If you want a good reason to not suggest a rolling release to a new Linux user this is exactly why, between updates of packages a PGP key expired forcing me to manually update the keys to peform a system update.
This week we’ve been playing Tabletop Simulator and enjoying DOOM Eternal. We’re joined by Rhys Davies to help round up the goings on in the Ubuntu Community and discuss our favourite stories from the tech news.
It’s Season 14 Episode 23 of the Ubuntu Podcast! Alan Pope, Mark Johnson and Rhys Davies are connected and speaking to your brain.
Wrong Way to Switch Server OS, Net/1 and Net/2 – A Path to Freedom, Permissions Two Mistakes, OpenBSD progress in supporting riscv64 platform, I2P intro, git sync murder is out, GhostBSD init system poll, and more
The number of hardware platforms providing accelerated AV1 coding is still quite limited for now but with more hardware coming to market supporting encode/decode of this royalty-free video codec, the Linux kernel's media subsystem is getting ready.
A "request for comments" patch series was sent out on Tuesday by Collabora's Daniel Almeida for implementing the stateless AV1 user-space API for the Linux kernel within the media subsystem.
Several vulnerabilities in hardware and drivers from Intel could open the door for attackers to nestle on computers. To prevent this, those affected should install the security patches available for download.
Most dangerous is a security vulnerability (CVE-2021-0084, “high“) in the Linux RMDA driver for the Ethernet controller X722 and 800. Due to a lack of verification of inputs, attackers could obtain higher user rights in an unspecified way. They could also leak information (CVE-2021-0002, “medium“, CVE2021-0003, “low“). The Driver 1.3.19 and 1.4.11 are secured against it.
I'm announcing the release of the 5.13.10 kernel. All users of the 5.13 kernel series must upgrade.
The updated 5.13.y git tree can be found at: git://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git linux-5.13.y and can be browsed at the normal kernel.org git web browser: https://git.kernel.org/?p=linux/kernel/git/stable/linux-s...
thanks,
greg k-h
Here I’m playing “Spelunky 2” on my laptop and simultaneously replaying the same Vulkan calls on an ARM board with Adreno GPU running the open source Turnip Vulkan driver. Hint: it’s an x64 Windows game that doesn’t run on ARM.
I’ve been silent here for quite some time, so here is a quick summary of some of the new functionality we have been exposing in V3DV, the Vulkan driver for Raspberry PI 4, over the last few months...
Iago Toral of Igalia has written up a blog post going over a bunch of work done for the V3DV Vulkan driver for Raspberry Pi 4 and it's coming along nicely.
Toral noted in the update how the V3DV driver has over the last few months added support for a good bunch more extensions, which means it's closing in on Vulkan 1.1 support. It's not quite confirmed yet though. Although it has all of the mandatory requirements added for Vulkan 1.1, it still needs to go through conformance testing and fix any failures that come up yet. Toral noted how "the bottom line is that Vulkan 1.1 should be fairly close now".
As I have covered in many Phoronix articles over the past number of months, it's been a lengthy road bringing up the DG1 graphics support on Linux with the Intel open-source engineers having to re-architect their "i915" kernel graphics driver to support device local memory, getting the GuC support into good shape, scheduler changes, beginning to make use of TTM for memory management, user-space API changes, and a ton of other changes in expanding the driver's scope from just catering to integrated graphics. But now it looks like the DG1 Linux support is about to be officially advertised.
AMD has upstreamed the Van Gogh binary-only firmware files necessary for the RDNA2 graphics to be initialized by the open-source driver on this forthcoming APU.'
Hitting linux-firmware.git this morning was the updating of all the AMDGPU firmware files against the state as shipped by this week's Radeon Software for Linux 21.30 driver package. Those firmware files from that packaged state are now in this de facto upstream repository that Linux distributions pull from for offering the firmware/microcode files needed for kernel driver compatibility.
AMD has added firmware support for its codenamed Van Gogh accelerated processing unit (APU) to linux-firmware.git, an important Linux repository. The addition of firmware support is one of the final steps of hardware enablement in Linux. In many cases it points to an imminent release of a product.
