If you’re a fan of Linux, you know the exact reason why it’s awesome – the command line. Though many outsiders view it as only a “hacker tool,” it’s actually one of the best tools available for any operating system. The Linux shell has the ability to install software, manage your operating system and basically everything else.
To interact with the command line, you’ll need a terminal emulator. There are many terminal emulators available – perhaps too many. There are a lot of good ones and a lot of bad ones out there. It is because of this reason we’ve decided to create a list of five great terminal emulators available on Linux.
"Any chance of a bug report?" a developer asked when I mentioned a problem with an application on social media. As a free software supporter, I felt an obligation to oblige, but in practice, the chance was slim. For those of us who don't regularly file bugs, the process is usually too demanding, and too dependent on bureaucratic whim to seem worth the effort.
The operating system is called Linux++, and is part of HP's ambitious project to reinvent the computer, reports MIT Technology Review's Tom Simonite.
Ultimately, HP hopes to replace Linux++ with something even more radical and homegrown, an operating system called Carbon, though it hasn’t talked about a timeline for that yet.
There is another plan which almost certainly will involve replacing Wintel PCs with GNU/Linux PCs gradually, by a million units per annum, the move to Baikal processors, a derivative of ARM. Recently, in response to sanctions over Ukraine, Russia will officially prefer home-grown “solutions” for IT. There are signs of a digital “cold” war emerging and the world’s IT is dependent on several components originating in Russia. Such pressures will surely accelerate migration to GNU/Linux in Russia. It’s a short cut to independence.
The operating system of most famous open source is gaining ground in business particularly in cloud computing, according to a report from the Linux Foundation and Yeoman Technology Group.
The Linux Foundation has published a study called “2014 Enterprise End User Trends Report” that shows the steady growth of Linux in the market for large companies, especially in recent years driven by factors such as the growth of cloud computing, in addition to its known qualities in terms of safety, capacity deployment, costs or virtualization.
There's nothing I can't do on my Linux PCs that requires Windows. It's really that simple.
On my Linux Mint 17.1 desktop, I can run Windows games, thanks to Crossover, and run thousands of native games including many Steam-powered games. In addition, I don't need to worry about anti-virus software since, despite all the FUD, there still hasn't been a successful desktop Linux virus.
Let's get down to business: Here are the six applications I use every day to get my work done and keep in touch with my friends. Unless you have some particular program that's Windows only, I think you'll find these six programs may answer for all your daily needs as well.
The microservices architecture is far from a new trend; it's generally accepted as a better way to build apps these days. The common way to build apps was, until a few years ago, the monolithic approach—which was, if you look at it from a functional perspective, basically one deployment unit that does everything. Monolithic apps are good for small scale teams and projects, but when you need something that has a larger scale and involves many teams, it starts to become problematic. It's much harder to make changes, as the code base becomes bigger and more people make changes to it.
Zemlin's statement preceded the announcement Tuesday that the Cloud Foundry Foundation, representing the financial backing for open source projects, has been successfully spun off into an agency unto itself. It will remain intertwined with the Linux Foundation, however, in that Linux will become a contracting service provider to Cloud Foundry.
Containers are very tricky to implement. Trying to isolate sets of resources from each other completely, so that they resemble a discrete system, and doing it in a secure way, has to be addressed on a feature-by-feature basis, with many caveats and uncertainties. Over time, this makes the core kernel code more secure and robust, but each individual feature may have surprising issues.
The whole namespace idea—corralling subsets of system resources like user IDs and group IDs, and performing on-the-fly translations between the resource names within the container and the corresponding names in the outer system—is tough to manage.
Recently, Marian Marinov noticed that process counters in the outer system counted processes as being owned by the same user if his or her UIDs (user IDs) were the same inside two separate containers. The same was true for GIDs (group IDs). He didn't like this, because the two containers represented two logically isolated systems, and in that context, the same UIDs could refer to different users entirely. They shouldn't be counted together.
Jiri Kosina has lined up his HID subsystem changes for the Linux 3.19 kernel that include more multi-touch device work and other input improvements.
One of the latest pull requests for the Linux 3.19 kernel is the XFS file-system changes.
This article is comparing twelve recent NVIDIA and AMD graphics cards when using these latest binary drivers on Ubuntu 14.10 64-bit. All tests were done on an Intel Core i7 5960X system.
