Language Selection

English French German Italian Portuguese Spanish

Linux

20 Things to do after installing Fedora 15

Filed under
Linux

khattam.info: Here are few things you can do after installing Fedora 15 to make the experience better. You may have to enable sudo to follow some of the tips or you can run the commands in terminal by logging in as root (su). The following are in no particular order.

On Upgrading to Linux Mint 11

Filed under
Linux

technologytales.com: For a Linux distribution that focuses on user friendliness, it does surprise me that Linux Mint offers no seamless upgrade path.

Open Source Tools and the End of Price Gouging

Filed under
Linux
Microsoft

ostatic.com: In an interesting column, PCMag.com's John Dvorak argues that Microsoft's upcoming Windows 8 operating system should be free. He writes:

Raspberry Pi: Tiny Computer That Runs Linux

Filed under
Linux
Hardware

linuxjournal.com: 700MHz processor, 256MB of RAM. It doesn't seem that long ago since I was running a desktop PC like that. However, these are the specs of a new keyring-sized computer to be released by a UK not for profit company.

Linux Mint 11 will not dislodge me from 10… yet

Filed under
Linux

dwasifar.com: So this weekend, because I apparently have nothing better to do, I installed the new Linux Mint 11 (Katya) on one of my test machines.

Rebooting

Filed under
Linux
  • Rebooting
  • The Linux 3.0 Kernel Will... Reboot Better?

Lenovo's MeeGo Netbook: Hands On

Filed under
Linux
Hardware

pcmag.com: But there have been signs of life here at Computex 2011, beginning with Asus's launch of the EeePC X101. And now there's the Lenovo Ideapad S100, which was spotted in the wild running a version of MeeGo that's actually usable. Let's take a closer look.

Kororaa 14 - Linux Mint of Fedora?

Filed under
Linux

ostatic.com: Kororaa 14 was released today by Christopher Smart. Chris Smart first introduced his Kororaa Linux distribution in 2005, but it fell out of development in 2006/2007. Last Christmas Smart announced that development had restarted on Kororaa and today the first stable release was unveiled.

How much GNU is there in GNU/Linux?

Filed under
Linux

pedrocr.net: After building the infrastructure to analyse the code in an Ubuntu release I decided to satisfy a simple curiosity and figure out how much GNU software is actually part of a modern distribution.

antiX derivative still "Looking Good!"

Filed under
Linux

usalug-org.blogspot: As proof of how flexible MEPIS has been, antiX has been in existence over five years now and it has three derivatives (or "flavors") of its own.

Syndicate content

More in Tux Machines

Developer lowers Drupal's barrier to entry

From a consumer perspective, I'd like open source to be ubiquitous to the point of invisibility. Using recent Ubuntu distros, I'm always shocked at how professional the environment feels. Just five years ago, you'd need to hunt down drivers and do a bunch of fiddling to get basic things like a sound card working. Now there are so many pushbutton ways to deploy open source tech, from OSes to CMS distros on Pantheon to buying an Android-powered mobile phone. We're not quite to the point where CMS users can feel like open source is transparent; there's still a huge investment in vendors to give you the expertise to manage your Drupal or WordPress site, for example. But we're closer than we were a decade ago, and that's pretty exciting. Read more

Intel invests $60 million in drone venture

Intel is investing $60 million in UAV firm Yuneec, whose prosumer “Typhoon” drones use Android-based controllers. Intel Corp. CEO Brian Krzanich and Yuneec International CEO Tian Yu took to YouTube to announce an Intel investment of more than $60 million in the Hong Kong based company to help develop drone technology. No more details were provided except for Krzanich’s claim that “We’ve got drones on our road map that are going to truly change the world and revolutionize the industry.” One possibility is that Intel plans to equip the drones with its RealSense 3D cameras (see farther below). Read more

today's howtos

Security Leftovers

  • London Calling: Two-Factor Authentication Phishing From Iran
    This report describes an elaborate phishing campaign against targets in Iran’s diaspora, and at least one Western activist. The ongoing attacks attempt to circumvent the extra protections conferred by two-factor authentication in Gmail, and rely heavily on phone-call based phishing and “real time” login attempts by the attackers. Most of the attacks begin with a phone call from a UK phone number, with attackers speaking in either English or Farsi. The attacks point to extensive knowledge of the targets’ activities, and share infrastructure and tactics with campaigns previously linked to Iranian threat actors. We have documented a growing number of these attacks, and have received reports that we cannot confirm of targets and victims of highly similar attacks, including in Iran. The report includes extra detail to help potential targets recognize similar attacks. The report closes with some security suggestions, highlighting the importance of two-factor authentication.
  • Ins0mnia: Unlimited Background Time and Covert Execution on Non-Jailbroken iOS Devices
    FireEye mobile researchers discovered a security vulnerability that allowed an iOS application to continue to run, for an unlimited amount of time, even if the application was terminated by the user and not visible in the task switcher. This flaw allowed any iOS application to bypass Apple background restrictions. We call this vulnerability Ins0mnia.
  • Why is the smart home insecure? Because almost nobody cares
    It's easy to laugh-and-point at Samsung over its latest smart-thing disaster: after all, it should have already learned its lesson from the Smart TV debacle, right? Except, of course, that wherever you see “Smart Home”, “Internet of Things”, “cloud” and “connected” in the same press release, there's a security debacle coming. It might be Nest, WeMo, security systems, or home gateways – but it's all the same.
  • Critical PayPal XSS vulnerability left accounts open to attack
    PayPal has patched a security vulnerability which could have been used by hackers to steal users' login details, as well as to access unencrypted credit card information. A cross site scripting bug was discovered by Egyptian 'vulnerabilities hunter' Ebrahim Hegazy -- ironically on PayPal's Secure Payments subdomain.
  • Important Notice Regarding Public Availability of Stable Patches
    Grsecurity has existed for over 14 years now. During this time it has been the premier solution for hardening Linux against security exploits and served as a role model for many mainstream commercial applications elsewhere. All modern OSes took our lead and implemented to varying degrees a number of security defenses we pioneered; some have even been burned into silicon in newer processors. Over the past decade, these defenses (a small portion of those we've created and have yet to release) have single-handedly caused the greatest increase in security for users worldwide.
  • Finland detains Russian accused of U.S. malware crimes
    Finland confirmed on Thursday it has detained a Russian citizen, Maxim Senakh, at the request of U.S. federal authorities on computer fraud charges, in a move that Russia calls illegal.
  • Finland confirms arrest of Russian citizen accused of crimes in the US
    Finnish authorities have confirmed the detention of Maxim Senakh, a Russian citizen accused of committing malware crimes in the US. The Russian Foreign Ministry has expressed concern and called on Finland to respect international law.
  • More than 80% of healthcare IT leaders say their systems have been compromised
    Eighty-one percent of healthcare executives say their organizations have been compromised by at least one malware, botnet or other kind of cyberattack during the past two years, according to a survey by KPMG. The KPMG report also states that only half of those executives feel that they are adequately prepared to prevent future attacks. The attacks place sensitive patient data at risk of exposure, KPMG said. The 2015 KPMG Healthcare Cybersecurity Survey polled 223 CIOs, CTOs, chief security officers and chief compliance officers at healthcare providers and health plans.
  • Removal of SSLv3 from LibreSSL
  • Kansas seeks to block release of voting machine paper tapes
    The top election official in Kansas has asked a Sedgwick County judge to block the release of voting machine tapes sought by a Wichita mathematician who is researching statistical anomalies favoring Republicans in counts coming from large precincts in the November 2014 general election.