Showing headlines posted by tuxchick

« Previous ( 1 ... 27 28 29 30 31 32 33 34 35 36 37 ... 84 ) Next »

The Most Energy-Efficient Linux Computers

For those that missed it, the Green500 list was updated for June 2012. IBM's BlueGene/Q super-computer hardware dominates but there's a few surprises besides that...

Secure programming with the OpenSSL API, Part 1: Overview of the API

Learning how to use the API for OpenSSL -- the best-known open library for secure communication -- can be intimidating, because the documentation is incomplete. Fill in the gaps, and tame the API, with the tips in this article. After setting up a basic connection, see how to use OpenSSL's BIO library to set up both a secured and unsecured connection. And learn a bit about error detection as well.

In Response to Jon 'maddog' Hall: Diversity is Everything in Linux

Jon "maddog" Hall wrote a beautiful essay in honor of Alan Turing that highlights the terrible, corrosive consequences of attacking people for who they are.

Asus Transformer Prime

The Transformer Prime is a killer piece of hardware, no doubt...but can it replace a full-fledged Linux Netbook?

Siduction 2012.1 update has KDE SC 4.8.4

The developers of the Debian-based Siduction Linux distribution have released version 2012.1.1, which offers minor corrections and includes KDE SC 4.8.4. In addition to the KDE desktop, the update also offers XFCE and LXD

Four Lightweight Distros Compared

In the past year I've reviewed four lightweight Linuxes for OS News: VectorLinux, Puppy Linux, Lubuntu, and Damn Small Linux. This article compares the four distributions. I invite your comments in response: what are your own experiences with these and competing lightweight distros?

Introducing the 3.3 and 3.4 Linux kernels

In March 2012, version 3.3 of the Linux kernel was released (followed in by version 3.4 in May). In addition to a plethora of small features and bug fixes, several important changes have arrived with these releases, including the merging of the Google Android project; merging of the Open vSwitch; several networking improvements (including the teaming network device); and a variety of file system, memory management, and virtualization updates. Explore many of the important changes in versions 3.3 and 3.4, and have a peek at what's ahead in 3.5.

Windows 8 Secure Boot: Two Linux Distros Respond

Controversy has been raging over Microsoft's Windows 8 Secure Boot plans ever since they were first revealed last fall, and there's still no sign that that will change anytime soon. Now the leading Linux distributions are beginning to respond with an outline of how they plan to deal with the restrictions imposed by Microsoft's plans.

Intel Keeps On PCI Express D3 Cold Power Savings

It looks like for the Linux 3.6 kernel there will finally be D3 Cold power-savings support for PCI Express devices under Linux...

Details on Ubuntu's UEFI secure boot plan

So, at this point, despite the fact that we clearly don't want to be part of delivering locked-down PCs to users, it looks as though we need to use a boot loader with a more liberal licence in order to protect ourselves from accidents.

Happy Fifth, Scott Ruecker!



LXer Feature: 22-Jun-2012

Can you believe it? Our esteemed Editor-in-Chief has been toiling at LXer for five freaking years!

Nvidia Responds To F-Bomb From Linus Torvalds

Linux creator Linus Torvalds may call Nvidia “the single worst company” the Linux community had ever dealt with. But the chipmaker makes no apologies for its approach to the open source operating system.

LinuxCon Japan: Making kernel developers less grumpy

Greg Kroah-Hartman is on something of a mission: reducing the grumpiness factor among kernel developers, and maintainers in particular. His keynote at LinuxCon Japan was meant to help the audience understand what the maintainers do, and how contributors' actions can sometimes result in grumpy maintainers. But, if contributors can follow the rules and make things easier on him, there are a number of things that he will promise to do on their behalf.

Microsoft Threat Management Gateway classifies donating to the FSF as gambling

A picture is worth a thousand words!

A Nasty md/raid bug

There is a rather nasty RAID bug in some released versions of the Linux kernel. It won't destroy your data, but it could make it hard to access that data.

5 new affiliates for the OSI

  • The H Open Source (Posted by tuxchick on Jun 18, 2012 11:33 PM EDT)
  • Story Type: News Story
The Open Source Initiative's affiliate scheme is five members stronger and now open to any eligible open source organisation to apply for membership

Newegg, Norma and the Case of the Squealing Linux PC

With all the recurring debates and "year of" discussions here in the Linux blogosphere, it's hard not to suffer frequent pangs of deja vu even on the best of days. Last week, however, was not the best of weeks, at least not for one Linux user by the name of Norma, who had an experience eerily reminiscent of one Linux Girl remembers writing about back in 2010.

Track KVM guests with libvirt and the Linux audit subsystem

Libvirt is an important tool for managing virtualized environments on Linux hosts. An audit trail of events that occur on the host during libvirt's execution is often necessary for monitoring, compliance, forensics, and other purposes. This article describes how to use the Linux audit subsystem on the host to track operations performed by libvirt and how to correlate the events with other host events to provide a consistent and comprehensive view of changes performed through libvirt.

How I Store My 1's and 0's: ZFS + Bargain HP Microserver = JOY

I have a large collection of 0's and 1's and am eager not to lose them. It’s a very large collection – storing them in the cloud would cost a few hundred dollars a month and even if I paid that, the pipe between my house and the cloud isn’t fat enough to access them efficiently.

Secure Linux: Part 1. SELinux – history of its development, architecture and operating principles

  • IBM Developerworks; By Evgeny Ivashko (Posted by tuxchick on Jun 18, 2012 12:40 AM EDT)
  • Story Type: Tutorial; Groups: Linux
The project involving the development of Security-Enhanced Linux® (SELinux), a system offering mandatory access control, was initiated inside the US National Security Agency (NSA). The companies Secure Computing Corporation (SCC) and MITRE were directly involved in the development, along with a number of research laboratories. It was released as a general access software product (with the source code distributed under a GPL license) in December 2000. A special press release was issued by NSA to mark the occasion (see Resources). By that time, 10 years had already been spent developing, analyzing, and testing the basic SELinux architecture as part of several semi-research/semi-military projects

« Previous ( 1 ... 27 28 29 30 31 32 33 34 35 36 37 ... 84 ) Next »