I found qrq by way of a brute search through the Debian archives for anything text-related, and even though I haven’t a clue what to do with qrq, I’ll show it here out of fairness.
Once that is installed, open up Lightning and right-click a blank space in the Calendar listing, select New Calendar, select On the Network, select Google Calendar, and walk through the remainder of the wizard. Even if you have two-step verification, this process will work without a hitch. In the end, you can select all of the calendars you want to sync (Figure 3) and start working with your Google Calendar ââ⬠which will then sync with your Android device.
The latest update out to Counter-Strike: Global Offensive this week aims to lower the system memory usage for OS X and Linux systems.
The Metro Redux Bundle is now available for Steam on Linux gamers. We've been looking forward to the Linux versions of these games for several months and now they've finally arrived. The "redux" version offers various updates to the original versions of the game while Metro 2033 Redux should be particularly interesting for Linux gamers as it's the first time the 2033 version is coming to Linux -- the non-redux Metro: Last Light meanwhile came out for Linux last year.
For Linux gamers that are fans of Sid Meier's Civilization: Beyond Earth, the Linux port of the game could arrive as soon as next week.
The British video games company The Creative Assembly has finally begun releasing successful strategy games of the Total War series for Linux. The first title that was published recently is Empire: Total War.
Mac and Linux developer Aspyr announced the news of the two patches in its most recent Dev Update post. Civ players on Mac should be able to download the update now and start enjoying the freshly retooled game. Linux users are still waiting for their version of the game to come out, but the good news is that they won't have to wait to get the patch, too. According to Aspyr, the patch is already built into the Linux version and will be ready to go on launch.
This release is part of a series of planned monthly releases making improvements available to developers in a quick and predictable manner.
Packages for the release of KDE's document suite Calligra 2.8.7 are available for Kubuntu 14.10. You can get it from the Kubuntu Updates PPA. They are also in our development version Vivid.
I worked with the all-in-one version of 4MLinux for several days, and I had a very frustrating experience trying to deal with the little distro that could not. The separate mini distros had a few usability issues too. I was disappointed by the minimalistic software inventory. Unless you install them to the hard drive, very few of the included apps actually run.
The Gentoo Council addressed a few miscellaneous matters this month.
The first concerned tinderbox reports to bugs. There was a bit of a back-and-forth in bugzilla with a dispute over whether bugs generated from tinderbox runs that contained logs attached as URLs instead of as files could be closed as INVALID. Normally the use of URLs is discouraged to improve the long-term usability of the bugs. Since efforts were already underway to try to automatically convert linked logs into attached logs it was felt that closing bugs as INVALID was counterproductive.
Time, and operating system developments wait on no one. Only a few months ago Red Hat released Red Hat Enterprise Linux (RHEL) 7 and now the RHEL 7.1 beta has landed on our doorsteps.
But the real reason behind Fedora 21’s success? It’s an odd-numbered release. Historically, the odd-numbered releases have always been better than the even-numbered ones. Don’t ask me why. There’s no documentation or detailed research to prove why it happens this way. It’s just a physical law of the universe.
In the Linux feeds this evening was the announcement of Red Hat Enterprise Linux 7.1 Beta. In other news, Jon Gold takes us down Linux malware memory lane and Derrik Diener looks at some terminal emulators - one that was new to me. Elsewhere Bruce Byfield discusses why he don't file bug reports and Jack Germain says 4MLinux is so lightweight it's anemic.
Canonical, the company behind Ubuntu, the most popular Linux distribution on the cloud launched a lightweight cloud-optimised version of the OS called Snappy Ubuntu Core.
Canonical has unveiled a new version of Ubuntu designed for the cloud, which aims to update cloud instances with the same certainty and precision as a mobile phone.
The Android SDK enables applications with features including lens distortion correction, head tracking, 3D calibration, and side-by-side rendering. Other features include stereo geometry configuration and user input event handling.
We just release a new version of GiraffPanic – a logic mobile game written with Qt and QML. In the new version we give the users the possibility to share unlock codes with each other to unlock new levels. So we wanted to have a nice way to share the code between devices without any need to copy paste them (codes) into another application. After trying a lot of different approaches (that did not work), we found it is possible to invoke the native Android share menu from within our application. Using this method keeps our own code quite tidy and supports all the ways of sharing provided by the host device.
I’m a huge fan of the and . I’ve read through the books a number of times, and watched the show even more. There’s always some little angle or juicy tidbit to find in the books, you just can’t read them once to take it all in. No matter how attentive a reader you are, you’ll definitely miss things as George R.R. Martin puts little hints and foreshadowings all over the place.
