It's a great day to be a GNOME developer as someone just pledged to donate $1,000,000 over the next two years to the non-profit GNOME Foundation, the driving force behind the widely-used GNOME desktop environment.
The truth is probably not as bleak as the picture the report paints. Black Duck makes its living by auditing code being used by enterprise customers, and has a reputation for being a little alarmist when it comes to the security of open source software.
This tutorial shows how to install an Ubuntu 18.04 LTS (Bionic Beaver) server with Apache, BIND, Dovecot and ISPConfig 3.1. ISPConfig is a web hosting control panel that allows you to configure the following services through a web browser: Apache or nginx web server, Postfix mail server, Courier or Dovecot IMAP/POP3 server, MySQL, BIND or MyDNS nameserver, PureFTPd, SpamAssassin, ClamAV, and many more. This setup covers the installation of Apache (instead of nginx), BIND (instead of MyDNS), and Dovecot (instead of Courier).
The Python ecosystem is rich with many tools and libraries that improve developers’ lives. For example, the Magazine has previously covered how to enhance your Python with a interactive shell. This article focuses on another tool that saves you time and improves your Python skills: the Python debugger. Python Debugger The Python standard library provides […]
Canonical released new kernel security updates for all of its supported Ubuntu releases, including Ubuntu 17.10, Ubuntu 16.04 LTS, and Ubuntu 14.04 LTS to patch up to 13 security vulnerabilities.
Transmission is probably the most famous torrent client in the Gnu/Linux world, and it's very often used even on other operating systems. It's really easy to use, and its graphical interface is very intuitive; however in this tutorial we will see how to install transmission-daemon and run transmission on a headless machine: that's an ideal setup to create a "Torrent-box", using for example a Raspberry Pi, to reduce power usage.
Whether you like the GDPR or not (and there are reasons for both, which we'll get into shortly), one thing it has done for sure is turn privacy into Very Big Deal. This is good, because we've had damned little of it on the internet and now we're going to get a lot more. That's worth celebrating, everybody. Merry Privmas!
In my job I've heard professionals in tech, from C-level executives to everyone in between, say they want their own kids to learn more about Linux and open source. Some of them seem to have an easy time with their kids following closely in their footsteps. And some have a tough time getting their kids to see what makes Linux and open source so cool. Either way, if you have a kid or know a kid that may be interested in learning more about making something with code or hardware, from games to robots, this list is for you.
News briefs for May 24, 2018.
Targeted mostly at developers, the new Dell Precision Mobile Workstation "Developer Edition" line-up consists of the Dell Precision 3530 Mobile Workstation, Dell Precision 5530 Mobile Workstation, Dell Precision 7530 Mobile Workstation, and Dell Precision 7730 Mobile Workstation, which come with a much lighter and thinner design, and offer a premium build.
Descenders is an extreme downhill free-riding game currently in Early Access and their first major update just went live. Needs a small manual fix on Linux.
Opera has promoted its upcoming Opera 54 web browser to the beta channel, giving us a glimpse of what to expect from the final version, due for release sometime next month.
If you want to try something other than Linux, have a look at TrueOS. It is a BSD distribution specifically aimed at desktop users.
I work part-time as a data auditor. Think of me as a proofreader who works with tables of data rather than pages of prose. I haven't seen an error-free data table, ever. Cleaning up these problems isn't hard, but there are non-technical obstacles to finding them. The first is everyone's natural reluctance to deal with data errors.
Routers are important. They provide the link between one network (in this case, our home network) and another one (in this case, the internet, via our ISP's network). High among a router's other functions, many also perform as a modem, but routers often do more things, sometimes many more things, including traffic logging, acting as a WiFi access point, providing a VPN for external access to your internal network, child access, firewalling, and all the rest. Does this matter, you ask? Well, if other people can get into your system, they have easy access to attacking your laptops, phones, network drives, and the rest. They can access and delete unprotected personal data. They can plausibly pretend to be you. They can use your network to host illegal data or launch attacks on others. Basically, all the bad things.
