Hello and welcome to Episode 421 of Linux in the Ham Shack. In this episode, the hosts interview Neil Rapp, WB2VPG, coordinator of the IARU Region 2 YOTA camp and Peter Lafreniere, N8JPL, one of the youth participants. The topics include an in-depth look at what the campers experienced, events held, challenges faced, and the future of the event. We hope you enjoy this interview and deep and have a great week until the next time we meet.
In this video, I am going to show an overview of Linux Mint 20.2 "Xfce" and some of the applications pre-installed.
Tuxedo sent over their InfinityBook Pro 14 Linux notebook to the studio for me to review, and in this video, I'll give you my thoughts. And it very well might have the best screen from any notebook I've ever reviewed.
Over the last few months we’ve been keeping an eye on WiFiWart, an ambitious project to develop a Linux single-board computer (SBC) small enough to fit inside a USB wall charger. Developer [Walker] says the goal is to create an easily concealable “drop box” for penetration testing, giving security researchers a valuable foothold inside a target network from which to preform reconnaissance or launch attacks. Of course, we don’t need to tell Hackaday readers that there’s plenty of other things you can do with such a tiny open hardware Linux SBC.
Today we’re happy to report that [Walker] has gotten the first version of the board booted into Linux, though as you might expect given a project of this complexity, there were a few bumps along the way. From the single missing resistor that caused U-Boot to throw up an error to the finer points of compiling the kernel for an embedded board, the latest blog post he’s written up about his progress provides fascinating insight into the little gotchas of bringing up a SBC from scratch.
Latest security fix kernels should now be in the repos. All users are strongly advised to upgrade (via synaptic, cli-aptiX or package-installer).
In the last blog post of the X86 Linux assembly series, we focused on how to make our Hello World payload friendly for use as a payload in exploits. However, we didn’t cover how to extract the payload itself for use in exploits. Sure you could view the Objdump output and copy each hex byte out by hand, but that would be tedious and time consuming. Today I want to cover a method for extracting our custom payload from an object file created with GAS using Objcopy.
It turns out there is actually people running modern versions of the Linux kernel in 2021 that also are using floppy disks.
There remains a lot of vintage hardware code within the Linux kernel like enthusiasts maintaining the Motorola 68000 series support, among a lot of other older hardware and many drivers for peripherals that haven't been sold new in many years -- including the floppy disk code. But as is often the case, besides it becoming increasingly rare for users of old hardware in general, it's increasingly rare to find vintage computer owners running modern versions of the Linux kernel. But some still do, with the latest example being a regression report over the Linux floppy driver.
The DXVK 1.9.1 release comes one and a half months after DXVK 1.9 to improve support for various games, including Roblox, which should perform much better on NVIDIA GPUs, Risen 3, which should no longer crash on NVIDIA GPUs, as well as GTA IV, which should no longer break when playing with an NVIDIA graphics card.
The Roblox performance improvements were achieved by rewroting the way staging textures are handled in D3D11, which also reduces memory usage and the number of image copies needed to move data between the GPU and CPU.
Time for another GamingOnLinux interview! This time, we have someone who many that follow Valve and Steam Play Proton will be familiar with - it's Joshua Ashton.
Halfway through the year, many new apps released and many abandoned. Here are 6 weather apps that are still useful in 2021.
Without searching in web browser or watching an app on mobile, there are quite a few weather apps for Linux that display weather conditions and forecast either on desktop or via system tray applet.
And here are top ones still in active development and well working in all current Ubuntu releases.
The kernel of a Linux system is the core that everything else in the operating system relies on. The functionality of the kernel can be extended by adding modules to it. As such, a user can fine tune their kernel settings by enabling or disabling modules. This level of granular control is one of the many reasons why users love Linux in the first place.
In this guide, we'll go over some of the most essential kernel module administration commands on Linux. Knowing these commands will help you understand the components that have been loaded into your system's kernel, and will also allow you to load, reload, or unload modules in the system kernel.
You can hardly mention the sudo command without recalling the hilarious XKCD strip about making sandwiches. It does seem like sudo is the magic power to make a Linux system do what you want. The only problem is that those superpowers are not something to be taken lightly.
