Language Selection

English French German Italian Portuguese Spanish

Security

Security, Digital Restrictions (DRM), and Proprietary Problems

Filed under
Security
  • Best forensic and pentesting Linux distros of 2020

    20.04 LTS and uses the Xfce desktop, and is available as a single ISO only for 64-bit machines. In addition to the regular boot options, the distro’s boot menu also offers the option to boot into a forensics mode where it doesn’t mount the disks on the computer.

    BackBox includes some of the most common security and analysis tools. The project aims for a wide spread of goals, ranging from network analysis, stress tests, sniffing, vulnerability assessment, computer forensic analysis, exploitation, privilege escalation, and more.

    All the pentesting tools are neatly organized in the Auditing menu under relevant categories. These are broadly divided into three sections. The first has tools to help you gather information about the environment, assess vulnerabilities of web tools, and more. The second has tools to help you reverse-engineer programs and social-engineer people. The third has tools for all kinds of analysis.

    BackBox has further customized its application menu to display tooltips with a brief description of each bundled tool, which will be really helpful for new users who aren’t familiar with the tools.

    As an added bonus, the distro also ships with Tor and a script that will route all Internet bound traffic from the distro via the Tor network.

  • Thanksgiving security updates

    Security updates have been issued by openSUSE (blueman, chromium, firefox, LibVNCServer, postgresql10, postgresql12, thunderbird, and xen), Slackware (bind), SUSE (bluez, kernel, LibVNCServer, thunderbird, and ucode-intel), and Ubuntu (mutt, poppler, thunderbird, and webkit2gtk).

  • Drupal core - Critical - Arbitrary PHP code execution - SA-CORE-2020-013

    AC:Complex/A:User/CI:All/II:All/E:Exploit/TD:UncommonVulnerability: Arbitrary PHP code executionCVE IDs: CVE-2020-28949CVE-2020-28948Description:
    The Drupal project uses the PEAR Archive_Tar library. The PEAR Archive_Tar library has released a security update that impacts Drupal. For more information please see:

    CVE-2020-28948
    CVE-2020-28949
    Multiple vulnerabilities are possible if Drupal is configured to allow .tar, .tar.gz, .bz2 or .tlz file uploads and processes them.

    To mitigate this issue, prevent untrusted users from uploading .tar, .tar.gz, .bz2 or .tlz files.

    This is a different issue than SA-CORE-2019-12, similar configuration changes may mitigate the problem until you are able to patch.

  • Financial software firm cites security, control as reasons for moving from email to Slack [Ed: Unbelievable stupidity; Slack is illegal mass surveillance and it’s centralised proprietary software (whereas E-mail can be encrypted, e2e)]

    ASX-listed financial software firm Iress is moving away from email to Slack for communications and its chief technology officer, Andrew Todd, says this is because the app offers improved security and control.

  • Introducing another free CA as an alternative to Let's Encrypt

    Let's Encrypt is an amazing organisation doing an amazing thing by providing certificates at scale, for free. The problem though was that they were the only such organisation for a long time, but I'm glad to say that the ecosystem is changing.

  • Denuvo's Anti-Piracy Protection Probably Makes Sense For Big-Selling AAA Titles

    A hacking team believed to have obtained data from gaming giant Ubisoft has published documents that claim to reveal the costs of implementing Denuvo's anti-piracy protection. While the service doesn't come cheap, the figures suggest that for a big company putting out big titles with the potential for plenty of sales, the anti-tamper technology may represent value for money.

  • Disappointing: Netflix Decides To Settle With Chooseco LLC Over 'Bandersnatch' Lawsuit

    Well, it's been quite a stupid and frustrating run in the trademark lawsuit between Netflix and Chooseco LLC, the folks behind Choose Your Own Adventure books from our youth. At issue was the Black Mirror production Bandersnatch, in which the viewer takes part in an interactive film where they help decide the outcome. The main character is creating a book he refers to as a "choose your own adventure" book. Chooseco also complained that the dark nature of the film would make the public think less of CYOA books as a result. Netflix fought back hard, arguing for a dismissal on First Amendment grounds, since the film is a work of art and the limited use or reference to CYOA books was an important, though small, part of that art. The court decided that any such argument was better made at trial and allowed this madness to proceed, leading Netflix to petition for the cancellation of Chooseco's trademark entirely. This story all seemed to be speeding towards an appropriately impactful conclusion.