AMD (and other hardware vendors) ship new firmware versions for their parts in new Linux drivers, something that AMD did earlier this week with the release of the Radeon Software for Linux 21.30 package. To enable built-in compatibility with new hardware and drivers, developers of Linux distributions have to get firmware separately from linux-firmware.git, a universal repository of firmware files for various hardware. With the new driver package release and firmware upload, AMD has ensured essential support of its latest Van Gogh APU in various Linux builds, reports Phoronix.
But while the launch of AMD's Van Gogh may be getting closer, we still know nothing certain about this processor.
With LLVM/Clang 13 feature development having ended last week and the 13.0 release candidate being tagged, in starting off the benchmarking cycle first up I was looking at how well this new compiler is performing compared to LLVM Clang 12 stable on an AMD EPYC 7543 (Zen 3) Linux server.
Recently, I started experiencing this issue on Chromium under Linux Mint 20.
Every time I opened Chromium and tried to use a Google service, I would not be logged on them. For example, opening Gmail would show me the login page. I, then, proceeded to login, and everything worked fine until I closed the browser. Opening Chromium again would bring me back to the same problem: I was signed out from Google and prompted to login.
This only happened to Google, other websites worked fine.
Clearing the cache, trying different password stores and even deleting every Chromium file on my home directory and starting clean didn’t solve it.
CentOS 8 Linux will be not supported by the end of the year 2021 and if you want to migrate it to AlmaLinux 8, follow the instructions below.
There is no standard release of CentOS 8+ Linux going forward and CentOS Stream continues after that date, serving as an upstream branch of Red Hat Enterprise Linux that seats between Fedora and RHEL.
AlmaLinux is an free and open source Red Hat Enterprise Linux (RHEL) fork developed by CloudLinux that is a great alternative to CentOS 8.
In this tutorial, you’ll learn how to migrate to AlmaLinux from CentOS 8 using “almalinux-deploy” script.
Today we are looking at how to install Intellij Idea 2021 Ultimate on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
Please take note that it comes with a 30-day free trial and afterward it is paid.
If you use Taskwarrior on Termux, autocompletion doesn’t work out of the box, be it on Zsh or Bash.
I found out that the completions are available at $PREFIX/share/doc/task/scripts, but absent on the appropriate shell completion directories.
When your Linux servers are giving you fits, Jack Wallen has the solution for you.
Windows users looking to switch to Linux will love the familiar desktop environment provided by Linux Mint. Cinnamon enables a traditional desktop experience that is exceptionally well-suited for beginners and gives several customization options to meet different requirements.
Are you looking for ways to tweak the look and feel of the Cinnamon desktop? If you nodded a yes in agreement, then read on to check out ways to customize your desktop in the best possible way.
Termux has the handy termux-open command, which is aliased as xdg-open. I use it to open markdown notes from Termux on Markor (a markdown editor application), by simply running xdg-open foobar.md.
This stopped working when I set Markor to use MIUI’s “app lock” feature, which forces you to authenticate before opening selected apps. Termux would open Markor normally and the “app lock” screen would ask for my credentials. However, after logging in correctly, I would be brought back to Termux. Manually opening Markor wouldn’t show the file I opened.
If you are completely new to WordPress, adding inline JavaScript might not be the easiest task to figure out on your own. Sure, there are some popular methods that can help you to some extent. In this article, we are going to see best way to add custom inline JavaScript in WordPress website.
I use Termux for several years, since I came back from iOS to Android. However, only recently I explored termux-dialog, which can really be a game changer.
When I started using Taskwarrior, one of the first things that I missed was having plenty of space for writing my annotations.
Of course, I could add \n's as I wished to break lines, but I wanted a comfier place to write them.
I quickly stumbled upon a simple script that could solve that. It worked like this: you run it with the task number and your preferred editor opened with a blank screen, ready for your annotation. Now when you saved and closed it, your task was annotated. Very useful.
The scenario: you have some websites that only face your network. You want to enable SSL on them, and the certificate to be recognized out of the box on the clients, without the need for installing on each of them. For this, you have your own domain name.
So a self-signed certificate is not an option, and you’ll probably want to use Let’s Encrypt. However, if you try Let’s Encrypt, the HTTP-01 challenge will fail, as your website doesn’t face the internet.
A solution may be to use the DNS-01 challenge, but your domain DNS may not support it. In that case, what can you do?
Using NFS persistent volumes is a relatively easy, for kubernetes, on-ramp to using the kubernetes storage infrastructure.
