Language Selection

English French German Italian Portuguese Spanish

Login

Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

GNU RCS 5.10.0 available

release notes:

  A spate of bugfixes, new support for nanosecond mtime, etc.

README excerpt:

  GNU RCS (Revision Control System) manages multiple revisions of files.
  RCS can store, retrieve, log, identify, and merge revisions.
  It is useful for files that are revised frequently, e.g.,
  programs, documentation, graphics, and papers.

NEWS for 5.10.0 (2020-10-20):

  - bug fixes

    - RCS file search skipped RCS/FILENAME by default

      The default set of candidate filenames for the RCS file is:

       RCS/FILENAME,v
       RCS/FILENAME
       FILENAME,v

      RCS 5.8 (released 2011-08-30) introduced a bug which caused the
      default RCS file search to skip RCS/FILENAME.  Regression fixed.

    - ‘rlog -w’ behaved like ‘rlog’ (sans ‘-w’)

      RCS 5.8 (released 2011-08-30) introduced a bug which caused
      ‘rlog -w’ (without any logins specified) to fail to default to
      the user login.  Instead it behaved as if option ‘-w’ were
      omitted entirely.

      The cases where logins are specified (e.g., ‘rlog -wjrhacker’)
      were not affected.

    - missing string in comma-v detected, diagnosed

      Previously, if foo,v contained fragment:

       1.1
       log
       text
       @@

      i.e., there was no string value following the ‘log’ keyword,
      then rlog (et al) would interpret that as an "empty log message"
      instead of as a violation of the RCS file format grammar, which
      stipulates that a string value must follow the keywords ‘desc’,
      ‘log’ and ‘text’ -- (info "(rcs) comma-v grammar").

      Now, such a situation causes rlog (et al) to abort w/ message
      "missing string after KEYWORD" (KEYWORD ∈ {desc, log, text}).

    - subsecond resolution maintained for ‘-d’, ‘-T’

      An RCS ‘delta’ includes a ‘date’ component w/ second (whole
      number) resolution.  Previously, on filesystems that support
      subsecond (fractional) resolution for the file modification time
      (aka "mtime"), RCS commands given the ‘-d’ and/or ‘-T’ options
      would disregard, on read, and specify 0 (zero), on write, the
      fractional mtime.

      Now, RCS preserves subsecond mtime in those cases.  More details
      in new manual section -- (info "(rcs) Stamp resolution").

  - portability fixes

    - now buildable under ‘gcc -std=c11’ (default for GCC 5)

      RCS previously failed to build under ‘-std=c11’, which happens
      to be the default mode of GCC 5.  In particular, ‘-std=c11’ is
      more strict about function attributes syntax than ‘-std=c99’.

      Now, the offending code has been rectified.  (Specifically,
      attribute ‘_Noreturn’ now is at the start of a func decl.)

    - threads support

      RCS itself is clueless about threads, but it uses gnulib, which
      may or may not require threads support.  This manifests as the
      configure script options ‘--enable-threads=MODEL’ as well as
      ‘--disable-threads’.

      Previously, "make" would ignore MODEL (even implicitly), acting
      as if ‘--disable-threads’ were specified.  Now, it takes into
      account MODEL by propagating makefile var ‘LIBTHREAD’.

    - consult ‘USER’ first if ‘LOGNAME’ read-only

      To determine the user (login) name in the absence of a specific
      command-line option, RCS normally checks first the env var
      ‘LOGNAME’ and second, ‘USER’.  Alas, this is unworkable under
      AIX, where ‘LOGNAME’ is read-only.  So now, if the configure
      script finds ‘LOGNAME’ to be read-only, it arranges to build RCS
      to check ‘USER’ first and then ‘LOGNAME’.  See README.

    - configure script avoids ‘date -r’

      Unfortunately ‘date -r’ is not POSIX.  This made AIX unhappy.

    - other AIX accomodation

      The AIX compiler complains about the implicit casting that
      occurs when returning a pointer from a function whose return
      type is ‘bool’.  So, we are now explicit.

  - documentation improvements

    - docfix: add "Log message option" to Detailed Node Listing

      Probably Emacs by now has some automagic way to sync the
      ‘@detailmenu’ section w/ the text body... hmmm.

    - style change due to ‘-zZONE’ option

      Specifying option ‘-zZONE’ to ‘rcs log’ changes the date output
      style to use hyphens (ISO) instead of slashes (YYYY/MM/DD).

    - rlog, use with CVS

      Since RCS 5.8 (released 2011-08-30), there have been sporadic
      reports of rlog (aka "rcs log") failing with CVS files.  The
      manual now addresses this -- (info "(rcs) comma-v particulars").

    - delim-separated list

      GNU RCS has always supported comma to separate items in a list
      (e.g., ‘rcs frob -o1.1,2.2’ to remove (or "outdate") revisions
      1.1 and 2.2).  But did you know that most places a comma is
      welcome and you can use other delimiter characters as well?
      Read all about it -- (info "(rcs) Delim-separated list").

    - (style) pargraphs no longer indented

      This looks nicer (IMHO) for Info and Text output formats.

  - testing improvements

    Many new tests and test cases for existing tests were added, to
    catch regressions and exercise infrequent code paths.  For "make
    check" (locally), function coverage is 97.3% (considered "high")
    and line coverage is 84.9% (considered "medium"), per lcov.

