Welcome to episode 01 of Linux Out Loud. We fired up our mics, connected those headphones as we searched the community for themes to expound upon. We kept the banter friendly, the conversation somewhat on topic, and had fun doing it.
When war over territory develops in the physical world, what happens to developers in the borderless networked one? Doc Searls, Katherine Druckman and Jonathan Bennett dive into that question, while also visiting other wartime tech topics, such as the new Universal Chiplet, exciting new device drivers and the first 300 Starlinks in Ukraine.
For several years, Intel launched a project related to the Linux kernel. Since then, until now there has not been a lot of information about it; and a few thought that Intel had left it on the side. But the reality is that the company has plans to make progress. And even to step on the accelerator in projects that join this operating system with the hardware. So much so, that they have even bought a specialized software developer company from Germany, Linutronix; to give more muscle and revitalize the project, and to advance GNU/Linux.
Those of you in-the-know are well aware that Zink has always had a crippling addiction to seamless cubemaps. Specifically, Vulkan doesn’t support non-seamless cubemaps since nobody wants those anymore, but this is the default mode of sampling for OpenGL.
Thus, it is impossible for Zink to pass GL 4.6 conformance until this issue is resolved.
[...]
In order to replicate this basic OpenGL behavior, a substantial amount of code is required—most of it terrible.
Cobalt Strike was created a decade ago by Raphael Mudge as a tool for security professionals. It’s a comprehensive platform that emulates very realistic attacks. Indeed, the tool can assess vulnerabilities and run penetration tests, while most tools on the market cannot do both.
Vulnerability assessment and pentesting are two different things. The first consists of identifying vulnerabilities that could be used by hackers, not exploiting them. Pentesting involves vulnerability exploitation and post-exploitation actions – the idea is to conduct a real attack, like cybercriminals would do, except with an explicit authorization from the company in order to identify weaknesses and improve security defenses.
Your choice of encryption software can have a major impact on the safety of this data, however. Two popular options for encryption are NordLocker and VeraCrypt.
While the two provide similar benefits, their feature sets are different enough that you’ll want to choose your software carefully based on your business’s particular needs and preferences.
[...]
This usability comes with a cost, however. NordLocker offers a free version of the software, but it is limited compared to the premium version.
There is much more to copying and renaming files on Linux rather than cp and mv. Try out some commands and strategies to save your time.
For this purpose, users have been using cp and mv for decades. These were some of the few commands we learned and use every day, similarly, there are other techniques, handy variations, and other commands used for this purpose that provide unique options.
It’s safe to say that the find command in Linux is one of the must-know operations for backend developers, unless you are using a Windows Server.
In this tutorial, we will show you how to install Fragments on Ubuntu 20.04 LTS. For those of you who didn’t know, Fragments is an easy-to-use BitTorrent client for the GNOME desktop environment. If you were looking for a better user experience(UI) with all the necessary features for torrenting, this application is worth checking out.
This article assumes you have at least basic knowledge of Linux, know how to use the shell, and most importantly, you host your site on your own VPS. The installation is quite simple and assumes you are running in the root account, if not you may need to add ‘sudo‘ to the commands to get root privileges. I will show you the step-by-step installation of the Fragments BitTorrent client on Ubuntu 20.04 (Focal Fossa). You can follow the same instructions for Ubuntu 18.04, 16.04, and any other Debian-based distribution like Linux Mint.
Python is one of the most widely used open-source, multipurpose, and object-oriented programming languages. It is gaining popularity due to its simplicity and easy-to-use syntax. It is a high-level language and is generally used in web development, gaming development, data analytics and visualization, AI, and machine learning.
At the time of writing this tutorial, Python 3.10 is the latest stable version and was released on October 04, 2021. Python 3.10 comes with some cool features including, Structural Pattern Matching, Improved Error Reporting, Security Updates, Pattern Matching, and more.
Here are some basic skills to get started with bash, one of the best shells for preparing and using scripts on Linux.
Today we are looking at how to install SSF2 1.3.1.2 Beta on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.
The Hand of Glory, a point and click adventure from Madit Entertainment / Daring Touch has released an official Linux build. With it now available, the game is on a 55% discount until March 26, a good time to show support for another indie developer.
[...]
From the sunny shores of Miami to the green lush Italian hills, he will have to use all the resources at his disposal in order to reveal the truth behind the kidnapping. And by that time, he'll be past the point of no return."
MorphOS is actually a remarkably good and capable operating system – held back by its reliance on outdated Apple PowerPC hardware. It’s got a a robust core, a good browser, a number of great applications, and you can configure and alter every nook and cranny of the operating system (assuming you can get through the thick molasses that is several decades of Amiga-isms that make no sense to anyone who hasn’t been part of the scene for about as long).
The Alpine Linux project is pleased to announce the immediate availability of version 3.15.1 of its Alpine Linux operating system.
The developers of Zorin OS have released the latest version of their beautiful desktop Linux OS.