Before following this guide, you should have an installed kubernetes cluster. If you don’t, check out the guide how to Install K3s.
While I don’t find the dashboard very useful for configuring anything in the cluster, it can be helpful to find a resource you’ve lost track of or discover resources you didn’t know were there.
Before following this guide, you should have an installed kubernetes cluster. If you don’t, check out the guide how to Install K3s.
Following below is a brief set of instructions setting up KDE Plasma on RockyLinux along with Gnome Desktop Manager which is actually needed to support graphical login, otherwise system might be started via text login followed by "startx"
In a previous article, I demonstrated how Argo CD makes pull-based GitOps deployments simple. In this tutorial, I’ll show you how to automatically create multiple applications in Argo CD using Argo CD itself.
The current technological evolution of every aspect of life has made data more precious than gold and silver. If you can acquire, grow, and protect data, you are one step away from being a data god. Yet, big companies that control life aspects like e-commerce, fuel, transport, and food landscapes rely on data protection to shield themselves from an inevitable collapse.
Right now, losing data is like losing your life insurance. So the database management system you are using should have a backup orientation. If you are a MySQL administrator or a user dealing with growing data, you should consider implementing a more than frequent backup automation plan. Reason? You might end up being a victim of a data hack or even alter your data by accident.
Such circumstances can lead to unforgiving data breaches, especially when you don’t have a database backup plan. If you are an invested MySQL user or administrator, this article is here to fix your database backup worries. We will meet two objectives. First, you will understand the implementation of exporting databases through “mysqldump”. Then, finally, we will touch on how using “crontab” can make this entire process easier through automation.
In this tutorial, we will show you how to install Nessus Scanner on Ubuntu 20.04 LTS. For those of you who didn’t know, Nessus gives you malware detection, scanning of embedded devices, configurations auditing, control systems auditing, and compliance checks among other features. It is developed and maintained by Tenable. The vulnerability scanner platform can save the scan results in various formats such as plain text, XML, HTML, and LaTeX.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Nessus Scanner on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.
Device security is one of the primary concerns that security professionals, developers, and other IT professionals have in the face of a growing number of cyber threats. Criminal hackers are increasingly more sophisticated in their attack vectors and constantly inventing new ways of bypassing even the most secure systems. Though some may argue that Linux is the most secure and stable operating system, it can still fall prey to the same misconfigurations and user errors that plague users of Mac and Windows devices.
No device is foolproof, and like many things in your environment, your Linux system is as secure as its weakest point. The default configurations chosen during the first installation are not enough to harden your device, and unpatched Linux systems and the use of outdated software can significantly increase the chances of a breach. In a worst-case scenario you may find your hard drive completely wiped, with critical files inaccessible and possibly stolen without much evidence left behind. Source code stored on a Linux laptop could fall prey to malicious individuals or perhaps there is PII stored on the laptop in a local file or database; regardless of the individual use case, ensuring that your data is secure is critical.
There are various steps you can take to safeguard Linux devices from potential breaches. One of them is enabling full disk encryption on their drive.
If you’re new to Linux and open source software, you will quickly find that there are many terms to learn. Or maybe you’ve come across a word or two in your journey and found yourself lost. Fortunately, TechRepublic Premium is here to help you along the way.
We’ve collected more than 40 terms that are commonly used within the open-source and Linux communities; terms that aren’t always in the regular parlance.
In this video, we are looking at how to install Flightgear on Linux Lite 5.4.
Back 4 Blood is releasing in October from Turtle Rock Studios (original developer on Left 4 Dead) and they now have an Open Beta that anyone can try out and it appears to work with Proton GE.
It's notable because it uses Easy Anti-Cheat, and you get the EAC loading screen when you load up the game. Usually, games with EAC don't work with Proton on Linux and just block it entirely. We know that Valve has been working with the likes of Easy Anti-Cheat and BattlEye ready for the Steam Deck release but it's not entirely clear how (or even if?) it's working right now. Back 4 Blood is releasing in October from Turtle Rock Studios (original developer on Left 4 Dead) and they now have an Open Beta that anyone can try out and it appears to work with Proton GE.
It's notable because it uses Easy Anti-Cheat, and you get the EAC loading screen when you load up the game. Usually, games with EAC don't work with Proton on Linux and just block it entirely. We know that Valve has been working with the likes of Easy Anti-Cheat and BattlEye ready for the Steam Deck release but it's not entirely clear how (or even if?) it's working right now.