In this tutorial, we will show you how to install Suricata on AlmaLinux 8. For those of you who didn’t know, Suricata is a free and open-source, mature, fast, and robust network threat detection engine. It can function as intrusion detection (IDS) engine, inline intrusion prevention system (IPS), network security monitoring (NSM) as well as an offline pcap processing tool. Suricata inspects the network traffic using powerful and extensive rules and signature language and has powerful Lua scripting support for the detection of complex threats.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you through the step-by-step installation of the Suricata on an AlmaLinux 8. You can follow the same instructions for Rocky Linux.
At some point, you're going to want to run commands from non-standard directories. When that happens, you'll want to add those directories to your $PATH. Jack Wallen shows you how.
Virtual machines (VMs) have transformed infrastructure deployment and management. VMs are so ubiquitous that I can’t think of a single instance where I deployed production code to a bare metal server in my many years as a professional software engineer.
VMs provide secure, isolated environments hosting your choice of operating system while sharing the resources of the underlying server. This allows resources to be allocated more efficiently, reducing the cost of over-provisioned hardware.
Given the power and flexibility provided by VMs, it is common to find many VMs deployed across many servers. However, managing VMs at this scale introduces challenges.
This quick tutorial demonstrates the steps to install elementary Tweaks tool/Pantheon Tweaks Tool.
Did you know that you can ask your Linux system to tell you what upgrades are available for the packages installed on it? You might be surprised by how many you’ll see, especially if you’re using the current release and don’t have your system set up for frequent or automatic updates.
Updates play an important role in keeping your Linux systems secure and performing well. Since most packages are updated as fixes or improvements to the code become available, it’s hard to predict how many will show up on any particular day. (Note: Updates should be done when your system is not performing other important tasks.)
Rancher’s system-upgrade-controller allows to upgrade Kubernetes nodes using privileged pods within that Kubernetes cluster. This can be very helpful to install latest updates to fix CVE or to upgrade used software to a later version. But sometimes those updates require the system to reboot to take effect.
This might be no problem for most of the workloads running in pods on that machine. But what if your workload isn’t stateless and its rescheduling would lead to outages of your services?
SUSE’s Kernel live patching might help here as the Kernel modules of the Kubernetes node can be updated without requiring a reboot of the machine and without forcing the pods to be rescheduled.
Zypper is the default package manager for openSUSE distributions and SUSE Linux Enterprise Servers. It differs from APT and YUM package managers, as it employs SAT solver, one of the best package dependency libraries. This Zypper cheat sheet covers the main zypper commands, segmented into various categories.
CSF is a Stateful Packet Inspection (SPI) firewall, Login/Intrusion Detection and Security application for Linux servers.
t consists of the firewall itself (CSF) which is comprehensive, straightforward, easy, and flexible to configure.
It also has a Login Failure Daemon (LFD) that perfectly complements CSF. This LFD runs all the time and periodically (every X seconds) scans the latest log file entries for login attempts against your server that continually fail within a short period of time. Such attempts are often called “Brute-force attacks” and the daemon process responds very quickly to such patterns and blocks offending IP’s quickly
The MERN Stack is made from four components: MongoDB, Express, React, and Node. It provides a bundle of JavaScript technologies used for building dynamic JS websites.
MongoDB is an open-source and most widely used NoSQL database system used for developing robust web applications. Express.js is a Node.js web application framework used for developing hybrid web-based applications. React.js is an open-source JavaScript framework used to create a front-end interface for mobile applications. Node.js is a JavaScript environment that allows developers to run codes on the server.
In this guide, we will show you how to install the MERN stack on Ubuntu 20.04.
This detailed tutorial explains what is LocalWP, benefits of using LocalWP, how to install LocalWP to deploy and setup local WordPress development environment in Linux and Unix-like operating systems.
Odoo is a group of open-source business apps that offers a wide range of applications including, CRM, accounting, billing, inventory, warehouse, e-commerce, project management and more. It is simple, customizable, fully integrated and helps you to manage your business and be more efficient wherever you are. It is written in Python and uses PostgreSQL as a database backend.
