Showing headlines posted by bob

« Previous ( 1 ... 10 11 12 13 14 15 16 17 18 19 20 ... 1158 ) Next »

Canonical launches Ubuntu Pro for IoT Devices

  • LinuxSecurity.com - Hybrid RSS; By Anthony Pell (Posted by bob on Apr 11, 2024 6:11 AM EDT)
  • Story Type: News Story, Security; Groups: Ubuntu
Canonical has launched Ubuntu Pro for Devices , a comprehensive offering emphasizing security and compliance for IoT device deployments. This initiative aims to provide 10 years of security maintenance for Ubuntu and thousands of open-source packages, along with device management capabilities through Landscape , a systems management tool by Canonical. Ubuntu Pro also ensures that IoT devices receive reliable security patches from a trusted source.

Native Spectre v2 Exploit Uncovered: Implications & Analysis for Linux Security Practitioners

The recently uncovered "Native Branch History Injection (BHI)" exploit against the Linux kernel marks a significant milestone in the ongoing battle against Spectre v2 vulnerabilities. Researchers have revealed that BHI can bypass existing Spectre v2/BHI mitigations to read sensitive data from the memory of Intel systems.

Virtually and actually, LXC 6 and Incus 6 are here - both LTS versions

There's a new version of Canonical's LXD too, but its community fork seems to be thriving The community fork of what is now Canonical's in-house virtualization tool seems to be doing well, with major new releases of Incus, LXC and associated tools.…

Harnessing the Power of Open Source for Private Clouds: Ubuntu Cloud Infrastructure with OpenStack

In the ever-evolving landscape of technology, cloud computing has emerged as a cornerstone, enabling businesses and individuals alike to leverage vast computing resources without the need for extensive physical infrastructure. This article delves into how Ubuntu Cloud Infrastructure, in conjunction with OpenStack, provides a robust foundation for setting up private cloud environments, blending flexibility, scalability, and security.

VMS Software prunes OpenVMS hobbyist program

  • The Register (Posted by bob on Apr 10, 2024 12:05 PM EDT)
  • Story Type: News Story
Vintage OS editions go the way of the dodo as VSI cranks up exclusivity Bad news for those who want to play with OpenVMS in non-production use. Older versions are disappearing, and the terms are getting much more restrictive.…

Canonical Makes Network Management Simpler and More Secure with Netplan 1.0

Canonical , the company behind Ubuntu , has introduced Netplan 1.0 , a network configuration tool that simplifies networking configuration on Linux systems. Netplan acts as a control layer above network stacks like systemd-networkd and NetworkManager, allowing administrators to manage and configure them easily.

SiFive Unveils HiFive Premier P550: A RISC-V Development PC with Linux 6.60 Support

SiFive Unveils HiFive Premier P550: A RISC-V Development PC with Linux 6.60 Support Today at Embedded World, SiFive, Inc. unveiled the HiFive Premier P550, an advanced iteration of the former HiFive Unmatched board.

SiFive is back with another 64-bit RISC-V dev board -- hopefully

  • The Register (Posted by bob on Apr 9, 2024 5:58 PM EDT)
  • Story Type: News Story; Groups: Intel
Ditching Intel for a system-on-chip out of Beijing SiFive has promised the world another HiFive RISC-V development system featuring a 64-bit out-of-order processor for engineers and other curious techies to try out.…

Hacked VMs Reveal New Attack Risks

Researchers have exposed new and sophisticated types of attacks that endanger the security and confidentiality of virtual machines (VMs). Two variations of Ahoi attacks, Heckler and WeSee, have been identified targeting hardware-based trusted execution environments, specifically AMD's Secure Encrypted Virtualization-Secure Nested Paging (SEV-SNP) and Intel's Trust Domain Extensions (TDX) technologies.

CoCo VMs Will Now Panic If RdRand Is Broken in Linux 6.9

A significant change has been merged into the x86 fixes for Linux 6.9, requiring the seeding of RNG (Random Number Generation) with RdRand for CoCo (Confidential Computing) environments. The change focuses on CoCo virtual machines , designed to be as isolated as possible, assuming the VM host is untrusted. RdRand is critical as a hardware random number generator instruction for entropy to guest VMs. Security expert and WireGuard developer Jason Donenfeld authored this change.