  • TPM circumvention and website blocking orders: An EU perspective

    Website blocking orders in IP cases (mostly, though not solely, in relation to copyright-infringing websites) are routinely granted in several jurisdictions, whether in Europe or third countries. The availability of such relief has been established in case law, administrative frameworks and academic studies alike.

    The Court of Justice of the European Union ('CJEU') expressly acknowledged the compatibility of such a remedy with EU law in its 2014 decision in UPC Telekabel. Also the European Court of Human Rights recently found that, although it is necessary that this particular remedy is available within a balanced and carefully drafted legislative framework which contains a robust and articulated set of safeguards against abuse, website blocking orders are not per se contrary to the provision in Article 10 ECHR.

    Over time, courts and other authorities (including administrative authorities in certain EU Member States) have dealt with applications which have: been based on different legal grounds; been aimed at protecting different types of rights; and resulted in different types of orders against internet service providers ('ISPs').

    An interesting recent development concerns website blocking orders in relation to websites that market and sell devices and software aimed at circumventing technological protection measures (‘TPMs’). TPMs offer rights holders an ancillary right of protection and are deployed to protect against infringement of copyright in works that subsist in multimedia content such as video games. TPMs are a cornerstone in copyright protection in the digital age where large-scale copying and dissemination of copyright-protected content is so prevalent.

    [...]

    In light of the foregoing, copyright owners appear entitled to seek injunctions against intermediaries to also block access to websites dealing with TPM-circumventing devices. The legal basis for that can also be, subject to satisfying all the other requirements under EU and national law, the domestic provision implementing Article 8(3) of the InfoSoc Directive.

    All in all, it appears likely that we will see more blocking orders in the future, including orders – issued by courts and competent authorities around Europe – targeting websites that provide TPM-circumventing devices. This is an unsurprising and natural evolution of website blocking jurisprudence. It also serves to show the very flexibility of this type of remedy and, matched inter alia with the loose notion of ‘intermediary’, its inherently broad availability.

  • Prolonged AWS outage takes down a big chunk of the internet

    Many apps, services, and websites have posted on Twitter about how the AWS outage is affecting them, including 1Password, Acorns, Adobe Spark, Anchor, Autodesk, Capital Gazette, Coinbase, DataCamp, Getaround, Glassdoor, Flickr, iRobot, The Philadelphia Inquirer, Pocket, RadioLab, Roku, RSS Podcasting, Tampa Bay Times, Vonage, The Washington Post, and WNYC. Downdetector.com has also shown spikes in user reports of problems with many Amazon services throughout the day.

Secuity Leftovers

Filed under
Security

  • Security updates for Wednesday

    Security updates have been issued by Debian (spip and webkit2gtk), Fedora (kernel and libexif), openSUSE (chromium and rclone), Slackware (mutt), SUSE (kernel, mariadb, and slurm), and Ubuntu (igraph).

  • Top Tips to Protect Your Linux System

    Linux-based operating systems have a reputation for their high-security level. That's one of the reasons why the market share for Linux has been growing. The most commonly used operating systems such as Windows are often affected by targeted attacks in the form of ransomware infections, spyware, as well as worms, and malware.

    As a result, many personal, as well as enterprise users, are turning to Linux-based operating systems such as the Ubuntu-based Linux OS for security purposes. While Linux based systems are not targeted as frequently as other popular operating systems, they are not completely foolproof. There are plenty of risks and vulnerabilities for all types of Linux devices which put your privacy as well as your identity at risk.

  • Building a healthy relationship between security and sysadmins | Enable Sysadmin

    Learn how to bridge the gap between operations/development and security.

Security Leftovers

Filed under
Security
  • This Bluetooth Attack Can Steal a Tesla Model X in Minutes

    Lennert Wouters, a security researcher at Belgian university KU Leuven, today revealed a collection of security vulnerabilities he found in both Tesla Model X cars and their keyless entry fobs. He discovered that those combined vulnerabilities could be exploited by any car thief who manages to read a car's vehicle identification number—usually visible on a car's dashboard through the windshield—and also come within roughly 15 feet of the victim's key fob. The hardware kit necessary to pull off the heist cost Wouters around $300, fits inside a backpack, and is controlled from the thief's phone. In just 90 seconds, the hardware can extract a radio code that unlocks the owner's Model X. Once the car thief is inside, a second, distinct vulnerability Wouters found would allow the thief to pair their own key fob with the victim's vehicle after a minute's work and drive the car away.