  - bootstrap/maintenance tools

    upgraded:

     GNU gnulib 2020-10-19 23:37:09
     GNU texinfo 6.7
     GNU Automake 1.16.2
     GNU Autoconf 2.69c

    as before:

     (none)

tarballs and detached signatures:

  http://ftpmirror.gnu.org/rcs/rcs-5.10.0.tar.lz
  http://ftpmirror.gnu.org/rcs/rcs-5.10.0.tar.lz.sig
  http://ftpmirror.gnu.org/rcs/rcs-5.10.0.tar.xz
  http://ftpmirror.gnu.org/rcs/rcs-5.10.0.tar.xz.sig

source code:

  https://git.savannah.gnu.org/cgit/rcs.git/?h=p

homepage:

  https://www.gnu.org/software/rcs/
Read more

KeePassXC 2.6.2 Password Manager Adds Major UI Improvements and Bug Fixes

One of the major improvements included in the KeePassXC 2.6.2 release is a new way for the web browser integration to handle and prioritizes URLs. In addition, there’s also a new “Always on Top” mode in the view menu that lets users set the main KeePassXC window to always be on top. Furthermore, KeePassXC 2.6.2 moves the option to show or hide usernames and passwords to the view menu, adds new command-line options to let users specify the location of the configuration file and to set environment variables, and improves the CSV import and export functionality, along with support for ISO datetimes. Read more

IBM/Red Hat: LinuxONE, OpenShift, Integrity Measurement Architecture (IMA) and More

  • IBM integrates Linux One with R3 Corda Enterprise

    It’s an exciting time for IBM LinuxONE. Over the past several months, we’ve been doubling down on new hardware, Red Hat OpenShift and new Cloud Paks for LinuxONE, and new confidential computing capabilities. More than ever, our clients of all sizes looking to win in the era of hybrid cloud are focused on key areas: resiliency, performance demands, security, flexibility and modernization. Other areas of growth for LinuxONE are emerging workloads and industries like blockchain and digital asset custody. While the importance of safeguarding business and customer data is well known, the nature of blockchain use cases often include the initiation, transfer and custody of financial assets for your business and your customers—which further increases the importance of building applications with security and privacy first. News from R3’s CordaCon

  • Persistent storage in action: Understanding Red Hat OpenShift's persistent volume framework - Red Hat Developer

    Red Hat OpenShift is an enterprise-ready Kubernetes platform that provides a number of different models you can use to deploy an application. OpenShift 4.x uses Operators to deploy Kubernetes-native applications. It also supports Helm and traditional template-based deployments. Whatever deployment method you choose, it will be deployed as a wrapper to one or more existing OpenShift resources. Examples include BuildConfig, DeploymentConfig, and ImageStream. In this article, I introduce you to OpenShift’s Kubernetes-based persistent volume framework for persistent cluster storage. You will learn how to use OpenShift’s PersistentVolume (PV) and PersistentVolumeClaim (PVC) objects to provision and request storage resources.

  • How to use the Linux kernel's Integrity Measurement Architecture

    The kernel integrity sub-system can be used to detect if a file has been altered (accidently or maliciously), both remotely and/or locally. It does that by appraising a file's measurement (its hash value) against a "good" value stored previously as an extended attribute (on file systems which support extended attributes like ext3, ext4. etc.). Similar, but complementary, mechanisms are provided by other security technologies like SELinux which depending on policy can attempt to protect file integrity. The Linux IMA (Integrity Measurement Architecture) subsystem introduces hooks within the Linux kernel to support creating and collecting hashes of files when opened, before their contents are accessed for read or execute. The IMA measurement subsystem was added in linux-2.6.30 and is supported by Red Hat Enterprise Linux 8. The kernel integrity subsystem consists of two major components. The Integrity Measurement Architecture (IMA) is responsible for collecting file hashes, placing them in kernel memory (where userland applications cannot access/modify it) and allows local and remote parties to verify the measured values. The Extended Verification Module (EVM) detects offline tampering (this could help mitigate evil-maid attacks) of the security extended attributes. IMA maintains a runtime measurement list and, if anchored in a hardware Trusted Platform Module(TPM), an aggregate integrity value over this list. The benefit of anchoring the aggregate integrity value in the TPM is that the measurement list is difficult to compromise by a software attack, without it being detectable. Hence, on a trusted boot system, IMA-measurement can be used to attest to the system's runtime integrity.

  • Bajaj Allianz Life Insurance, IndusInd Bank, ManipalCigna Health Insurance Company, and _VOIS Named Winners of the Red Hat APAC Innovation Awards 2020 for India

    Red Hat, Inc., the world's leading provider of open source solutions, today announced the winners of the Red Hat APAC Innovation Awards 2020 for India. Bajaj Allianz Life Insurance Company, IndusInd Bank, ManipalCigna Health Insurance Company Limited and _VOIS were honored at the Red Hat Forum Asia Pacific 2020 today for their exceptional and innovative use of Red Hat solutions.

Identify Songs On Your Linux Desktop Using SongRec, A Shazam Client For Linux

SongRec is an open source Shazam client for Linux. It's written in Rust, with the GUI using Gtk3. Using the Shazam audio fingerprinting algorithm, this application can identify a song from an audio file or using the microphone. MP3, FLAC, WAV and OGG formats are supported. This works by analyzing the captured sound, be it from the microphone or and audio file, and seeking a match based on an acoustic fingerprint in a database of millions of songs. Most of the processing is done server-side (so SongRec connects to the Shazam servers). When finding a match in the Shazam database, SongRec shows the artist, song and album names, as well as the date when the recognition was done. All recognized songs are kept in a history list that you can export to CSV or wipe. Shazam is a music recognition application own by Apple, available for Android, iOS, watchOS and macOS. It can identify music based on a short sample, provided that the background noise level is not high enough to prevent an acoustic fingerprint being taken, and that the song is present in the software's database. Read more