BlueZ, the Linux Bluetooth stack, boasts more features with today's release of version 5.26.
BlueZ 5.26 most notably adds support for Android 5.0 Bluetooth features and support for Bluetooth 4.2 commands and events. BlueZ 5.26 also supports the Low-Energy Secure Connections feature of Bluetooth, HID over GATT get and set report handling, and version 1.2 of the Phonebook Access Profile. BlueZ 5.26 also packs various fixes.
The company, traditionally focused on marketing software, is to eventually aiming to make the new product open source.
The user friendliness is being enabled in part by way of a new command line shell that leverages the open-source Lua language.
There is also a plan to have a simpler language for Snort rules. Roesch explained that the new rules language will be more streamlined than the existing language. The goal for the new rules language is for both humans and machines to be able to more easily read and write Snort policies.
The most current stable open-source Snort release is version 2.9.7.0, but that doesn't imply that the new Snort 3.0 release will be coming within the next three regular Snort release update cycles. Roesch said he doesn't mind having a Snort 2.10.0 or an even higher number, emphasizing that the development of Snort 3 will take its due and proper course.
We're excited to announce our first keynote speaker for LibrePlanet 2015: Karen Sandler, executive director of the Software Freedom Conservancy and co-host of the “Free as in Freedom” podcast. Ms. Sandler's closing keynotes have been a highlight at LibrePlanet, and we're so excited to have her back. In other words, LibrePlanet 2015 is shaping up to be a really great event.
Application performance management tools, speakers, and giant green Android mascots abounded at the Android Developer Conference San Francisco Bay Area, held November 18 through 21 in Burlingame, Calif. The event, in its eighth year, was sponsored by Intel, Google, Microsoft, Qualcomm, Twitter, Sony, Epson, and Amazon, among others.
Are you involved in Embedded Linux? Well there is a Embedded Linux Conference (ELC) taking place in San Jose, CA, March 23 – 25, 2015. This is the “premier vendor-neutral technical conference for companies and developers using Linux in embedded products”.
Mozilla is planning to add support for Certificate Transparency checks in Firefox in the near future, but the company says that the feature won’t be turned on by default at first.
Dell Computer is deepening its focus on the open cloud and OpenStack in particular. The company announced an expansion of its Open Networking initiative to include Midokura, a company focused on network virtualization, to complement Dell’s networking and server infrastructure. Their agreement includes a joint go-to-market program, validated reference architecture and global reseller agreement.
How in demand are cloud computing skills in the job market? Consider these notes from Forbes, based on a report from WANTED Analytics: "There are 3.9 million jobs in the U.S. affiliated with cloud computing today with 384,478 in IT alone. The median salary for IT professionals with cloud computing experience is $90,950 and the median salary for positions that pay over $100,000 a year is $116,950."
Deliver the software users want and need (not just what management thinks is required), look for deployment flexibility, and beware of API charges. They are the messages from SugarCRM CEO Larry Augustin.
The proliferation of BYOA - bring your own applications - is putting pressure on IT departments to provide better tools, and to regard users as "constituents" rather than simply listening to management.
The European Commission (EC) wants to make it easier for its software developers to submit patches and add new functionalities to open source projects. Contributing to open source communities will be made central to the EC’s new open source policy, expects Pierre Damas, Head of Sector at the Directorate General for IT (DIGIT). “We use a lot of open source components that we adapt and integrate, and it is time that we contribute back.”
While in our benchmark runs the performance of generated binaries between GCC and LLVM's Clang C/C++ compilers are generally quite close, there are exceptions. When it comes to real-world usage of Clang, most companies tend to just utilize Clang for now when producing debug builds due to its faster compile times and better diagnostics than GCC, but GCC still ends up getting used for producing release/production builds.
The Rust Programming Language Blog has shared their plans for scheduling the Rust 1.0 release to happen next year.
What happens when you combine the faces of 400 CEOs?
A startling picture of just how similar, and pale, our modern leaders are.
Fractl, the viral marketing company, used the face-manipulation software Psychomorph to "average" the faces of 400 execs in 10 different industries, from nonprofits to entertainment to transportation. They also averaged the age and income of CEOs in each industry.