  • Ransomware gangs likely to start monetising stolen data: researcher

    Ransomware gangs have shown themselves to be an innovative lot, incorporating more and more tactics as they look to extort money from their victims and this trend will continue into the new year, a veteran researcher of this brand of malware says.

  • Victory! Court Protects Anonymity of Security Researchers Who Reported Apparent Communications Between Russian Bank and Trump Organization

    Security researchers who reported observing Internet communications between the Russian financial firm Alfa Bank and the Trump Organization in 2016 can remain anonymous, an Indiana trial court ruled last week.

    The ruling protects the First Amendment anonymous speech rights of the researchers, whose analysis prompted significant media attention and debate in 2016 about the meaning of digital records that reportedly showed computer servers linked to the Moscow-based bank and the Trump Organization in communication.

    Imagine walking down the street, looking for a good cup of coffee. In the distance, a storefront glows in green through your smart glasses, indicating a well-reviewed cafe with a sterling public health score. You follow the holographic arrows to the crosswalk, as your wearables silently signal the self-driving cars...

    Despite widespread complaints about its effects on human rights, the Brazilian Senate has fast-tracked the approval of “PLS 2630/2020”, the so-called “Fake News” bill. The bill lacked the necessarily broad and intense social participation that characterized the development of the 2014 Brazilian Civil Rights...

  • Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

    Despite their importance, Unix/Linux local and privileged accounts often don’t get sufficient oversight in a centralized PAM strategy.

    True, the Unix/Linux userbase is typically more technically savvy and has a greater understanding of security than your typical user. In some ways, Unix/Linux actually led the move toward PAM decades ago. The problem is, not much has changed in decades. They still heavily rely on their own methods for privileged management, such as Sudo controls, and are still using Sudo with few differences from when it was first introduced.

    No matter how savvy the user, Unix/Linux privileged accounts are time-consuming and tedious to manage, so they often don’t get sufficient oversight. In addition, when it comes time for an audit, it’s extremely difficult to piece together all of the privileged account activities and security controls. You might have one report for Windows and Mac and a separate one or many for Unix/Linux. You can’t get a consolidated view of risk to use for decision-making or show progress to your auditors.

  • Strange case of the art dealer, the tech billionaire, his email and Picasso’s lover

    The only problem, a judge said yesterday, is that Allen may not have written the email. In fact, Mr Justice Trower said, evidence pointed to the email having been fabricated “for the purpose of misleading the court”.

Ubuntu maker wants app developers to stop worrying too much about security

Filed under
Security
Ubuntu

Buoyed by the recent Snyk security report that found security vulnerabilities in several container images except Ubuntu’s, the company behind it, Canonical, has published a whole portfolio of hardened images.

Unsurprisingly, Canonical has partnered with Docker to streamline the delivery of the secure portfolio of images through Docker Hub.

“Canonical and Docker will partner together to ensure that hardened free and commercial Ubuntu images will be available to all developer software supply chains for multi-cloud app development,” Docker's Matt Carter wrote in a blog post announcing the collaboration.

Read more

Security Leftovers

Filed under
Security

Security Leftovers

Filed under
Security
  • Israel cyber directorate warns of remotely exploitable Drupal flaw

    A warning has been issued by the Israel National Cyber Directorate about a critical remote code execution flaw in the Drupal content management system.

  • Australian legal industry provider Law In Order hit by Windows ransomware

    Australian end-to-end document and digital solutions provider to the legal industry Law In Order says it has suffered a "cyber security incident" and has had to limit access to most of its website as a precaution.

  • Critical VMware Zero-Day Bug Allows Command Injection; Patch Pending

    VMware explained it has no patch for a critical escalation-of-privileges bug that impacts both Windows and Linux operating systems and its Workspace One.

    The U.S. Cybersecurity and Infrastructure Security Agency is warning of a zero-day bug affecting six VMware products including its Workspace One, Identity Manager and vRealize Suite Lifecycle Manager.

    The critical unpatched bug is a command injection vulnerability.

    In a separate VMware advisory, the company did not indicate whether the vulnerability was under active attack. Tracked as CVE-2020-4006, the bug has a CVSS severity rating of 9.1 out of 10. The company said patches are “forthcoming” and that workarounds “for a temporary solution to prevent exploitation of CVE-2020-4006” are available.

  • Manchester United forced to take systems offline following cyberattack

    Manchester United said in a statement Nov. 20 that it had extensive protocols and procedures in place for such an event and had rehearsed for this risk. It added that “our cyber defenses identified the attack and shut down affected systems to contain the damage and protect data.”