CreatorCrate from developer Jori Ryan is all about running around and causing chaos. It's fast, totally ridiculous and a lot of fun to blast through. It just released recently with native Linux support, with the Ryan mentioning how it was actually developed on Linux using open source tooling and the Unity game engine.
What makes CreatorCrate so chaotic is what your character is capable of. You're basically a 3D printer that has legs, arms and an appetite for everything - and you've gone totally nuts. You can eat any person and object, to use as matter for printing objects or to heal up and so there's a whole lot of eating. No only that, you can also swing around objects to throw at enemies, block fire and more - you can even pinch a downed enemy weapon to use against them.
The share of Linux users on Steam has historically been pretty low [among DRM gamers]. However, it has now reached 1% for the first time in years soon after the Steam Deck announcement.
Crusader Kings II is a strategy game that takes place in the Middle Ages. It was developed and published by Paradox Interactive. In 2019, the CK II transitioned to a “free-to-play” model. Here’s how to play the game on Linux.
KDE Gear (formerly KDE Applications) 21.08 is here to bring you a plethora of improvements and new features to your favorite KDE apps, starting with the most used one, the Dolphin file manager, which received animated previews of the contents of a folder, previews for files inside encrypted locations, as well as automatic and real time update of the file info presented in the Information Panel.
On top of that, Dolphin now presents you with an easier to rename several files, using the F2 key on a selected file, or using Tab and Shift + Tab to navigate back and forward on your files, as well as to copy a file’s name to the clipboard. Moreover, Dolphin’s new KHamburger menu now makes everything easier to access.
Do you love Gnome Shell but hate the way it looks? Don’t worry, the Internet is chock-full of better-looking themes to choose from. There are so many, in fact, that we’ve had to filter it down to seven themes. Here are some of the best Gnome Shell themes you can use to customize your Gnome DE.
Elementary OS 6 Odin is finally on the red carpet with promising updates and upgrades. This Ubuntu-inspired Linux distribution’s update and upgrade changes focus on...
This Ubuntu-based Linux distribution release launched on an easy and user-friendly interface to control their operating system environments. The OS release also continues the crusade of user data privacy and protection.
elementary this week announced the availability of what it says is the biggest update yet to its Ubuntu-based Linux distribution, which brings ease of use, pleasant aesthetics, and a commitment to privacy. It’s called elementary OS 6 Odin.
“It’s been a long road to elementary OS 6—what with a whole global pandemic dropped on us in the middle of development—but it’s finally here,” elementary co-founder Cassidy James Blaede writes. “elementary OS 6 Odin is available to download now. And it’s the biggest update to the platform yet! With OS 6, we’ve focused on empowering you to be in control and express yourself, continuing to innovate with new features, and making elementary OS easier to get and more inclusive.”
New features include more pervasive support for multi-touch throughout the system, including touchpad gestures; a redesigned notification system, a new Tasks app, support for firmware updates from several PC makers (including Dell, HP, and Lenovo), and major updates to built-in apps like Web (the web browser formally known as Epiphany), Mail, Calendar, Camera, AppCenter, Files, Code (a coding editor), and Terminal.
Last year Arch integrated the features from the TalkingArch project into archiso and some months ago they added an installer into their installation medium. As a result, and with some delay, TalkingParabola was deprecated and we added these features to our ISOs too. They are available in out download page as well.
In this video, I am going to show an overview of elementary OS 6 Odin and some of the applications pre-installed.
In this installment of our digital transformation journey with fictional company Davie Street Enterprises, learn how Red Hat Ansible Automation Platform and NetApp's ONTAP solution can come together to help you prevent ransomware attacks.
When we use machines to communicate over the internet, we often want those exchanges to be secure: protected against modification in transit, scrambled in a way that only we and the intended recipient can read it, and linked with a specific identity (a specific server or person) so that we know who we are communicating with.
While there are multiple protocols that provide assurances about security, the good ones require that the parties agree on some shared secret before any user data can be encrypted and integrity protected.
There are two methods commonly used to agree on shared secrets: have one party use some long-term asymmetric key to encrypt the secret and send it to the owner of the key (like in an RSA key exchange), or have both parties exchange messages that contribute to the computed shared secret (what we call Diffie-Hellman key exchange).