As my Twitter followers may be aware, I spent the first part of this week at the Passwords14 conference in Trondheim, Norway. More about that later, suffice for now to say that the conference was an excellent one, and my own refreshed Hail Mary Cloud plus more recent history talk was fairly well received.
[...]
By this afternoon (2014-12-11), it seems that all told a little more than 700 machines have come looking for mostly what looks like various manufacturers' names and a few other usual suspects. The data can be found here, with roughly the same file names as in earlier episodes. Full list of attempts on both hosts here, with the rather tedious root only sequences removed here, hosts sorted by number of attempts here, users sorted by number of attempts here, a CSV file with hosts by number of attempts with first seen and last seen dates and times, and finally hosts by number of attempts with listing of each host's attempts. Expect updates to all of these at quasi-random intervals.
Kenwin Garcia was a 25-year-old African American man from Newark who died in 2008 on the side of a highway, after an altercation with state police. Christopher Baxter from NJ Advanced Media states that his death was claimed to be a result of “excited delirium.” The term is used to describe a lethal overdose of adrenaline that leads to heart or respiratory failure. But there is little medical evidence to support this official judgment in Garcia’s case, and there is wider controversy surrounding the interpretation of the symptoms that constitute the syndrome. In Garcia’s case specifically, an autopsy found he suffered severe internal injuries, including a broken breastbone and ribs, a torn kidney and extensive bleeding.
The New York Times downplayed the impact of the Supreme Court's Citizens United ruling and dismissed the influence of money in politics by ignoring record-breaking spending of outside groups, the role of large donor political contributions, and dark money in the 2014 midterm election.
The ban on certain acts in pornography has been called sexist because it outlaws practices that put the woman firmly in control
One of our colleagues has been the target of a sustained campaign of harassment for the past several months. We have decided to publish this statement to publicly declare our support for her, for every member of our organization, and for every member of our community who experiences this harassment. She is not alone and her experience has catalyzed us to action. This statement is a start.
One of the biggest thorns in the side of the country’s intelligence agencies attempted to mount an eleventh hour bid to kill the spy agencies' funding bill on Wednesday.
Rep. Justin Amash (R-Mich.) wrote on Facebook that the intelligence authorization bill that easily passed through the House contained “one of the most egregious sections of law I've encountered during my time as a representative.”
“It grants the executive branch virtually unlimited access to the communications of every American,” explained Amash, who has a record of skepticism toward the National Security Agency and other agencies. Last year, he nearly succeeded in an attempt to end the NSA’s controversial phone records program.
In a crime ruling that earned it rare praise from the federal government, the Supreme Court of Canada said police may search cellphones without a warrant when they make an arrest.
Cellphones are the bread and butter of the drug trade, the majority said in a 4-3 ruling. It said police have been given the “extraordinary power” to do warrantless searches during an arrest, under common-law rules developed by judges over centuries, because of the importance of prompt police investigations. Until now, those searches typically included purses and briefcases. Civil liberties groups had urged the court to exempt cellphones.
As we wrote recently, the UK's Investigatory Powers Tribunal ruled that GCHQ surveillance doesn't violate human rights. That's hardly surprising, given IPT's track record in approving pretty much everything that GCHQ does. But the global reach of the spying carried out by GCHQ and the NSA means that there are plenty of other bodies that are prepared to condemn what they have been doing. Here, for example, is an important report from the commissioner for human rights at the Council of Europe, entitled "The Rule of Law on the Internet in the Wider Digital World". It's an extremely thorough exploration of this complex area, touching on key issues that have often been discussed here on Techdirt: privatized law enforcement, suspicionless mass data retention, cross-border exchange of data by law enforcement agencies, and global surveillance by national security agencies.
Everybody knows that MD5 is as terribly useless as ROT13 and you should have switched to SHA3-512 like twenty years ago. But lots of usage sticks around, and will continue to stick around for a long time to come, leading to the long tail of MD5. Why not simply convert to a better hash function? Maybe it’s not so simple.
A leading German human rights lawyer has called on prosecutors across Europe to “get active” and prepare to seize any CIA agents and US officials involved in torture who enter their territories.
Outgoing Senator Mark Udall has been a key player in trying to hold the intelligence community's feet to the fire concerning their unconstitutional and illegal activities -- and that includes both the NSA and CIA. He was a key player in making sure that the CIA torture report was actually released -- and there was pressure on him, if the report wasn't released, to read it into the record to force it out. Even with the release on Tuesday, some were asking for Udall to at least release an unredacted version or even more sections from the full ~7,000 page report, rather than just the 500 page exec summary. In fact, in Udall's final floor speech on Wednesday (link to a video that is about 50 minutes), the Senator instead chose to reveal more information related to the so-called "Panetta Review" on the CIA's torture program.