    Media channels including the club’s website, mobile app and streaming service were unaffected by the attack and no personal data is believed to have been stolen.

  • Apple's global security chief and two members of Sheriff's office indicted for alleged bribery
  • iPads for gun permits: Apple global security chief indicted in bribery case

    The head of global security at Apple and two top officials from the Santa Clara County Sheriff's Office and a local business owner have been accused in a grand jury indictment of exchanging bribes for concealed gun permits, the Morgan Hll Times, a newspaper in California, has reported.

  • Apple Security Head Charged With Bribery for Gun Licenses

    A California district attorney accused Apple Inc. Chief Security Officer Thomas Moyer of offering a bribe to state officials for gun licenses, according to indictments issued on Monday.

    Moyer was named along with Santa Clara County Undersherrif Rick Sung and Captain James Jensen in a case that involved offering bribes in return for concealed firearms licenses, according to a court document and a statement from the Santa Clara district attorney’s office.

  • Apple head of security accused of offering iPads as bribes for concealed gun permits

    A California grand jury has indicted Apple’s head of global security on charges that he tried to bribe Santa Clara County officials to procure firearms (CCW) licenses, according to a news release. Santa Clara district attorney Jeff Rosen alleges that Thomas Moyer offered 200 iPads — worth about $70,000 — to Capt. James Jensen and Undersheriff Rick Sung in the Santa Clara County sheriff’s office, in exchange for four concealed firearms licenses for Apple employees.

    The charges came after a two-year investigation. “In the case of four CCW licenses withheld from Apple employees, Undersheriff Sung and Cpt. Jensen managed to extract from Thomas Moyer a promise that Apple would donate iPads to the Sheriff’s Office,” Rosen said in the news release. The iPads were never delivered, according to Rosen’s office, because Sung and Moyer became aware in 2019 that the district attorney was executing a search warrant for the sheriff department’s CCW records.

Security Leftovers

Filed under
Security
  • Why You Should Trust Open Source Software Security | IT Pro

    When it comes to open source vs. proprietary software security, security experts say open source software security sets the bar high.

  • SUSE Private Registry: A safe Harbor for your containers. - SUSE Communities

    SUSE Private Registry provides integration points for container content vulnerability scanning services. Included by default is Trivy, a simple and comprehensive scanner that can search image contents for vulnerabilities in OS packages (for SLES, openSUSE, Alpine, RHEL, CentOS, Debian, and others) as well as many language/framework package managers (like Bundler, Composer, Pipenv, Poetry, npm, yarn, and Cargo).

  • Basics of Kubernetes security – IBM Developer

    Kubernetes is popular among developers and administrators, and the concepts of deploying, scaling, and managing containerized applications are very familiar. However, when production deployments are discussed, one area of Kubernetes that is critical to production deployments is security. It’s important to understand how the platform manages authentication and authorization of users and applications.

    If your Kubernetes cluster holds sensitive information such as bank account details, medical records, or anything confidential, you should take advantage of all the security precautions that Kubernetes offers. In addition, you can use plenty of non-Kubernetes-specific security tools and approaches to add extra security layers.

Cloud Data Encryptor Cryptomator Adds Experimental FUSE Support On Windows, KWallet Integration

Filed under
Security

Cryptomator, a client-side encryption tool for cloud files (and more), has been updated recently with experimental FUSE support on Windows (via WinFSP), KWallet support, vault statistics, and more.

Cryptomator is a free and open source Java tool that provides client-side encryption for your cloud storage files, available for Windows, Mac and Linux. There are also iOS and Android applications - these are open core (a business model for the monetization of commercially produced open-source software), and need to be purchased.

It works with cloud storage services that synchronize with a local directory, like Dropbox, OneDrive (on Linux using e.g. OneDrive Free Client fork) and Google Drive (including using it with Insync). You can choose to either encrypt your whole cloud storage, or only a few sensitive files, in either a single or multiple vaults.

Read more

Security: Patches, Linux Format Special and POWER9 Problems

Filed under
Security
  • Security updates for Friday

    Security updates have been issued by CentOS (firefox), Fedora (chromium, microcode_ctl, mingw-libxml2, seamonkey, and xen), openSUSE (slurm_18_08 and tor), Oracle (thunderbird), SUSE (buildah, firefox, go1.14, go1.15, krb5, microcode_ctl, perl-DBI, podman, postgresql12, thunderbird, ucode-intel, wireshark, wpa_supplicant, and xen), and Ubuntu (firefox and phpmyadmin).

