Canonical has released today new updates for all of its supported Ubuntu Linux operating system series to mitigate the recently disclosed Microarchitectural Data Sampling (MDS) security vulnerabilities in Intel CPUs.
Video: Zombieload, another Intel processor side-channel attack, just like Meltdown and Spectre before it, poses a security threat for Linux systems.
Twenty years ago, I started using free and open source software. Soon after, I started asking questions on dedicated forums, learned how to use IRC to chat with developers, and contributed my first bug reports. As my contributions increased, I made a career move from industry to open source software. Over the past 20 years, I've learned a lot about using and contributing to free and open source software and working with communities and developers. Here are 10 of the key areas you'll find in an open source project and some tips for managing them better. read more
Ceph and Gluster are both systems used for managing distributed storage. Both are good choices for managing your data, but which one is more suited to you?
Estone’s IP65 protected “PPC-4107” panel PC is touted for its easy installation. It runs Linux or Android on an i.MX6 and offers GbE with PoE, WiFi/BT, and a 7-inch, capacitive HD touchscreen. Estone Technology has announced a PPC-4107 panel PC designed primarily for wall-mounted residential, commercial, and industrial building automation, as well as HVAC monitoring […]
Learners of all types are drowning in the deluge of information and learning resources available online. This barrage of information often leaves people confused about how to find the right course, tutorial, book, or other material that can help simplify their learning journey and achieve their personal objectives and needs. read more
Secure Shell (SSH) is a cryptographic network protocol used for a secure connection between a client and a server. In the recent versions of Raspbian, the SSH access is disabled by default but it can be easily enabled.
Security researchers have publicly disclosed today a series of potential security vulnerabilities affecting Intel microprocessors, which may allow information disclosure on users' machines.
KDE Plasma Browser Integration is a cool feature added in Plasma 5.13 of which some users are probably not aware, so I thought I'd explain what this does and how to enable it.
Many businesses use Excel files to manage price lists, product inventories, advertising settings, financial data, and more. However, due to the ubiquity of the web, there is a growing need for organizations to display this type of data on websites or process it in third-party tools. Converting Excel data into web-based formats like JSON and HTML makes that possible. read more
Recently, Andrey Ryabinin tried to fix what he felt was a problem with how CGroups dealt with low-memory situations. In the current kernel, low-memory situations would cause Linux to recuperate memory from all CGroups equally. But instead of being fair, this would penalize any CGroup that used memory efficiently and reward those CGroups that allocated more memory than they needed...
Cast to TV, a GNOME Shell extension to cast videos (with transcoding if needed), music and pictures to Chromecast, web browser or media player app over the local network, has had a new major release.
One of the most popular and effective enterprise use-cases which leverage analytics today is log analytics. Nearly every organization today has multiple systems and infrastructure running day in and day out. To effectively keep their business running, these organizations need to know if their infrastructure is performing to its maximum potential. Finding out involves analyzing system and application logs and maybe even applying predictive analytics on log data. read more
Most IPs these days are automatically assigned through DHCP by either your ISP or your home router. But there may come a time when you wish to opt for a static IP address and you will want to change it. It may be that you are configuring a home LAN and you don't want to use DHCP or simply want a static IP address that you can access from outside your home. In this tutorial we will learn how we can change the IP address in RedHat Enterprise Linux 8.0.
'Wouldn't it be ironic if all paths used by open-source developers lead to Microsoft?' Anyone still worry about the Microsoft monopoly? Executive director of the Eclipse Foundation Mike Milinkovich does.…
News briefs for May 14, 2019.
Linux Kernel in Windows 10, Ubuntu 19.10 "Eoan Ermine", Chromebook Linux Google I/O News, KDE Plasma Wallpaper Contest, Kaidan, OpenIndiana, PDF Arranger, LibreSignage, D9VK, Easy Anti-Cheat, BattlEye
In part one of this series, we began by using Python and Apache Spark to process and wrangle our example web logs into a format fit for analysis, a vital technique considering the massive amount of log data generated by most organizations today. read more
In this article, I will show only the installation of TrueType fonts in Ubuntu 18.04 LTS. You can apply the same method for installing other types of fonts.
researchers are disclosing a remote attack that would potentially allow a hacker to take over any (Cisco) 1001-X router and compromise all the data and commands that flow through it.