Zorin OS 16 was only released seven months ago and yet the developers have been busy at work to bring the first point release for the desktop distribution. The biggest change to the operating system is the inclusion of the 5.13 kernel. However, that kernel is not patched against the Dirty Pipe vulnerability. However, immediately upon installation, an update will patch the kernel, so you’re desktop isn’t in danger of falling prey to this nasty bug.
The 5.13 kernel brings better hardware compatibility for newer hardware (such as NVIDIA RTX 3050 GPUs, 12th Generation Intel Core processors, Sony PlayStation 5 DualSense controllers, the Framework laptop, and Apple’s Magic Mouse 2).
IBM's Red Hat cannot prevent Daniel Pocock and his Software Freedom Institute SA from using the domain name WeMakeFedora.org, according to a ruling on Monday.
Red Hat, which sponsors the development of the Fedora Linux distribution, challenged the inclusion of the trademarked term "Fedora" in the website URL, and demanded it be given the .org domain name. But under the Uniform Domain Name Dispute Resolution Policy (UDRP) established by DNS oversight body ICANN, a FORUM mediator found Red Hat's objections wanting, and refused to order a transfer of the domain.
"There are no advertisements on the respondent's website," the decision states. "There is no evidence that respondent is a competitor of complainant, nor is there any evidence that respondent has operated the website for any commercial purpose. The panel rejects complainant's submission, unsupported by evidence, that respondent's conduct is likely to have been undertaken for commercial gain."
We're now into the campaigning period. We have 3 candidates this year: - Felix Lechner - Jonathan Carter - Hideki Yamane
I will make his platforms available when I have received them at: https://www.debian.org/vote/2022/platforms/
Kurt Roeckx Debian Project Secretary
Is Ubuntu the best Linux-based desktop operating system? That is debatable. However, I think we can all agree that Ubuntu is the most well-known desktop Linux distribution on the planet. Hell, Ubuntu even got a mention on the legendary TV sitcom The Big Bang Theory.
Today, the developer of Ubuntu, Canonical, announces some exciting news -- the Linux-based operating system is getting a new logo! While it doesn't deviate much from previous Ubuntu logos, it is definitely an improvement. You see, the logo was always suppose to look like a top-down view of three people interlocking arms -- Canonical calls it "Circle of Friends." The circles (heads) are now centered to better represent the trio of people. The logo also gets put into an orange rectangle.
"While it is important to have a respectful continuity with the previous Circle of Friends, the updated version is leaner, more focused, more sophisticated. It also makes a little more sense that the heads are now inside the circle, facing each other and connecting more directly. The rectangular orange tag is a break from the conventional square or circle, as it allows for the boldness of the orange to express itself and provides a recognisable colourful mark across media. Finally, the logo moves from a tiny superscript to a large, dynamic and leading presence," says Canonical.
A few days ago (2022-03-14) was pi-day to celebrate the number pi (ââ°Ë3.14). Some celebrate pi-day by making videos or similar content about this number. As I already found a few mathematicians on gemini, I was sure I would at least see one article about pi popping up on that day. But there were none, what made me a little bit disappointed. Now I realize that I am something of a blogger myself, so I could just have made some content. So here is my fact about pi to celebrate pi+0.02 day:
Pi might be a normal number. That might at first sound a little boring and normal, but it is pretty cool. Note that I am saying that pi might be a normal number, as it has not yet been proven. But what is a normal number? A normal number contains any finite sequence of integers appears in the decimal places with equal density. This means any finite sequence of numbers can be found in pi. This includes your birthday, your full name if converted correctly, the Mona Lisa. How about the Linux kernel? Whatever you can think of.
Say “hello” to an affordable cellular plan, Librem SIMple, a privacy-focused prepaid service in USA
Purism expanded the Librem AweSIM pre-paid service to offer a new plan at an ever more affordable price. Librem SIMple offers digital privacy protection with a 1GB monthly data limit and a $39/month.
Traditional cellular providers in the US are selling data for advertising. They are creating unified customer identifiers. This way, they can “identify users across many devices and serve them relevant advertising.” With the Librem AweSIM and Librem SIMple, users’ personal information is never sold, disclosed, or even seen by the big telecom carriers. Purism’s Chief Security Officer at Purism, Kyle Rankin, elaborates “Most companies think data is gold. That’s why they are double-dipping from their paying customers to monetize customer data. Purism thinks data is uranium. We collect the least amount of customer data necessary to provide a service and get rid of it once we no longer need it.” Purism also offers Librem AweSIM, a premium $99/month unlimited prepaid plan. Since its launch in 2020, many customers enjoy privacy protections that AweSIM provides.
Omni wheels are fantastic because they let a vehicle drive forward, backward, left, right, and rotate — all without a steering mechanism. There are only two catches: all four omni wheels must be driven and omni wheels don’t handle rough terrain or obstacles well. Tank tracks are perfect for rough terrain, so James Bruton thought to combine the two concepts. To test this idea, he built an Arduino-controlled robot with a triangle of tank tracks.
