Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 ... 7359 ) Next »
Ubuntu apt-get & apt-cache commands with practical examples
Apt-get & apt-cache are the command line package management utility in Ubuntu Linux.
Connect to your Linux VPS via SSH
If you have a new Linux VPS and you are not familiar with the procedure how to manage your server, we will show you few simple steps to connect to it for the first time
Open Source Alternatives to Magic the Gathering Online (MTGO)
Today, I am going to look at a few free alternatives to Magic Online.
Open data partnership between city and county of Durham, NC
Co-authored by Greg Marrow, Chief Information Officer at Durham County Government
Co-authored by Kerry Goode, Chief Information Officer for the City of Durham
Open data has found the most innovation at the local government level. While not taking away from te efforts of data.gov and the state initiatives, local data has more impact on the day to day lives of civil society. A wealth of city and county public data exists, but accessing it can sometimes be time consuming. Now, thanks to a new local government partnership, open data in Durham is just months away from becoming a reality.
read more
Despite Rumors, Xfce Alive & Kicking
Three times this month, Xfce came up in conversation — online, of course, and in the realm of social media and in forum discussions — and the context in which each conversation came up had the desktop on the brink of closure, with one unwitting person saying that Xfce was dead.
2014’s Five Biggest Stories Affecting FOSS
Covering FOSS and Linux isn’t nearly as exciting as it was a decade or so ago — but that’s a good thing. Back then, we were at war with nearly every proprietary software vendor on the planet and faced threats from all directions, including up and down. To be sure, we didn’t start the wars we were fighting, as PROFAL (the People’s Republic of FOSS and Linux) only wished for peaceful coexistence.
Micro-UAV controller features open, modifiable design
Gumstix announced a gen-2 micro-areal vehicle (MAV) controller based on its tiny gumstick-sized Overo COMs, and customizable via a free online design tool. The Aerocore 2 is an update to the original Aerocore controller introduced last Spring. Like most hacker-oriented UAV autopilots, both Aerocore models run Nuttx RTOS for real-time control tasks, along with Linux […]
Whether Online or Off: Be Nice to Each Other
Most of us have learned to “play along to get along” and things are good for us. But that changed with the first usable iterations of the Internet…the first BBS if you were around for that era. It was then that we began operating under the assumption that we were anonymous online. That we could say or do anything and get away with it.
OpenELEC lightweight Linux adds Kodi 14 support
Version 5.0 of the RPi-compatible, Kodi/XBMC-oriented OpenELEC Linux distro for media players upgrades to Kodi 14, adds i.MX6 support, and drops Apple TV. OpenELEC (Open Embedded Linux Entertainment Center) is a minimal, fast-booting Linux distribution popular on the Raspberry Pi that’s designed to showcase the open source Kodi (previously XBMC) media center software. The distribution […]
New evidence Sony hack was ‘inside’ job, not North Korea
One leading cybersecurity firm, Norse Corp., said Monday it has narrowed its list of suspects to a group of six people -- including at least one Sony veteran with the necessary technical background to carry out the attack, according to reports.
Free Software Foundation video explains the value of free software
In today's open source roundup: Watch the FSF's new video about free software. Plus: What causes digital piracy? And download Android 5.0 Lollipop wallpapers inspired by Google's Material Design.
2015 Network Security Predictions: 8 Things That Won’t Happen
You’ve probably read your fill of security prophets (many employed by security vendors) prognosticating about all the scary/wonderful security stuff that will happen in 2015. Rather than go down that too-traveled route, I’ve decided to take a different angle and discuss 8 buzzed-about vendor-wished-for phenomena that will not occur in the coming year, and will confuse your security posture..
Lizard Squad in the FBI blizzard
This crew is taking credit for the Sony and Xbox hack... a member of the Lizard Squad hacking group, whos handle alias is “ryanc” aka Ryan caught the attention of the FBI... Sources are sketchy and unconfirmed but “Ryan” is said to be a 16 possibly 17 year old that lives in Finland.
The cloud is so much more than shared compute resources
I got a comment the other day offering the argument that cloud computing was nothing more than a rehash of shared mainframe resources with some fancy marketing to make it sound new, but the cloud is so much more than that.
Get a college minor in open source
Remy DeCausemaker wears many hats.
read more
Is piracy really just an access and convenience problem?
People want to be able to access TV shows, movies, ebooks and other forms of content right after they are released, not months and months later. Unfortunately the media companies remain utterly clueless about this point. They insist on trying to protect outdated business models, and they still seem to think that they control when and where their content is released. Nothing could be further from the truth, however. The Internet has made their content ubiquitous, whether they like it or not.
Windows Phone Replaced with Ubuntu 14.04 LTS on Lumia 1020
Windows phone (Lumia 1020) is probably the last place where you would expect to see Ubuntu, but a user has posted images with Ubuntu running on this device and they seem to be legit.
Install Linux on used laptop
Now that Windows XP has been officially discontinued there are a huge number of Windows XP laptops for sale on eBay. Many of these run really well with a light Linux distro, such as Linux Mint XFCE.
read more
Anonabox Gets Kicked from Kickstater, Shows Up on Indiegogo with Updated Specs
Amidst all the security and anonymity concerns of the modern world, someone wanted to provide a device that would route all online traffic through Tor. It was called Anonabox and its makers went to Kickstarter for funding, but it became both a success and a glorious fail.
Before you initiate a docker pull
Written by Trevor Jay
In addition to the general challenges that are inherent to isolating containers, Docker brings with it an entirely new attack surface in the form of its automated fetching and installation mechanism, "docker pull." It may be counter-intuitive, but "docker pull" both fetches and unpacks a container image in one step. There is no verification step and, surprisingly, malformed packages can compromise a system even if the container itself is never run. Many of the CVE’s issues against Docker have been related to packaging that can lead to install-time compromise and/or issues with the Docker registry.
read more
« Previous ( 1 ... 3073 3074 3075 3076 3077 3078 3079 3080 3081 3082 3083 ... 7359 ) Next »
