Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 3 4 5 6 7 8 9 10 11 12 13 ... 5393 ) Next »

Insecure Android apps put connected cars at risk

Android applications that allow millions of car owners to remotely locate and unlock their vehicles are missing security features that could prevent tampering by hackers, according to Kaspersky Lab researchers.

Video: Linus Torvalds on How to Build a Successful Open Source Project

  • Linux.com; By Libby Clark (Posted by bob on Feb 18, 2017 3:48 AM EDT)
  • Story Type: News Story; Groups: Linux
Linux creator Linus Torvalds took the stage at Open Source Leadership Summit this week to share some of his secrets to success in building one of the world’s largest and most successful open source projects.

How to install pandom: a true random number generator

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Feb 18, 2017 1:54 AM EDT)
  • Groups: Kernel, Linux; Story Type: News Story
This tutorial explains how to install pandom: a timing jitter true random number generator maintained by ncomputers.org. The built-in Linux kernel true random number generator provides low throughput under modern circumstances, as for example: personal computers with solid state drives (SSD) and virtual private servers (VPS). This problem is becoming popular in Linux implementations, because of the continuously increasing need for true random numbers, mainly by diverse cryptographic purposes.

Apple Will Fight 'Right to Repair' Legislation

Manufacturers have lobbied hard against right to repair legislation in the past. Last year, a bill headed through the New York statehouse was killed in part due to lobbying from Apple and IBM, among other manufacturers. But nationwide, the legislation appears to have much more momentum this year as more states introduce right to repair bills. Last month, the American Farm Bureau Federation, an influential political organization representing farmers, officially endorsed right to repair legislation.

Linux Lite Among The Best Lightweight Linux Distributions

  • LinuxAndUbuntu.com; By Mohd Sohail (Posted by MohdSohail on Feb 17, 2017 10:58 PM EDT)
  • Groups: GNU, Linux
Another distro. Yeah, I know. I am getting tired too of all these distros popping out of everywhere. But I am still interested in trying them out. Each and every distro has a different reason for its existence. Today, we will look at Linux lite 3.2. This is neither a distro aiming to be a lightweight distro nor a distro trying to unleash the power of Linux with all apps preloaded. Instead, It tries to strike that perfect balance between them. Now, almost all of the distros aim to do that then, what is so special about this distro which makes it unique. Well, let me introduce to the distro first and I think why it achieved so much more than other distros becomes clear after that.

Saving laptop power with powertop

  • Fedora Magazine (Posted by bob on Feb 17, 2017 9:03 PM EDT)
  • Groups: Fedora; Story Type: News Story
If there’s one thing you want from a laptop, it’s long battery life. You want every drop of power you can get to work, read, or just be entertained on a long jaunt. So it’s good to know where your power is going. You can... Continue Reading →

Apply Multiple Hald-CLUT Presets in a Single Action with a Bash Shell Script

  • Scribbles and Snaps; By Dmitri Popov (Posted by dmpop on Feb 17, 2017 7:49 PM EDT)
  • Story Type: Tutorial
Hald-CLUT files offer a straightforward way to apply color corrections to an image. But what if you have a handful of Hald-CLUT files and you want to apply them all to a specific photo?

Using Python to find corrupted images

  • Opensource.com (Posted by bob on Feb 17, 2017 6:35 PM EDT)
  • Groups: Python; Story Type: News Story
Catch up on this series: Part 1: Automating repetitive tasks for digital artists with Python Part 2: Python file-management tricks for digital artists read more

Understanding the difference between sudo and su

  • Howtoforge Linux Howtos und Tutorials (Posted by bob on Feb 17, 2017 5:20 PM EDT)
  • Groups: Linux; Story Type: News Story
In this article, we will discuss in detail the 'su' command as well as how it differs from the 'sudo' command. The main work of the su command is to let you switch to some other user during a login session. In other words, the tool lets you assume the identity of some other user without having to logout and then login (as that user).

An Introduction to Regular Expressions for New Linux Users

  • Linux.com; By Jack Wallen (Posted by bob on Feb 17, 2017 4:06 PM EDT)
  • Story Type: News Story; Groups: Linux
Regular expressions are a powerful means for pattern matching and string parsing that can be applied in so many instances. With this incredible tool you can...

3D design contest for medical tools in Africa

  • Opensource.com (Posted by bob on Feb 17, 2017 2:52 PM EDT)
  • Story Type: News Story
The moment the open source RepRap 3D printer was created, its potential for helping the developing the world was evident. read more

System76 Saying Goodbye to Bland Design

Considering that System76 chose to unveil its new design plans to The Linux Gamer, we can't help but wonder if a System76 mean Steam Machine isn't in the works.

Protecting Linux devices with verified boot, from ROM to Userspace

Amid growing concern regarding escalating attacks on Linux-based devices, a well-attended talk at ELC Europe 2016 focused on the topic of verified boot schemes. Amid growing attacks on Linux devices, the 2016 Embedded Linux Conference demonstrated a renewed focus on security. One well-attended presentation at ELC Europe covered the topic of verified boot schemes. In […]

BeyondCorp: A New Approach to Enterprise Security (2014)

  • usenix; By Rory Ward and Betsy Beyer (Posted by mbaehrlxer on Feb 17, 2017 11:12 AM EDT)
  • Story Type: Security; Groups: Cloud
Virtually every company today uses firewalls to enforce perimeter security. However, this security model is problematic because, when that perimeter is breached, an attacker has relatively easy access to a company’s privileged intranet. As companies adopt mobile and cloud technologies, the perimeter is becoming increasingly difficult to enforce. Google is taking a different approach to network security. We are removing the requirement for a privileged intranet and moving our corporate applications to the Internet.

Ubuntu 16.04.2 LTS released -Find Out More

Ubuntu 16.04.X segment line has gotten its' next maintenance and bug-fix update, Ubuntu 16.04.2, so basically it is the second point update after the release of Ubuntu 16.04 LTS final for Desktop, Server, Cloud-based ones as well as the different flavored versions of Ubuntu like Kubuntu, Lubuntu, Mythbuntu, Xubuntu, Ubuntu Kylin, Ubuntu MATE, Ubuntu GNOME have also been availed with their updated images of 16.04.2 version.[....]

How to Stop and delete Linux Raid array

You must have seen my earlier post about replacing faulty disk in Linux raid , however if something goes wrong with system sometimes you need to stop and delete Linux Raid array. We will go first about how we can stop linux raid array. here is sample output of status of Raid array:

Microsoft's monthlong patch delay could pose risks

Microsoft has decided to bundle its February patches together with those scheduled for March, a move that at least some security experts disagree with.

Why I’m Not a Full-Throttle FOSS Advocate

"Software Freedom" shouldn't mean "use free software or else." It should mean you are free to use the software you choose.

AT&T, Intel, Google, Microsoft, Visa, and More to Speak at Open Networking Summit 2017

The Linux Foundation has announced keynote speakers and session highlights for Open Networking Summit, to be held April 3-6, 2017 in Santa Clara, CA.

How Google reinvented security and eliminated the need for firewalls

Over time, however, that perimeter developed holes as Google's increasingly mobile workforce, scattered around the world, demanded access to the network. And employees complained about having to go through a sometimes slow, unreliable VPN. On top of that, Google, like everyone else, was moving to the cloud, which was also outside of the castle.

« Previous ( 1 ... 3 4 5 6 7 8 9 10 11 12 13 ... 5393 ) Next »