A culture of open source collaboration

  • The Register (Posted by bob on Apr 8, 2024 2:33 PM EDT)
  • Story Type: News Story
How InnerSource methodologies can help increase innovation in financial services Webinar Not all business sectors have taken open-source software development into their hearts, despite its growing reach and significance.…

Alldas.de Defacement Mirror .. Defaced

  • LinuxSecurity.com - Hybrid RSS; By Anthony Pell (Posted by bob on Apr 8, 2024 5:35 AM EDT)
  • Story Type: News Story, Security; Groups: Linux
On Tuesday June 26, 2001, a hacker named 'ThePike' managed to deface the European defacement mirror Alldas.de. Visitors to the site saw a modified news banner on the left side saying "ALLDAS GOT CRACKED! READ IT HERE". . . .

The XZ Utils Linux Backdoor: How It Happened & What We Can Learn

The alarming discovery of a backdoor in the xz data compression library , which had the potential to compromise Linux systems, has dominated recent security news. While the backdoor did not make its way into production Linux distributions, the incident raises crucial questions about open-source security and the need for vigilance in the face of emerging threats.

This backdoor almost infected Linux everywhere: The XZ Utils close call

  • ZDNET | open-source RSS; By Steven Vaughan-Nichols (Posted by bob on Apr 7, 2024 7:33 AM EDT)
  • Story Type: News Story, Security; Groups: Linux
For the first time, an open-source maintainer put malware into a key Linux utility. We're still not sure who or why - but here's what you can do about it.

How to Install Arkime Moloch Packet Capture Tool on Ubuntu 22.04

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Apr 7, 2024 5:45 AM EDT)
  • Story Type: Tutorial; Groups: Linux, Ubuntu
Arkime is a free, open-source, large-scale indexed packet capture and search tool that stores and indexes network traffic in PCAP format. This tutorial will show you how to install the Arkime Packet Capture tool on Ubuntu 22.04.

Contribute at the Fedora 40 Upgrade, and Intel OpenCL Test Days

Fedora test days are events where anyone can help make certain that changes in Fedora work well in an upcoming release. Fedora community members often participate, and the public is welcome at these events. If you’ve never contributed to Fedora before, this is a perfect way to get started. There are two upcoming test days […]

Noni Radio Module with Qualcomm's Chipsets for WiFi-7 Connectivity

  • LinuxGizmos.com (Posted by bob on Apr 7, 2024 12:19 AM EDT)
  • Story Type: News Story
Noni Radio Module with Qualcomm’s Chipsets for WiFi-7 Connectivity

How to Install Metasploit Framework on Ubuntu 22.04

As a network administrator, scanning for security vulnerabilities and patching them as soon as possible is important. Metasploit is an open-source framework that helps identify threats and vulnerabilities. In this tutorial, you will learn how to install the Metasploit framework and do basic testing on a Ubuntu 22.04 system.

German State Abandons Microsoft for Linux and LibreOffice

The German state, Schleswig-Holstein, has decided to move away from proprietary software, such as Windows and Office, to open-source alternatives , including Linux and LibreOffice . The move is motivated by the need to "ensure that their data is kept safe with us, and we must ensure that we are always in control of the IT solutions we use and that we can act independently as a state," as stated by Dirk Schr¶dter, the digitalization minister for Schleswig-Holstein.

Text Manipulation in Linux: Awk Vs. Sed

  • Linux Journal; By George Whittaker (Posted by bob on Apr 6, 2024 8:01 AM EDT)
  • Story Type: Tutorial; Groups: Community, Linux
The Linux operating system is a powerhouse for developers, system administrators, and enthusiasts alike, offering unparalleled flexibility and control. Central to its prowess is the command line, a potent interface through which users can perform intricate operations with just a few keystrokes. Among the myriad of command-line tools available, awk and sed stand out for their text processing capabilities. These tools, though distinct in their functionalities, can be incredibly powerful when used independently or in conjunction. This article delves deep into both, unraveling their complexities, comparing their functionalities, and guiding users on when and how to use them effectively.

« Previous ( 1 ... 10 11 12 13 14 15 16 17 18 19 20 ... 1158 ) Next »