This robot has three tank tracks, each of which is driven by a simple geared DC motor. Burton arranged those in a triangle formation, so each track is at a 60 degree angle to the other two tracks. Normally, an arrangement like this would be a disaster, as it couldn’t drive in any direction without dragging at least one of the tracks. But Bruton lined all of the tracks with small wheels, which have axes of rotation perpendicular to the track motor axles. Those wheels rotate freely, so the vehicle can move without resistance — even when that movement is perpendicular to one of the tracks.
In January there were 161 alerts generated, resulting in 20 regression bugs being filed on average 13.4 days after the regressing change landed.
Welcome to the January 2022 edition of the performance sheriffing newsletter. Here you’ll find the usual summary of our sheriffing efficiency metrics, followed by a review of the year. If you’re interested (and if you have access) you can view the full dashboard.
The latest update of the Java Development Kit (JDK 18), becomes generally available (GA) next Tuesday, and though it’s not a Long-Term Support (LTS) release, there's a lot to look forward to in this update.
JDK 18, which is the reference implementation of version 18 of the Java SE Platform (as specified by JSR 393 in the Java Community Process), is set to go GA on March 22, on schedule with the accelerated, six-month release cadence Oracle announced in 2017. JDK 17, which was the second LTS since JDK 11 went GA in 2018, was announced in September 2021.
AsyncAPI is a project that considers that human beings have naturalized the tools that enhance their capacities. Technology can guide us and define our steps. It’s not merely daily practice. We should be more aware that we humans make technology and that we are the ones who create and determine the future it holds for us. We are the ones who build the future.
Linux Netfilter is a Linux security program that controls access to and from Linux’s network stack.
A vulnerability in the container runtime engine CRI-O can be exploited by a rogue user to gain root-level access on a host.
In a Kubernetes environment powered by CRI-O, the security hole can be used by a miscreant to move through a cluster as an administrator, install malware, and cause other chaos.
CrowdStrike's threat research team discovered the privilege-escalation flaw in CRI-O version 1.19. The bug, tracked as CVE-2022-0811 and more creatively dubbed cr8escape, received a severity score of 8.8 out of 10.
CrowdStrike privately disclosed the vulnerability, and CRI-O's developers today released a fix while recommending immediate patching. Besides Kubernetes, other software and platforms that depend on or use CRI-O – these include OpenShift and Oracle Container Engine for Kubernetes – may also be vulnerable, CrowdStrike warned.
Versions 3.3.6, 3.4.3, and 3.5.1, patched against the infinite loop denial of service condition, will appear on OpenBSD mirrors soon, LibreSSL maintainers advised.
Although computers and tablets are critical for connecting to the internet, across the U.S, more than 1 in 10 households don’t have a computer. Many more households don’t have enough devices for everyone, forcing families to make difficult choices about which family members can connect and which can’t. It’s not that these households don’t want a computer; they can’t afford one. Just 59% of households making less than $30,000 a year have a computer.
The “device divide” is every bit as problematic as the “digital divide.” While there are government programs intended to help low-income consumers access devices, none of these programs will come even close to getting a device into the hands of everyone who needs one. Thus, absent well-funded and sustainable federal programs to get devices to those in need, we won’t end the device divide or the digital divide.
[...]
In 2021, Senator Raphael Warnock and Representative Donald McEachin introduced the “Device Access for Every American Act.” That legislation would create a voucher program that enables low-income households to get up to two connected devices directly from a retailer or refurbisher. Although a version of the Device Access for Every American Act was included within Build Back Better, that legislative package has stalled, and it’s unclear if negotiations to pass a modified version will succeed.
Luckily the Federal Communications Commission is well poised to pick up where Congress left off. It has the authority to create a device voucher program, modeled off the Device Access for Every American Act, within the Universal Service Fund (USF). The USF is intended to facilitate universal access to advanced telecommunications and information services at a reasonable rate. As a part of this work, the Commission can create a new program. In fact, the FCC created the Lifeline program (which subsidizes phone and broadband service for low-income consumers) using its existing authority. It was only later that Congress codified the Lifeline program. And, the Commission has already recognized that the inability to afford devices jeopardizes universal connectivity, noting in a Lifeline proceeding that the “lack of access to affordable equipment, including computers[…] is a significant barrier to broadband adoption among low-income consumers.”
In many respects, a device voucher program within the USF would be more effective than a Congressionally-funded program. Since USF programs are funded through continuous assessments and not a one-time appropriation, a USF device voucher program should have enough funding to replace broken or outdated devices. A one-time Congressional investment, while helpful, would likely lead to a re-opened device divide as soon as the fund runs out of money and the devices offered are no longer functional.
British-Iranian aid worker Nazanin Zaghari-Ratcliffe and dual national Anousheh Ashouri were freed on Wednesday after a long ordeal during which they became a bargaining chip in Iran’s negotiations with the West over Tehran’s nuclear program.
A video aired by Iran’s Tasnim news agency, affiliated to the elite Revolutionary Guards, showed a woman dressed in black Iranian Islamic clothes, boarding an aircraft.