The security of both methods depends on picking numbers that are just right. In one variant of the Diffie-Hellman key exchange one of the parameters needs to be a large prime number. Because the key exchange is vulnerable to attacks if the number is not prime, or not a special kind of prime, the Red Hat Crypto Team has developed a tool to provide mathematical proof that the numbers we distribute are indeed primes of that special type and thus aren’t the weakest link in the security of systems that depend on them. We’ve also published a set of primality certificates to allow for quicker verification of their primality.
At the end of this article you can find instructions on how to use this tool, called ecpp-verifier, to verify the primality certificates or how to check that all the primes used by OpenSSH have matching certificates.
Dapr (Distributed Application Runtime) provides an event-driven, portable runtime for building distributed microservices. The project is useful for both stateless or stateful applications on the cloud and at the network edge. A new open source project from Microsoft, Dapr embraces a diversity of languages and development frameworks. The project is a natural fit for Kubernetes and Red Hat OpenShift. This article shows you how to install Dapr and walks you through the process of building a sample application on Kubernetes.
Serverless architecture has already become an efficient solution to align overprovisioning and underprovisioning resources (e.g., CPU, memory, disk, networking) with actual workloads regardless of physical servers, virtual machines, and cloud environments. Yet, there is a concern for Java developers when choosing new programming languages to develop serverless applications. The Java framework seems too heavyweight and slow for serverless deployment on the cloud, especially Kubernetes.
What if you, Java developer, could keep using the Java framework to build traditional cloud-native microservices as well as new serverless functions at the same time? This approach should be exciting since you don’t have to worry about a steep learning curve for new serverless application frameworks.
The use of NFV migration is becoming commonplace, it is made apparent there is a need for a higher degree of software management, smoother upgrades, and deployment process. Due to the complexity of the migration, Telcos have been deterred from adoption. A solution should be out there to aid businesses in managing and deploying network automation, orchestration, and managed services.
In general, a telco network is complex and needs to be managed using multiple perspectives. For a proper deployment, a pure Open Source approach would require a great deal of work to be put in, however, commercial deployment of MANO stacks provided by vendors again raises the “vendor lock-in” question.
Another problem faced by telcos is that after investing a lot into creating cloud services, telecom operators are unable to create a solid product to sell. With the right orchestration solution, telcos can market a pre-packaged solution and use APIs to extend the platform to meet their needs.
MiTac’s “PD10EHI,” DFI’s “EHL171/EHL173,” and ASRock’s ”IMB-1004” thin Mini-ITX boards extend Intel’s 10nm Atom x6000 with triple displays, USB 3.1 Gen2, SATA, M.2, and PCIe. DFI and ASRock also offer 2.5GbE.
Earlier this week, ICP Germany announced a thin Mini-ITX PD10EHI board with Elkhart lake (Atom x6000, etc.) from its manufacturing partner MiTac, but the press release accidentally linked to a recently introduced, Comet Lake based PH12CMI thin Mini-ITX, which we covered. Now we are returning to the PD10EHI along with DFI’s EHL171/EHL173, which we similarly spotted on a preliminary holding page back in February when we reported on Advantech’s similarly Elkhart Lake based AIMB-218 thin Mini-ITX board. We have also uncovered an ASRock Industrial IMB-1004 board with the same combination, which we cover here.
Imagine an Internet of Snitches, each scanning whatever data they have access to for evidence of crime. Beyond the OS itself, individual phone apps could start looking for contraband. Personal computers would follow their lead. Home network file servers could pore through photos, videos and file backups for CSAM and maybe even evidence of copyright infringement. Home routers could scan any unencrypted network traffic. Your voice assistant could use machine learning to decide when yelling in a household crosses the line into abuse. Your printer could analyze the documents and photos you send it.
It’s not much of a surprise to most people that their devices, especially their phones, are snitching on them to the hardware vendor (or app developer). Some people are surprised to discover just how much. I already wrote a post Snitching on Phones That Snitch on You that focused on the amount of data an idle Android and iOS device are sending to Google and Apple respectively, described how we avoid those problems on the Librem 5, and even explained how to use OpenSnitch to track any attempts by a malicious app to snitch on you.