[...]
The CIA has done everything it can to try to bury the Panetta Report. But Udall actually discussed it in depth. A big chunk of his speech is actually discussing some of the details in the Panetta Review, going beyond the CIA torture report. Following his speech, Senator Richard Burr -- who is a known buddy of the intelligence community, and soon to take over the Senate Intelligence Committee -- ridiculously claimed that Udall disclosed a bunch of "very classified" material. What it actually shows, however is that the CIA's response to the torture report is simply more lies from the CIA. As Udall noted in his speech, since the Panetta Review was supposed to be internal, it was a lot more open and honest, and it agreed with the Senate staffers. He first points out that the official CIA response to the terror report, from current Director John Brennan, shows the CIA's "flippant" attitude towards oversight and the fact that it knows the Obama administration will let the CIA get away with anything. However, the Panetta Review shows the true story.
The policy states that officers should not stun any handcuffed suspect.
The Senate Intelligence Committee's report on torture reveals that conservative author Ronald Kessler was "blessed" by the CIA, receiving background information from the agency which he used to push false claims about the effectiveness of "enhanced interrogation techniques" and publishing classified information without triggering a leak investigation.
Supreme Court Justice Antonin Scalia is joining the debate over the Senate's torture report by saying it's hard to rule out the use of extreme measures to extract information if millions of lives were threatened.
Scalia told a Swiss broadcast network that American and European liberals who say such tactics may never be used are being self-righteous.
Listening to the BBC and Sky, and reading The Guardian, all on the subject of whether the UK establishment knew about CIA torture or not, the realisation dawned on me that I had imagined my entire life story and in fact I had never actually existed. For a little while it was like being in a particularly scary Japanese film.
Of all the revelations made about the “enhanced interrogation methods” used by the CIA on detainees in the aftermath of 9/11, the use of waterboarding and rectal feeding have garnered the most attention. In the case of the latter in particular, this was the first time many people had even heard of such a thing.
Initially used in response to prisoner hunger strikes, the Senate Select Committee on Intelligence found this allegedly “necessary” and “legitimate” medical practice – also referred to as a “nutrient enema” – was also used by the CIA as a form of torture and control.
The Soviet Union was good at torture.
But the Soviets excelled at torture because they understood its usefulness. “Our task is not only to destroy you physically,” a Stalinist interrogator explained to a prisoner in 1948. “But also to smash you morally before the eyes of the society.”
History’s great agents of pain knew what the CIA pretends not to.
That’s part of what drew her, as well as her friend and fellow photographer Marisha Camp, to photograph American re-enactors of Germans in World War II for her series “Targets Unknown.” Half out of necessity—those who attend the re-enactments are required to dress for the occasion—and half out of a desire to test the boundaries between subject and artist, Kranitz became an active member in the events she photographed.
Torrent site isoHunt appears to have unofficially resurrected The Pirate Bay at oldpiratebay.org. At first glance, The Old Pirate Bay seems to be just a commemorative site for The Pirate Bay, which went down this week after police raided its data center in Sweden. Upon further inspection, however, it turns out the site is serving new content.
Various mirror sites of The Pirate Bay have sprung up since the site’s disappearance, but this one is different. Some alternatives simply provide a copy of The Pirate Bay with no new content (many proxy sites have been doing this for years). Others, like thepiratebay.cr, go further and even provide fake content as if it was new and even attempt to charge users.
The Government says rights holders and ISPs must develop an anti-piracy regimen themselves, or have one imposed on them. Early signs show this approach is working.
The Government’s ultimatum to ISPs and content owners and distributors that they have three months to come up with a system for identifying and taking action against copyright infringers already appears to be bearing fruit.
The MPAA is in discussions with the major movie studios over ways to introduce site blocking to the United States. TorrentFreak has learned that the studios will try to achieve website blockades using principles available under existing law. Avoiding another SOPA-style backlash is high on the agenda.
The file-sharing site The Pirate Bay is down following a raid by Swedish Police. The organization Rights Alliance, previously named the Anti-Pirate Bureau and representing the giant movie and record corporations, is behind the raid. It’s a dark day for freedoms online.