  • Cyber insecurity | Linux Format

    Each year we proclaim it’s time to learn how to hack. But why? Jonni always gets angry at the subversion of the term ‘hacking’ and I can understand why. Hacking is fun, as is finding out how systems work and how to get them to do things they were never meant to do.

    With open source and the Linux ecosystem there’s an abundance of hacking fun to be had, and it’s no wonder all the key tools for learning how to hack – and actually hack – are developed and run out of Linux systems.

    For this year’s look at the world of hacking Jonni’s introducing you to the metasploit framework. This is a playground where you can learn, explore and develop hacking skills. It’s usually paired with Kali Linux, and we’re putting these on the Linux Format DVD, which makes a welcome return.

  • IBM POWER9 CPUs Need To Flush Their L1 Cache Between Privilege Boundaries Due To New Bug

    CVE-2020-4788 is now public and it's not good for IBM and their POWER9 processors... This new vulnerability means these IBM processors need to be flushing their L1 data cache between privilege boundaries, similar to other recent CPU nightmares.

    While IBM POWER9 allows speculatively operating on completely validated data in the L1 cache, when it comes to incompletely validated data that bad things can happen. Paired with other side channels, local users could improperly obtain data from the L1 cache.

    CVE-2020-4788 was made public this morning and is now causing all stable Linux kernel series to receive the mitigation that amounts to hundreds of lines of new code. The mitigation is flushing the L1 data cache for IBM POWER9 CPUs across privilege boundaries -- both upon entering the kernel and on user accesses.

Security Patches in OpenSUSE and SUSE

Filed under
Security
SUSE
  • Two Tumbleweed Snapshots update PostgreSQL, Mesa

    Snapshot 20201117 provides the latest update of packages for the rolling release. Among the packages to update was Mozilla Thunderbird to version 78.4.3; the email client updated a Rust patch and brought in a new feature from a previous minor version that prompts for an address to be used when starting an email from an address book entry with multiple addresses. KDE’s Plasma 5.20.3 stopped the loading of multiple versions of the same plugin in the task manager KSysGuard and there were many other bug fixes for Plasma users. Four months of shell scripts were updated in the hxtools 20201116 version; one of the changes to gpsh changed the tmp location to /var/tmp, which was to avoid saving potentially large files to tmpfs. The Linux Kernel made a jump from 5.9.1 to 5.9.8, which had a change for Btrfs as well as several USB changes. Database package postgresql 13 had its first point release to 13.1, which took care of three Common Vulnerabilities and Exposures and fixed a time test case so it works when the USA is not observing daylight-savings time. The graphical tool for administering virtual machines, virt-manager slimmed down the filesystem device editor User Interface. Text editor vim had a fix for when a crash happens when using a popup window with “latin1” encoding and python 3.8.6 took care of CVE-2019-20916.

  • Guardicore and SUSE partner to help you protect your critical applications - SUSE Communities

    Within the cybersecurity segment, Guardicore stands out from the crowd with its Guardicore Centra Platform disrupting the legacy firewall market by implementing micro-segmentation in your organization. Their software-only approach is decoupled from the physical network, providing a faster alternative to firewalls. Built for the agile enterprise, Guardicore offers greater security and visibility in the cloud, data-center, and endpoint. It also ensures security doesn’t slow you down and thanks to SUSE environments, it allows you to code and deploy on demand

Syndicate content

More in Tux Machines

TUXEDO Computers Enables Full Linux Support on the Intel-TongFang QC7 Gaming Laptop

At the request of numerous users, TUXEDO Computers is now providing the necessary drivers and software needed to enable full Linux support on the Intel-TongFang QC7 reference gaming laptop, which is the base of several laptops available for purchase in stores across Europe and the US. Some well known brands include the Aftershock / LEVEL51 Vapor 15 Pro, Eluktronics MAG-15, MAINGEAR ELEMENT, and XMG FUSION 15, the latter being now offered by TUXEDO Computers on their online store fully configurable and pre-installed with the company's in-house built, Ubuntu-based TUXEDO_OS. Read more

Red Hat/Fedora: Cockpit, WHO, DarwinAI and Emmanuel Bernard.

  • Cockpit 233 — Cockpit Project

    Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from Cockpit version 233.