So we know most devices and proprietary apps track people to some degree (even for paying customers), and that the problem has extended to cars. While many people don’t like the idea of this, they also shrug it off, not just because they don’t feel empowered to do much about it, but also because their data is “only” being used for marketing purposes. Someone is profiting off of the data, sure, but their data isn’t being used against them.
Yet we are starting to see how your data can be used against you. Police routinely get location data from data brokers to track suspects without having to get a warrant. Even private groups have paid data brokers to dig up dirt on people, leading to a Catholic priest’s resignation after location data revealed he used the Grindr app and frequented gay bars.
Arduino has partnered with Segger to further support developers in creating their own embedded systems, implementing compatibility of Segger debugging solutions with Portenta boards.
Debuggers are the scalpel that allows a developer to dissect any application code running on embedded hardware. This versatile tool helps the programmer to halt programs at specific points, inspect values stored in memory units, modify CPU registers and enter test data to narrow down on buggy pieces of code. This tool comes in handy when you want to locate malfunctioning code and fix faulty program execution.
Over the past few years, Arduino Education has expanded, offering new learning solutions to teachers and students around the world. Today, we have more than 10 kits with exciting online courses for STEM teachers and learners ranging from middle school to university.
When creating these products, we were delighted to collaborate with many brilliant educators, who shared with us their unique teaching styles and provided valuable feedback.
With the pandemic dramatically shaking up the status quo in education, we now have more learning styles than ever. From large schools using hundreds of Arduino kits to smaller classes and study groups. There are even a lot of parents who use kits for homeschooling, along with an increasing numbers of self-learners.
We’re excited to see Arduino Education products being enjoyed in so many different ways, and want to make sure our kits are easy to use and share in every situation. That said, we’re excited to announce several changes to how our educational products are shared.
On September 16th, 2021, the Open Source Initiative will be hosting a free, virtual half-day event on Practical Open Source Information. Geared towards open source developers, scholars, lawyers and managers interested in learning about open source in practice, this unique event will feature speakers with extensive experience in the field -- with a focus towards new adopters and those looking to deepen their open source participation.
Mozilla Thunderbird email client released new major 91.0 version with many new features and improvements.
Thunderbird 91.0 now runs in multi-process (e10s) mode by default, which offers many advantages in responsiveness, stability, performance, and security.
For macOS users, the release adds native support for computers with Apple silicon CPUs. There are also Latvian language support, new user interface for adding attachments, etc.
The ‘Account Setup’ has a new look and finally move to new tab instead of a floating dialog. It also adds ability to detect and set up CalDAV calendars and address book during setup.
This message is being sent from the Community Code of Conduct Committee, with the approval of the Core Team.
The PostgreSQL Community Code of Conduct Committee is approaching our third year anniversary. As part of the community CoC policy, the Committee membership is to be refreshed on an annual basis.
I’ve built a branch of OpenHMD that uses GStreamer to record the CV1 camera video, plus IMU and tracking logs into a video file.
To go with those recordings, I’ve been working on a replay and simulation tool, that uses the Godot game engine to visualise the tracking session. The goal is to show, frame-by-frame, where OpenHMD thought the cameras, headset and controllers were at each point in the session, and to be able to step back and forth through the recording.
The Open Mainframe Project (OMP), an open source initiative that enables collaboration across the mainframe community to develop shared tool sets and resources, today announces the complete schedule of the 2nd annual Open Mainframe Summit. This year's virtual event, which takes place on September 22-23, will feature keynote speakers Gabriele Columbro, Executive Director of Fintech Open Source Foundation (FINOS); Jason Shepherd, Vice President of Ecosystem at ZEDEDA and Chair of the LF Edge Governing Board; Jono Bacon, a leading community and collaboration speaker and founder of Jono Bacon Consulting; Steve Winslow, Vice President of Compliance and Legal at The Linux Foundation; Tracy Ragan, CEO and Co-Founder of DeployHub and Continuous Delivery Foundation Board Member, and more.
One of the most exciting Linux kernel innovations in recent years has been eBPF for an in-kernel virtual machine allowing sandboxed programs running within the Linux kernel. The Linux Foundation along with Microsoft and other partners are now forming the eBPF Foundation.
Facebook, Google, Microsoft, and Netflix have teamed up to launch the eBPF Foundation, which is designed to accelerate a “transformational” technology that will “redefine” networking, security, tracing, and observability.