Developer Passenger has announced that their interactive fiction game Closed Hands is now available with a native Linux version from itch.io.
While the story itself and the city are fictional, it pulls from Passenger founder and artist Dan Hett's own personal experience of losing his brother Martyn Hett in the Manchester terror attack in 2017. It's a pretty powerful piece of fiction that isn't often explored, especially not in this way.
Fishing Cactus has revealed that their latest fantasy adventure in the Typing Chronicles series, Nanotale, is now available on Linux and Mac. If that wasn’t enough, they are also bringing the hotly requested Arena mode to all versions of the game, as well as a 25% off discount on Steam if you buy the game within the first 48 hours of the update, starting from today at 7pm CEST/10am PT, bringing endless replayability to keyboard wielding adventurers and travellers alike.
Sometimes file thumbnails in Nautilus aren’t enough. Sometimes you need a closer look at a file, photo, or folder to make sure it’s the one you actually want, but without the hassle of opening a full-blown app to find out.
And that’s where GNOME Sushi comes in.
GNOME Sushi is an alternative to macOS ‘Quick Look‘ for Linux desktops that use Nautilus, aka GNOME’s famous file manager.
You select a file in Nautilus, tap the spacebar, and an instantaneous (and usually interactive) preview of the file appears — no need to open a full app.
Sushi supports file previews for most plain-text documents, including scripts with syntax highlighting, as well PDFs, HTML files, and LibreOffice documents. Music and video file previews use the GStreamer framework to let you to seek/scrub through them.
Software permeates every part of our existence. Google services alone combine for 2 billion lines of code, and a vehicle contains approximately 100 million lines of code. It’s a monumental challenge to create, debug, maintain, and update these complex software systems.
A fast-growing discipline known as AI for Code aims to help software developers improve their productivity by automating the software engineering process. AI for Code researchers have been leveraging technologies like natural language processing and augmenting them with code analysis and compilation techniques to perform a myriad of practical tasks, such as code search, summarization, and completion, as well as code-to-code translation. And, the discipline isn’t limited to academic research. Ruchir Puri, IBM Research’s chief research scientist, discussed in a recent podcast how technologies from AI for Code are being used to modernize legacy software by helping to migrate monolithic applications to microservices for IBM enterprise clients. To serve that purpose, the IBM AI Research division has released a new data set called Project CodeNet.
Data controls help protect data integrity and prevent unauthorized data disclosure for stored data and data in motion. In this post we'll dive deeper into the concepts of data controls and how they fit into the DevSecOps framework.
July is "Data Controls" month in Red Hat’s monthly Security series! Since March 2021, the Red Hat Security Ecosystem team has published monthly articles and videos on DevOps Security topics to help you learn how Red Hat can help you master the practice called DevSecOps.
By explaining how to assemble Red Hat products and introducing our security ecosystem partners, we aim to aid in your journey to deploying a comprehensive DevSecOps solution.
With the pace of technology, software training must evolve quickly to help workers build new IT skills. Whether enterprises are adopting new software or upskilling on new versions of open source technologies that they’ve been using for years, they need the most relevant training materials delivered with flexibility for various jobs roles, business objectives, and learning styles.
In this post, we’ll share why it’s important for us to have Red Hat Learning Subscription users be a part of the content development process and how you can be the first to see new, hands-on training.
One way that we’re helping learners meet their needs faster is by providing them early access to content within the Red Hat Learning Subscription platform. With early access, subscribers get first-look access to course chapters and lab environments before they are released for public purchase.
While I prefer the Gnome-2-based Cinnamon desktop (now up to version 5.04), Mint gives you a choice of fully supported interfaces. These include MATE, a Gnome-2 fork, and the ultra-lightweight Xfce. Most desktop users will be pleased with Cinnamon or MATE. But if you have older low-powered systems or if you're running Linux on Chromebooks or Windows 10 PCs with Windows SubSystem for Linux (WSL) 2, Xfce is an excellent choice.