  •  
  • World Health Organization Embraces Open Source Technologies to Assist Healthcare Workers

    Red Hat, Inc., the world's leading provider of open source solutions, today announced it is working with the World Health Organization (WHO), the specialized agency of the United Nations responsible for international public health, to create a sustainable open source development infrastructure to support the development of the Learning Experience Platform (LXP) for the WHO Academy, the organization’s new state-of-the-art training center.

  •  
  • DarwinAI and Red Hat Team Up to Bring COVID-Net Radiography Screening AI to Hospitals, Using Underlying Technology from Boston Children’s Hospital

    DarwinAI, the explainable artificial intelligence (XAI) company, and Red Hat, the world’s leading provider of open source solutions, today announced a collaboration to accelerate the deployment of COVID-Net—a suite of deep neural networks for COVID-19 detection and risk stratification via chest radiography—to hospitals and other healthcare facilities. DarwinAI and Red Hat are also leveraging the expertise of a computation research group, the Fetal Neonatal Neuroimaging and Developmental Science Center (FNNDSC) at Boston Children's Hospital to better focus the software for real world clinical and research use.

  • Emmanuel Bernard fell into open-source

    Hello, and welcome to developer's journey, the podcast, bringing you the making of stories of successful software developers to help you on your upcoming journey. My name is Tim Bourguignon, and on this episode 127, I receive Emmanuel Bernard. Emmanuel is a Java champion, Distinguished Engineer, Chief Architect for RedHat, open source contributor to the Java standards, public speaker, community leader, and among others, the host of the podcast, The Cast Coders. Emmanuel, welcome to DevJourney.

Kernel Space: Systemd, OpenZFS, AMDGPU Driver

  • Systemd 247 Released With Experimental Out-of-Memory Daemon, New Credentials Capability - Phoronix

    Systemd 247 is out today as the latest major version of this Linux init system. Like most systemd releases, systemd 247 is very heavy on new features.  Systemd 247 most notably introduces the still-experimental systemd-oomd as the out-of-memory daemon with that Linux OOMD code originally developed by Facebook and later adopted for desktop use-cases. Once stabilized, the goal of systemd-oomd is for improving the behavior when the Linux system is low on memory / under memory pressure.  Beyond systemd-oomd, systemd 247 now defaults to using Btrfs with systemd-homed and other enhancements as outlined below. 

  •   
  • OpenZFS 2.0-RC7 Brings Better ABI Handling, Reduced Latency For Non-Interactive I/O - Phoronix

    OpenZFS 2.0 is getting quite close to release but isn't over the finish line yet and this week brings the seventh release candidate.  OpenZFS 2.0-RC7 is lighter than some of the past release candidates so it looks like work may be winding down. OpenZFS 2.0 is a big release with Zstd compression, mainlined FreeBSD support, various performance improvements, sequential resilvering, persistent L2ARC support, and many other changes. 

  •   
  • AMD Stages More Driver Updates For New GPUs With Linux 5.11 - Phoronix

    While the Radeon RX 6800 series is now shipping that was developed under the Sienna Cichlid codename, there are other fishy codenames remaining and are seeing more work for the Linux 5.11 kernel that will officially open development in December and then likely reaching stable in February.  AMD on Wednesday sent out more AMDGPU kernel driver updates for Navy Flounder and Dimgrey Cavefish. Navy and Dimgrey are for unreleased AMD Radeon products that appear to be for additional RDNA 2 / Radeon RX 6000 series parts. Nothing too notable with the latest batch of updates, just more enablement churn and more device IDs added in. 

today's howtos

  • How to install Mageia Linux

    Mageia is an RPM-based Linux operating system forked from the famous French Linux distribution Mandriva. It is an open-source operating system and is an excellent option for using Linux the RPM way. In this guide, we’ll show you how to install the operating system on your computer.

  • How to free up RAM on Linux

    Are you running out of usable memory on your Linux PC? Are you trying to free up RAM space but don’t know how to do it? We can help! Follow along as we go over how to free up RAM on Linux!

  • [Older] How to monitor network activity on a Linux system - LinuxConfig.org

    In this article we learn how to monitor network activity on Linux.

  • How to Disable Your Webcam in Ubuntu?

    Find out these simple methods to disable webcam in Ubuntu. We can stop the webcam driver to load in Linux OS by modifying the configuration file.

  • How to install Code Blocks on Ubuntu 20.04 - YouTube

    In this video, we are looking at how to install Code Blocks on Ubuntu 20.04. Enjoy! For the command and more, look here: https://www.linuxmadesimple.info/2020/11/how-to-install-code-blocks-on-ubuntu.html