerging, built with mobile first use cases in mind.

And Komikku is one such app.

Alex, aka BabyWogue, aka the Linux YouTube guy who uses a robot voice and anime wallpaper in every video, recently shared a concise video overview of Komikku (it’s how I heard about it in the first place) and how it runs on …a desktop...

Read more

Also: BingWall is —Yes, a Bing Wallpaper App for Ubuntu

Syndicate content

More in Tux Machines

Type Title Author Replies Last Postsort icon
Story Critical Linux Kernel Vulnerability Patched in Ubuntu 19.10 and 18.04.4 LTS Rianne Schestowitz 31/03/2020 - 12:32am
Story Flatpak 1.7 Enters Development with New Features and Improvements Rianne Schestowitz 31/03/2020 - 12:30am
Story Ubuntu 20.04 GNOME X.Org vs. Wayland Session Performance Impact For Gaming Rianne Schestowitz 31/03/2020 - 12:26am
Story Where are the best GNOME communities Rianne Schestowitz 31/03/2020 - 12:18am
Story today's leftovers Roy Schestowitz 30/03/2020 - 11:21pm
Story Devices: Seeed, Nexcom and Kontron Roy Schestowitz 30/03/2020 - 11:00pm
Story Audiocasts/Shows: Linux Headlines, Linux-Tech&More QA, Linux Action News and Real Python Podcast Roy Schestowitz 30/03/2020 - 10:56pm
Story today's howtos Roy Schestowitz 30/03/2020 - 10:38pm
Story The Status of Universal Package Systems Roy Schestowitz 30/03/2020 - 8:16pm
Story Software: MystiQ, GnuCash, OpenTelemetry, Zeek and Jitsi Roy Schestowitz 30/03/2020 - 8:06pm