Even PCs built in the 2000s can run Mint. If the box has a 64-bit processor, it can run Mint. The full version of Linux Mint requires a mere 2GB of RAM, but you can run it with as little as 1GB. This is not Windows -- where trying to run it on 4GB is asking for trouble.
You'll also need at least 20GB of disk space, but Mint recommends 100GB. Finally, you'll need a graphics card and monitor that supports a 1024Ãâ768 resolution. In other words, you can pretty much run Mint on any PC you find in a second-hand junk shop.
I like running the fastest and best hardware, but let's face it, sometimes we can afford the latest and hottest. That can be a real problem. For example, Windows 11 won't run on hardware dating from 2016 and earlier. It also won't run on some processors from 2019 or earlier. Linux Mint? I know people who are running it on 2009 Intel Core i5 desktop processors. To get the most of your old gear, you want to use Linux Mint.
Zidoo’s “M6” mini-PC runs Linux or Android on an RK3566 with up to 8GB RAM, 128GB eMMC, 3x USB, HDMI, GbE, 802.11ax, and mini-PCIe and SIM slots.
Chinese media player and set-top manufacturer Zidoo has unveiled a mini-PC built around Rockchip’s 1.8GHz, quad-core, Cortex-A55 RK3566. The Zidoo M6 runs Android 11, Ubuntu 18.04, buildroot and Qt on the RK3566, which integrates a Mali-G52 EE GPU and 0.8-TOPS NPU. The mini-PC also supports T-Firefly’s Android-based, media-savvy Station OS (Firefly Geek System), which is available on Firefly products such as its RK3566-based Station M2 mini-PC.
Geniatech’s $179-and-up “APC820” media player mini-PC runs Android or Linux on Rockchip’s RK3399 with up to 4GB RAM and 128GB eMMC plus GbE, HDMI in and out, 4x USB, and optional TV tuners, WiFi/BT, LTE, and other wireless links.
Geniatech has launched a media-focused, wireless ready mini-PC based on the Rockchip RK3399 aimed at “commercial displays” such as signage solutions. The APC820 also has a bit of a set-top feel to it with its optional digital TV tuners. Other RK3399-based mini-PCs include Firefly’s Station P1.
It’s been a while since Linux smartphones have stepped foot in the market, and as you might’ve guessed, they’re not very popular, thanks to Android and iOS already dominating the market. People are yet to try them out, and most smartphones are either very cheap and lacking in specs like the PinePhone, or expensive with two generations old hardware like the F(X)tec Pro.
But there is one problem developers need to take care of, and that is Android app support. For starters, to run Android apps on Linux, Anbox was being used, but it was comparatively slower than WayDroid. However, postmarketOS developer Caleb, on July 24, shared a screenshot of his OnePlus 6 running what looks like an Android emulator running LineageOS smoothly.
We have previously seen some rumours regarding the name of the OS that is to power the upcoming Galaxy Watch 4's - Since Samsung have abandoned Tizen on wearables as they have previously done on mobile. Now, Google has officially released the name of its OS next wearable OS, Wear OS 3. The Galaxy Watch 4 and the Galaxy Watch 4 Classic will be the first Samsung smartwatches to use Wear OS 3 by default.
Wear OS 3 gives a new user interface with more third-party apps than Wear OS 2. Google is promising that apps will open 30% faster. The battery life using Wear OS 3 is said to be boosted by a significant amount - though we don't know how this is technically achieved. Brands will be able to create themes for Wear OS, just like the Galaxy Watch 3. Samsung has said that its UI customizations over Wear OS 3 would've been called One UI Watch.
According to Istio’s support policy, minor releases like 1.9 are supported for three months after the next minor release. Since 1.10 was released on May 18th, support for 1.9 will end on August 18th, 2021.
Open-source software is prolific in technology today. Just about everything from supercomputers to consumer electronics is powered by at least one piece of open source code.
But many businesses find themselves launching open-source products at a rapidly accelerating pace without truly understanding either the benefits that come with it or the potential pitfalls that must be avoided.
Let’s talk about what open source means to your business, and how you can leverage it to serve both your customers and your business needs.
