Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 714 715 716 717 718 719 720 721 722 723 724 ... 7359 ) Next »
Simple Network Management Protocol - Not As Simple As You Would Suggest
The Simple Network Management Protocol (SNMP) has been an integral part of monitoring network environments since its introduction in 1988. It has established itself as the de facto standard in network monitoring. Many manufacturers support the protocol and have implemented an SNMP agent on their network devices.
How to Install Puppet Server and Agent on Debian 11
Puppet is a centralized configuration management and automation tool. In this guide, you will install and configure the Puppet server and agent on the Debian 11 Bullseye.
Linux has been bitten by its most high-severity vulnerability in years
Linux has yet another high-severity vulnerability that makes it easy for untrusted users to execute code capable of carrying out a host of malicious actions, including installing backdoors, creating unauthorized user accounts, and modifying scripts or binaries used by privileged services or apps.
Search for (exact) strings; report line, column and context
GNU grep is a great utility but it can only report a search target's line number. Because field location is often important in my data work, I wrote a function that searches for an exact string and returns the string's line and field location (field number and field name) plus the data item containing the string, with the string coloured red.
Top Nitrux Applications (Maui) Everyone Should Try
This article showcases some of the excellent Maui native applications that come as default in Nitrux OS Linux distribution.
Disney and Pixar’s “Turning Red” movie Browser Wallpapers only available on Firefox for Android and iOS
Last month we created new Firefox desktop colorways celebrating Disney and Pixar’s “Turning Red” streaming only on Disney+ March 11 (subscription required. 18+ to subscribe). It’s a fun way to show your personality by changing the way your Firefox browser looks, with colors and moods inspired by some of the main characters in the film.
DataStax updates K8ssandra to help Cassandra operate around the world
DataStax has released a new open-source Kubernetes operator for Cassandra, the wide-column store distributed database about to work across multiple clusters for the first time.
KDE Plasma 5.24.3 LTS Improves the Plasma Wayland Session for Multi-GPU Systems
The KDE Project released today KDE Plasma 5.24.3 as the third point release to the latest and greatest KDE Plasma 5.24 LTS desktop environment series to address more bugs and add various changes for a more stable and reliable Plasma desktop experience.
Program in Visual and Modular Blocks in Python
PyFlow is an interactive Python development tool structured in open source graphs. With PyFlow you can create code blocks in which you can edit and run Python code, you can move and resize blocks in an infinite 2D plane. Just link the blocks to highlight dependencies, Pyflow will automatically run your blocks in the correct order.
How to monitor Windows systems with Checkmk in a Docker container
This tutorial will show you step-by-stop on how to run Checkmk in a Docker container.
How to auto-create a 1 GB or large file in Linux
What would you do if someone asked you to create a file size of 1 GB or more in Linux?
Bash script: Pause script before proceeding
Normally, a Bash script will execute each line of code the moment it reaches it, then immediately move on to the next. But it is also possible to add pauses to a Bash script in order to delay it or allow the user time to respond to a prompt, etc.
A Summary of Census II: Open Source Software Application Libraries the World Depends On
It has been estimated that Free and Open Source Software (FOSS) constitutes 70-90% of any given piece of modern software solutions. FOSS is an increasingly vital resource in nearly all industries, public and private sectors, among tech and non-tech companies alike. Therefore, ensuring the health and security of FOSS is critical to the future of nearly all industries in the modern economy.
Compact Elkhart Lake system loads up on USB and serial ports
Nexcom’s rugged, Linux-ready “NISE 109” embedded PC combines Intel’s Elkhart Lake with up to 16GB DDR4, 2x GbE, 6x USB, 4x COM, 2.5-inch SATA, DP, HDMI, M.2, and mini-PCIe.
Keep an eye on these versions – Comparing the performance of Oracle Linux 7 vs Oracle Linux 8 using the Phoronix Test Suite
The Phoronix Test Suite (PTS)[1] is a comprehensive testing and benchmarking platform for assessing the performance of Linux systems. In this context, while comparing the performance of Oracle Linux 7 (OL7) and Oracle Linux 8 (OL8), where both are using the same kernel version, we noticed substantial performance deltas ranging up to 30% between the two. To investigate these deltas, we performed detailed analysis to identify the reasons. The resulting analysis has helped us to be cognizant of the importance of tool-chain versions and builds when making performance comparisions.
Open Source Zone grinds away at patent trolls
United Patents, Microsoft, the Linux Foundation, and Open Invention Network are beating back open-source patent trolls.
The March 2022 Issue of the PCLinuxOS Magazine
The PCLinuxOS Magazine staff is pleased to announce the release of the March 2022 issue.
3 Most Secure Linux Web Browsers That Protect Your Privacy
When it comes to a web browser or browsing apps on Linux, there are many choices. In this article, we’re looking at the most secure browsers for Linux that also protect your privacy.
How to Store Docker Container Data In Docker Volumes
In this guide, you will learn how Docker volumes interact with containers. You will do this by creating new containers and using volumes to store and share data between them. Then, you'll discover how to clear up space that is left behind by anonymous volumes that are automatically generated by the containers. Finally, you'll learn how to back up your Docker volumes data.
Nmap Firewall Evasion Techniques
The primary goal of firewall penetration testing is to prevent unauthorized internet access to your organization's internal network, or check to make sure your security policy is doing what you think it's doing. In order to successfully test your organization's firewall, you must think like the adversary. Collecting intelligence on the network, such as operating system and firewall type, are important to know in order to proceed with the penetration test.
« Previous ( 1 ... 714 715 716 717 718 719 720 721 722 723 724 ... 7359 ) Next »