You asked for it! You begged for it! Then you gave up! And now it's HERE! After nearly 10 years of development, the World Wide Web Consortium (W3C) has promoted the HTML5 specification to Recommendation status, its highest level of maturation, effectively making the markup language a formal web standard.…
LinuxSecurity.com: Kali Linux is a security-focused operating system you can run off a CD or USB drive, anywhere. With its security toolkit you can crack Wi-Fi passwords, create fake networks, and test other vulnerabilities. Here's how to use it to give your own a network a security checkup.
Inverse Path is readying a tiny, open-spec “USB Armory” SBC that runs Linux or Android on an i.MX53, and offers Trustzone, secure boot, and USB emulation. The USB Armory single board computer, which Inverse Path plans to launch this quarter on the Crowd Supply crowdfunding site, is not your ordinary open source hacker SBC. For […]
Interested in keeping track of what's happening in the open source cloud? Opensource.com is your source for what's happening right now in OpenStack, the open source cloud infrastructure project. read more
GNOME is cool and beautiful, and the default Adwaita theme has matured greatly since it was introduced in GNOME 3.0. In fact, the Adwaita theme in Fedora 21 is now […]
A mobile, Android A/V robot on Kickstarter called the “Keecker” offers surround sound, a pico projector, a panoramic camera, sensors, and 1TB of storage. The word “robot” is never used on the Keecker Kickstarter page, but the device rolls around like other household bots. The Keecker navigates with the help of smartphone instructions, as well […]
In this week's edition of our open source news roundup, we take a look at open source in Europe, Adobe dropping support for Linux, open source drones, and more! Open source news for your reading pleasure. October 11 - 17, 2014 read more
There is no shortage of Linux distributions to serve specific markets and use cases. In the security market, a number of Linux distributions are widely used, including Kali Linux, which is popular with security penetration testers.
When you download a file (e.g., an installer, an ISO image, or a compressed archive) from the web, the file can be corrupted under a variety of error conditions, e.g., due to transmission errors on the wire, interrupted download, faulty storage hardware, file system errors, etc. Such failure cases aside, a file can also be […]Continue reading... The post How to verify the authenticity and integrity of a downloaded file on Linux appeared first on Xmodulo. Related FAQs: How to PGP encrypt, decrypt or digitally sign files via GnuPG GUI How to create an encrypted zip file on Linux How to manage passwords from the command line on Linux
Mark Hinkle is on the forefront of all things open source and cloud. He is currently responsible for Citrix efforts around Apache CloudStack, Open Daylight, Xen Project, and XenServer. At the All Things Open Conference, Mark’s Crash Course In Cloud Computing will teach how to pragmatically adopt cloud practices and gain cloud value. read more
I mentioned earlier that I’d update on this, and here we go. Our friends over in the Red Hat security team have posted POODLE – An SSL 3.0 Vulnerability (CVE-2014-3566), […]
Forlinx’s open source Linux “OK335xS-II” SBC and soldered-on COM offer a TI Sitara AM3354 Cortex-A8 SoC, dual CAN ports, and industrial temperature support. According to China-based Forlinx Embedded Technology, the OK335xS has been a “hot seller” in China since it was released earlier this year. Now, the company is seeking a wider audience for its […]
Remember when Sun Microsystems proclaimed that "the network is the computer"? Many people guffawed at that proclamation. What was once a clever slogan is now a reality thanks to the proliferation of web-based applications. read more
If there is something that you never want to happen on your Linux system, that is having hard drives die on you without any warning. Backups and storage technologies such as RAID can get you back on your feet in no time, but the cost associated with a sudden loss of a hardware device can […]Continue reading... The post How to check hard disk health on Linux using smartmontools appeared first on Xmodulo. Related FAQs: How to monitor power usage in Linux How to monitor system temperature on Linux How to install and configure Nagios on Linux What are useful CLI tools for Linux system admins How to create a software RAID-1 array with mdadm on Linux
We are proud to announce that Red Hat is now accepting nominations for the Women in Open Source Award. This award is the first of its kind, created to shine a spotlight on women making important contributions to an open source project, to the open source community, or through the use of open source methodology. read more
Good morning everyone! Another security vulnerability is hitting the tech (and mainstream!) press, and we want to make Fedora users get straight, simple information. This one is CVE-2014-3466, and the […]
Recent high-profile defects do not support the view that open source is less secure than closed source.
A Kickstarter project called “Anonabox” offers a tiny Tor router for anonymous Internet use, running OpenWRT Linux on a MediaTek MT7620n WiFi chipset. The Anonabox is a “completely open source and open hardware” networking device that provides anonymous Internet access and encryption, says Chico, Calif.-based project leader August Germar on the Anonabox Kickstarter page. The […]
Lulu.com helped define modern publish-on-demand services. In my mind, they did define them; I remember printing my first photobook and sending it to Lulu to be sent back, spiral-bound. I was amazed. I had essentially put together a small markup language (DSL, or Domain Specific Language, even), processed it through a Scheme script, and spit out LaTeX that produced reasonably pretty pages that could be converted to PDF and submitted for publication. I think I bought two copies. read more
How many times you have been hit by unit tests failing because of environment differences between you and other team members? How easy is it to build your project and have it ready for development? Vagrant provides a method for creating repeatable development environments across a range of operating systems for solving these problems.