The new foundation’s membership also includes Isovalent, a Google-backed startup that’s setting out to deliver an “eBPF-powered revolution” in cloud-native networking and security.
The Linux Foundation has announced the formation of the eBPF Foundation...
Security updates have been issued by CentOS (java-1.8.0-openjdk), Debian (firefox-esr, libspf2, and openjdk-11-jre-dcevm), Fedora (bluez, fetchmail, and prosody), Oracle (edk2, glib2, kernel, and libuv), Red Hat (.NET Core 3.1), SUSE (cpio), and Ubuntu (firefox and openssh).
Authenticator apps like Google Authenticator use 2 authenticaion protocol centered around What you have paradigm.
In the roughly two years since Jeffery Epstein’s “suicide” in a Manhattan jail cell, some of his closest associates, friends, and “clients” continue to scramble to salvage their carefully crafted public images from the fallout of having had links to Epstein and/or the network that enabled his sex-trafficking and blackmail activities. Chief among those who have labored to keep their names out of the press is arguably Epstein’s closest associate alongside Ghislaine Maxwell, the retail billionaire Leslie Wexner.
Wexner, the richest man in Ohio, has had his well-crafted public persona irrevocably tarnished by the association, but he has used his influence and power to keep his name largely out of the press, despite the clear ties between him and Epstein as well as the many sordid acts that are now synonymous with Epstein’s name.
One obvious consequence of keeping Wexner’s name mostly out of the headlines has been a lack of journalistic scrutiny applied to his dealings, both past and present. While some Ohio journalists, Bob Fitrakis chief among them, have critically reported on Wexner for decades, there has been little attention given to the dark underbelly of Wexner’s empire by the mainstream press, despite his obvious and extremely close connection with Jeffrey Epstein.
There are several historical moments when Wexner’s made-to-order persona of the “rag trade revolutionary” unravels, with the most critical being the murder of Arthur Shapiro and its subsequent cover-up. While some mainstream outlets, such as the Daily Beast, have recently attempted to dig slightly deeper into Shapiro’s death and what it reveals about Leslie Wexner, in this article reveals previously unreported implications of Shapiro’s death and how it relates to the billionaire who was Epstein’s most obvious, yet unindicted, accomplice.
[...]
While Berry L. Kessler may well have had a role in Arthur Shapiro’s death, it seems unlikely that he had the political pull to get police to cover up several, apparently connected, murders—those of Arthur Shapiro, Frank Yassenoff, Ella Rich, and potentially Marjorie Dyer—or the financial resources to pay for a professional contract killing. Given the evidence, it appears that Kessler was a deeply corrupt operator, but most likely only a middleman for the dirty deed if he was involved in the “hit” on Shapiro.
Concerns about the deeper forces at work in these cases appear to be what led Columbus police investigators to produce a document like the Shapiro Murder File in the first place, and its suppression and attempted destruction suggest that the scrutiny was aimed squarely at Leslie Wexner, which was too close for comfort for those in Ohio law enforcement who sought to protect the criminal nexus ultimately responsible for Shapiro’s death. Wexner’s involvement with suspect entities and actors came to light well after the Shapiro case, but the blatant murder of The Limited’s lawyer is the first documented instance of this connection and, arguably, one of the most important.
Wexner and many other wealthy “clients” of Jeffrey Epstein have taken great pains to develop sophisticated PR strategies aimed at keeping their reputations unscathed from the continuing fallout in the Epstein case. Wexner and others, such as Bill Gates, have pursued a narrative where all bad deeds are attributed to the now conveniently dead Jeffrey Epstein, while his enablers, accomplices, and close associate were merely duped by Epstein’s charisma or manipulated by his wiles. Many of these individuals, however, and particularly Leslie Wexner, clearly have something to hide.
Canada's government is poised to pass a "harmful content" regulation. It's a worst-in-class mutation of a dangerous idea that's swept the globe, in which governments demand that hamfisted tech giants remove broad categories of speech – too swiftly for meaningful analysis.
Many countries have proposed or passed rules on these lines: Australia, France, UK, Germany, India. They are all bad, but Canada's is literally the worst – as if Trudeau's Liberals sought out the most dangerous elements of each rule and combined them.