Language Selection

English French German Italian Portuguese Spanish


Please allow up to an hour or so to receive your initial password. If you don't receive an email from us within a comfortable amount of time, you may email and request a password at r at schestowitz dot com. Please be sure to include your registered username.

You may also wish to check your spam folders as your initial email may have been misidentified as spam. Please also note that will not accept mail from due to ISP regulation listing in Spamhaus.

Spaces are allowed; punctuation is not allowed except for periods, hyphens, and underscores.
A valid e-mail address. All e-mails from the system will be sent to this address. The e-mail address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by e-mail.
Provide a password for the new account in both fields.

More in Tux Machines

Development News

  • Perl 6 is coming soon: What it will bring
    Perl 6, a long-awaited upgrade to the well-known scripting language, has gone into beta, with the general release planned for Christmastime. The upgrade went to beta late last month, Perl designer Larry Wall told InfoWorld on Wednesday, and the October monthly release will feature the first of two beta releases of the Rakudo Perl 6 compiler. There been having monthly compiler releases for years, but the language definition has now stabilized. Wall added, “At this point we're optimizing, fixing bugs, and documenting, and I feel comfortable saying we can take a snapshot of whatever we have in December and call it the first production release.”
  • PEAR 1.10 Released With PHP 7 Support
  • Couchbase Server 4.0 introduces SQL-based query language N1QL (Nickel)
    Couchbase Server 4.0 is designed to give software application development pros a route to building more apps on Couchbase.

Security Leftovers

  • Tor browser co-creator: Experian breach shows encryption may not be security panacea
    The Experian/T-Mobile hack may be more worrisome than Experian’s carefully worded description of it suggests, some security experts said Friday. One is the co-creator of the Tor secure browser, David Goldschlag, (now SVP of strategy at Pulse Secure). Goldschlag previously was head of mobile at McAfee, and also once worked at the NSA. I asked Goldschlag a simple question: “After the Office of Personnel Management and Experian hacks, is there reason to fear that hackers now have the means to steal actual financial information (credit card numbers, etc.) from banks or insurers?”
  • AV-TEST tests Linux security solutions against Linux and Windows threats
    To do so, it is often sufficient to copy files from a Linux environment to Windows.” it further adds. The most obvious mode of attack involves luring victims to install software or updates via third-party package sources. The team conducted test by running 16 different Anti-virus solutions and splitting test session into three distinct phases, The detection of Windows malware The detection of Linux malware and The test for false positives. Out of 16 antivirus solutions 8 detected between 95-99% of the 12,000 Windows threat used in the test: The Anti-virus solutions that helped in detection include Bitdefender, ESET, Avast, F-Secure, eScan, G Data, Sophos and Kaspersky Lab (server version).
  • had classic security blunder in authentication engine
    The cross-site request forgery vulnerability means that any user visiting a malicious page can have their accounts hijacked without further interaction. The since-patched hole existed in Microsoft and could have been spun into a dangerous worm, Wineberg says.
  • Meet the White Team, Makers of the Linux.Wifatch Viligante Malware
    However, Softpedia News noted that the Linux.Wifatch source code has not been released in its entirety. That’s likely because the White Team is worried that traditional cybercriminals would exploit the malware for more nefarious purposes. It also explains why it was a clandestine operation in which router owners weren’t aware their systems had been infected, even if it was only to defend them against black-hat attackers. Whether or not anyone appreciates the White Team’s form of vigilante security tactics, they may believe the work should serve as a warning to those who don’t follow basic data protection procedures, Hacked said. For example, there are still untold numbers of home routers that use default passwords and leave admin access wide open to malware and other threats.
  • Practical SHA-1 Collision Months, Not Years, Away
  • Search engine can find the VPN that NUCLEAR PLANT boss DIDN'T KNOW was there - report
    The nuclear industry is ignorant of its cybersecurity shortcomings, claimed a report released today, and despite understanding the consequences of an interruption to power generation and the related issues, cyber efforts to prevent such incidents are lacking. The report adds that search engines can "readily identify critical infrastructure components with" VPNs, some of which are power plants. It also adds that facility operators are "sometimes unaware of" them. Nuclear plants don't understand their cyber vulnerability, stated the Chatham House report, which found industrial, cultural and technical challenges affecting facilities worldwide. It specifically pointed to a "lack of executive-level awareness".

Linux Discussion Continues, Fedora Welcomes Chromium

Folks are still discussing the resignation of Sarah Sharp and Matthew Garrett from Linux kernel development. Jack Wallen said Sharp (and Garrett) are cases of more developers being "turned away, simply because developers had no patience for personal respect." He said Linux rules with a "sharp and iron tongue" with "foul and abusive language." He agreed with Dr. Roy Schestowitz in that all this is a "PR nightmare" threatening the "flagship of the open-source movement." He placed part of the blame on what he calls the "Internet of hate" and said if Linux is to compete with Microsoft and Apple its developers need to "start treating the legions of programmers, who are working tirelessly to deliver, as well as they treat the code itself. Open source is about community. A community with a toxic foundation will eventually crumble." Read more