Introducing EasyChem, a program that generates publication-quality images of
This article was co-authored by Don Marti, Georg Link, Matt Germonprez, and Sean Goggins.
Conventional metrics of open source projects lack the power to predict their impact. The bad news is, there is no significant correlation between open source activity metrics and project impact. The good news? There are paths forward.
VIDEO: OpenStack Foundation Executive Director Jonathan Bryce and Chief Operating Officer Mark Collier discuss how the open-source organization is still thriving, even as corporate sponsorship changes and attendance at events declines.
CERN relies on open source technology to handle huge amounts of data generated by the Large Hadron Collider... It boils down to the fundamental principle that open source is not just about sharing code, it’s about collaboration among people to share knowledge and achieve what no single individual, organization, or company can achieve alone. That’s the Higgs boson of the open source world.
'Member that innocent, pre-Zuckerberg time?
The source code to the Eudora email client is being released by the Computer History Museum, after five years of discussion with the IP owner, Qualcomm.…
Computer vision is a way to use artificial intelligence to automate image recognition—that is, to use computers to identify what's in a photograph, video, or another image type. The latest version of Luminoth (v. 0.1), an open source computer vision toolkit built in Python and using Tensorflow and Sonnet, offers several improvements over its predecessor:
This article explains how to permanently change / spoof the MAC addresses of network interfaces. For this purpose, we'll use Macchanger, an utility for manipulating MAC addresses, for which we'll create a systemd unit to start it automatically on boot.
You can use the random number generator provided by the Go programming language to generate difficult-to-guess passwords comprised of ASCII characters. Although the code presented in this article is easy to read, it's best if you already know the basics of Go to understand it. If you're new to the programming language, take the Tour of Go to learn more, then come back here.
Linux has a good range of open source software which helps users to organize their e-book collection, catch up on a novel, or even to create and publish their own e-book. To provide an insight into the free software that is available, we have compiled a list of 7 of our favorite e-book software. Hopefully, there will be something of interest here for anyone who wants to read, organize and create electronic books. We give our highest recommendation to Calibre and Booktype.
Even though Linux is a great operating system with widespread hardware and software support, the reality is that sometimes you have to use Windows, perhaps due to key apps that won't run under Linux. Thankfully, dual-booting Windows and Linux is very straightforward—and I'll show you how to set it up, with Windows 10 and Ubuntu 18.04, in this article.
fellow journalist and long-time voice of the Linux community Robin "Roblimo" Miller has passed away. Miller was perhaps best known by the community for his roll as Editor in Chief of Open Source Technology Group, the company that owned Slashdot, SourceForge.net, freshmeat, Linux.com, NewsForge, and ThinkGeek from 2000 to 2008. He went on to write and do video interviews for FOSS Force, as well as authoring books of his own.
As Marcel Gagne so perfectly summarized, "Robin was one of those people who could make you laugh while teaching you a thing or two." Roblimo, you will be missed.
As promised earlier this week, Red Hat released software mitigations for all of its affected products against the recently disclosed Spectre Variant 4 security vulnerability that also affects its derivatives, including CentOS Linux.
Update: The same fellow I spoke to at Paradox just emailed in again, so we're now able to confirm Linux will be supported for Imperator: Rome! Here's what they said: Paradox has confirmed that it plans to offer Imperator: Rome for Linux platforms
When people write privacy guides, for the most part they are written from the perspective of the client. Whether you are using HTTPS, blocking
tracking cookies or going so far as to browse the internet over Tor, those privacy guides focus on helping end users protect themselves
from the potentially malicious and spying web. in this article, I describe how to go one step further and make it possible for your
users to use your services completely anonymously via Tor hidden services.
Ansible is a simple automation tool that automates software applications deployment, cloud provisioning, and configuration management. It's a server orchestration tool that helps you to manage and control a large number of server nodes from single places called 'Control Machines'. In this tutorial, we will learn how to deploy a new user and enable the SSH Key-Based authentication using the automation tool Ansible.
There are 2 forums.
||Jan 23, 2018 1:16 PM
|LXer Meta Forum
||Jul 1, 2017 7:43 PM
Showing articles from all categories. Filter: