Showing headlines posted by bob

« Previous ( 1 ... 473 474 475 476 477 478 479 480 481 482 483 ... 1141 ) Next »

OpenSUSE 15 Leap Released, Facebook and Google Already Face GDPR Complaints, GNOME 3.29.2 and More

News briefs for May 25, 2018.

Promo Sprint Report: What We Did and How You Can Help Us

February was a big month for the Promo team - we held a long-awaited sprint in Barcelona, Spain from the 16th to 18th. The aim of the sprint was to look at information we had collected over the prior years, interpret what it meant, and use it to discuss and plan for the future. The activities we came up with should help us accomplish our ultimate goal: increasing KDE's visibility and user base.

This Week in Open Source News: The Linux Foundation Joins IBM In Pledging to Help Combat Natural Disasters

  • Linux.com - Original Content (Posted by bob on May 26, 2018 8:31 AM EDT)
  • Story Type: Roundups; Groups: IBM, Linux
This week in open source and Linux news, The Linux Foundation joins IBM, the United Nations, and others in supporting an effort to use technology to better predict natural disasters.

The Perfect Server - Ubuntu 18.04 (Bionic Beaver) with Apache, PHP, MySQL, PureFTPD, BIND, Postfix, Dovecot and ISPConfig 3.1

This tutorial shows how to install an Ubuntu 18.04 LTS (Bionic Beaver) server with Apache, BIND, Dovecot and ISPConfig 3.1. ISPConfig is a web hosting control panel that allows you to configure the following services through a web browser: Apache or nginx web server, Postfix mail server, Courier or Dovecot IMAP/POP3 server, MySQL, BIND or MyDNS nameserver, PureFTPd, SpamAssassin, ClamAV, and many more. This setup covers the installation of Apache (instead of nginx), BIND (instead of MyDNS), and Dovecot (instead of Courier).

Getting started with the Python debugger

The Python ecosystem is rich with many tools and libraries that improve developers’ lives. For example, the Magazine has previously covered how to enhance your Python with a interactive shell. This article focuses on another tool that saves you time and improves your Python skills: the Python debugger. Python Debugger The Python standard library provides […]

An FUQ for the GDPR

Whether you like the GDPR or not (and there are reasons for both, which we'll get into shortly), one thing it has done for sure is turn privacy into Very Big Deal. This is good, because we've had damned little of it on the internet and now we're going to get a lot more. That's worth celebrating, everybody. Merry Privmas!

15 books for kids who (you want to) love Linux and open source

  • Opensource.com; By Jen Wike Huger (Posted by bob on May 25, 2018 6:42 PM EDT)
  • Story Type: Roundups; Groups: Linux
In my job I've heard professionals in tech, from C-level executives to everyone in between, say they want their own kids to learn more about Linux and open source. Some of them seem to have an easy time with their kids following closely in their footsteps. And some have a tough time getting their kids to see what makes Linux and open source so cool. Either way, if you have a kid or know a kid that may be interested in learning more about making something with code or hardware, from games to robots, this list is for you.

Parrot 4.0 Now Available, Eudora Email Code Open-Sourced, Firefox Now Offers Two-Step Authentication and More

News briefs for May 24, 2018.

How to clean up your data in the command line

I work part-time as a data auditor. Think of me as a proofreader who works with tables of data rather than pages of prose. I haven't seen an error-free data table, ever. Cleaning up these problems isn't hard, but there are non-technical obstacles to finding them. The first is everyone's natural reluctance to deal with data errors.

How insecure is your router?

Routers are important. They provide the link between one network (in this case, our home network) and another one (in this case, the internet, via our ISP's network). High among a router's other functions, many also perform as a modem, but routers often do more things, sometimes many more things, including traffic logging, acting as a WiFi access point, providing a VPN for external access to your internal network, child access, firewalling, and all the rest. Does this matter, you ask? Well, if other people can get into your system, they have easy access to attacking your laptops, phones, network drives, and the rest. They can access and delete unprotected personal data. They can plausibly pretend to be you. They can use your network to host illegal data or launch attacks on others. Basically, all the bad things.

Visualizing Molecules with EasyChem

Introducing EasyChem, a program that generates publication-quality images of molecular structures.

How to measure the impact of your open source project

  • Opensource.com (Posted by bob on May 25, 2018 7:47 AM EDT)
  • Story Type: News Story
This article was co-authored by Don Marti, Georg Link, Matt Germonprez, and Sean Goggins. Conventional metrics of open source projects lack the power to predict their impact. The bad news is, there is no significant correlation between open source activity metrics and project impact. The good news? There are paths forward. read more

How CERN Is Using Linux and Open Source

  • Linux.com; By Swapnil Bhartiya (Posted by bob on May 25, 2018 5:44 AM EDT)
  • Story Type: News Story; Groups: Linux
CERN relies on open source technology to handle huge amounts of data generated by the Large Hadron Collider... It boils down to the fundamental principle that open source is not just about sharing code, it’s about collaboration among people to share knowledge and achieve what no single individual, organization, or company can achieve alone. That’s the Higgs boson of the open source world.

Finally: Historic Eudora email code goes open source

  • The Register (Posted by bob on May 25, 2018 4:43 AM EDT)
  • Story Type: News Story
'Member that innocent, pre-Zuckerberg time? The source code to the Eudora email client is being released by the Computer History Museum, after five years of discussion with the IP owner, Qualcomm.…

Open source image recognition with Luminoth

  • Opensource.com (Posted by bob on May 25, 2018 3:31 AM EDT)
  • Groups: Python; Story Type: News Story
Computer vision is a way to use artificial intelligence to automate image recognition—that is, to use computers to identify what's in a photograph, video, or another image type. The latest version of Luminoth (v. 0.1), an open source computer vision toolkit built in Python and using Tensorflow and Sonnet, offers several improvements over its predecessor: read more

Creating random, secure passwords in Go

  • Opensource.com (Posted by bob on May 25, 2018 1:02 AM EDT)
  • Story Type: News Story
You can use the random number generator provided by the Go programming language to generate difficult-to-guess passwords comprised of ASCII characters. Although the code presented in this article is easy to read, it's best if you already know the basics of Go to understand it. If you're new to the programming language, take the Tour of Go to learn more, then come back here. read more

How to dual-boot Linux and Windows

Even though Linux is a great operating system with widespread hardware and software support, the reality is that sometimes you have to use Windows, perhaps due to key apps that won't run under Linux. Thankfully, dual-booting Windows and Linux is very straightforward—and I'll show you how to set it up, with Windows 10 and Ubuntu 18.04, in this article.

RIP Robin "Roblimo" Miller

fellow journalist and long-time voice of the Linux community Robin "Roblimo" Miller has passed away. Miller was perhaps best known by the community for his roll as Editor in Chief of Open Source Technology Group, the company that owned Slashdot, SourceForge.net, freshmeat, Linux.com, NewsForge, and ThinkGeek from 2000 to 2008. He went on to write and do video interviews for FOSS Force, as well as authoring books of his own.

As Marcel Gagne so perfectly summarized, "Robin was one of those people who could make you laugh while teaching you a thing or two." Roblimo, you will be missed. 

Tor Hidden Services

When people write privacy guides, for the most part they are written from the perspective of the client. Whether you are using HTTPS, blocking tracking cookies or going so far as to browse the internet over Tor, those privacy guides focus on helping end users protect themselves from the potentially malicious and spying web. in this article, I describe how to go one step further and make it possible for your users to use your services completely anonymously via Tor hidden services.

Setup New User and SSH Key Auth. using Ansible on Ubuntu 18.04

Ansible is a simple automation tool that automates software applications deployment, cloud provisioning, and configuration management. It's a server orchestration tool that helps you to manage and control a large number of server nodes from single places called 'Control Machines'. In this tutorial, we will learn how to deploy a new user and enable the SSH Key-Based authentication using the automation tool Ansible.

« Previous ( 1 ... 473 474 475 476 477 478 479 480 481 482 483 ... 1141 ) Next »