By sponsoring the LibreOffice Conference you will have the opportunity to connect with one of the largest and most dynamic FOSS communities, with supporters, volunteers and users in every country in the world. The virtual event lasts for three days, from 23 to 25 September 2021.
setting up mingw on windows is PITA, at first since i am not used to backslash for filepaths, it load the gdb printers, i then realised that it does not come with python enabled. Downloaded a new one it does not come with python3 instead it is python 2.7.
[...]
it inherits from a QFiledeviceprivate, but the size of the qfiledeviceprivate is not consistent across operating system, architectures and qt5 versions.I got the list of offset from the qtcreator types this problem exists for also qprocess (not fully implemented as of now) and for others as i may not be able to get it size for all operating systems, architectures and qt5 versions.
The Eclipse Foundation has released OpenJ9 as the latest version of their high performance virtual machine that continues advancing four years after IBM donated the original J9 code.
Security updates have been issued by Debian (aspell, intel-microcode, krb5, rabbitmq-server, and ruby-actionpack-page-caching), Fedora (chromium, containernetworking-plugins, containers-common, crun, fossil, podman, skopeo, varnish-modules, and vmod-uuid), Gentoo (leptonica, libsdl2, and libyang), Mageia (golang, lib3mf, nodejs, python-pip, redis, and xstream), openSUSE (containerd, crmsh, curl, icinga2, and systemd), Oracle (containerd), and Red Hat (thunderbird).
Even though cryptography is used by almost every application today, the implementation of it is usually delegated to specialized cryptographic libraries. There are multiple reasons for that, including that implementing cryptography is not easy, and in fact it is easy to get wrong. Small mistakes–such as reusing a nonce–may render the data encrypted by an application recognizable. At the same time, the security landscape changes so fast that secure software of 10 years ago can no longer withstand attacks that exploit newly discovered vulnerabilities. For instance, algorithms like RC4 that were dominant in the early days of Internet commerce are today considered broken.
How can we be assured that these cryptographic applications and libraries implement cryptography correctly and follow best practices such as not using legacy cryptography? As cryptography is sensitive to governments around the world, there is no universally accepted answer yet. To address this problem in the U.S., NIST developed FIPS 140, a data protection standard that is our focus in this article.
FIPS 140 defines security requirements related to the design and implementation of a cryptographic module, or in software terms, for an application or library implementing cryptography. The standard has multiple levels of security, from levels 1 to 4, with level 1 applying to software implementations, while level 2 and further applying to specialized hardware alongside its software. On level 1, the standard requires the use of known, secure cryptographic algorithms and modes for data protection and requires their logical separation from the application. It further includes a certification process that ensures that the claims are tested and attested by an accredited lab by NIST.
In essence the FIPS 140 standard ensures that cryptography is implemented using well known secure designs, follows certain best practices, does not involve obscure algorithms, and that there is a due process in attestation.
Red Hat has announced the renewal of the Federal Information Processing Standard 140-2 (FIPS 140-2) security validation for Red Hat Enterprise Linux 8.2. The second FIPS certification for the Red Hat Enterprise Linux 8 platform, this validation indicates Red Hat’s leadership and commitment to providing a more secure backbone for the innovation of open hybrid cloud.
With this validation for Red Hat Enterprise Linux 8.2, many of Red Hat’s open hybrid cloud offerings also retain the FIPS 140-2 certification as layered products building on Red Hat Enterprise Linux 8.2’s cryptography modules. These include but are not limited to: Red Hat Ceph Storage, Red Hat Gluster Storage, Red Hat OpenShift, Red Hat OpenStack Platform, Red Hat Satellite, and Red Hat Virtualization.
Linux is downright one of the most popular and secure operating systems for large-scale servers. Despite its widespread usage, it remains vulnerable to cyberattacks. Hackers target servers to either shut them down or steal valuable information.
There is a pressing need to develop counter-hacking methods to brace security breaches and malware attacks. This is possible by hiring cybersecurity professionals; unfortunately, this can prove to be a costly affair. The next best solution is to install scanning tools that fit like a hand in glove for your Linux systems.