Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 ... 7359 ) Next »
Ubuntu: 1909-1: MySQL vulnerabilities
Several security issues were fixed in MySQL.
Eolas Doesn’t Own Internet, Ubuntu Hacked & More…
A roundup of the major stories this week in the world of FOSS.
Debian: 2726-1: php-radius: buffer overflow
A buffer overflow has been discovered in the Radius extension for PHP. The function handling Vendor Specific Attributes assumed that the attributes given would always be of valid length. An attacker could use this assumption to trigger a buffer overflow.
Mandriva: 2013:199: squid
Multiple vulnerabilities has been discovered and corrected in squid: Due to incorrect data validation Squid is vulnerable to a buffer overflow attack when processing specially crafted HTTP requests.
Install VirtualBox 4.2.16 in Linux Mint 15
Here's how you can install VirtualBox 4.2.16 in Linux Mint 15.
Linux 3.11 May Lower Intel Power Consumption
It's still being investigated, but early indications are that the Linux 3.11 kernel is consuming less power at least for Intel CPUs.
Happy 5th birthday, BeagleBoard.org!
This guest column by Alejandro Erives, brand manager for Sitara processors at Texas Instruments, celebrates BeagleBone.org’s fifth birthday. In a lighthearted and entertaining missive, Erives highlights the history of BeagleBoard.org, the benefits of open source hardware and software to embedded development, and the advantages of open development platforms for students, makers, entrepreneurs, and even silicon vendors.
5 Links for Developers and IT Pros 7-26-13
This week we look at the CIO's hierarchy of needs, five monumental cloud project missteps, and the growing irrelevance of Microsoft.
Hacker's Tiny Spy Computers Aim To Track Targets Around Entire Neighborhoods And Cities
At the Def Con hacker conference early next month, O’Connor, a security researcher who runs the consultancy Malice Afterthought, plans to unveil Creepy Distributed Object Locator or CreepyDOL, a system of Linux computers that cost less than $60 each and are designed to be hidden around an urban or suburban area. The little black boxes can wirelessly track the movements of cell phones or other mobile devices, feeding the information they collect into a database where an administrator can monitor targets on a map-based interface. A proof-of-concept version of the system that O’Connor has built includes ten of the spy nodes, each capable of reading the wireless signals of nearby devices and communicating back to a central server by piggybacking on any available Wifi network.
Suricata: The Snort Replacer (Part 2: Configure & Test)
In part 1, we covered what Suricata is, why we are using it, and how to install it to our system. It wasn’t hard, and the following won’t be much worse, either. Now we are going to do some basic configuration of the program and get it working!
Arch Linux Is the First Stable Distro with Linux Kernel 3.10
It took a few good weeks of testing, but since yesterday (July 25), the Arch Linux operating system uses the stable Linux 3.10 kernel packages.
VMware Player vs. VirtualBox: performance comparison
If you are using a virtualization package, your main concern will be its performance, or in another word, its virtualization overhead. This article presents performance evaluation of two most popular virtualization packages, VMware Player and VirtualBox.
Readers' Choice Awards 2013 Nomination
We are pleased to accept nominations for this year's Readers' Choice Awards! Please peruse the following list of categories and write in your favorites to nominate them. We will accept nominations until August 18, 2013. Voting will begin on August 26, 2013, so please check back at that time to cast your vote.
Peak+ Firefox OS smartphone goes on pre-sale
Geeksphone has started taking pre-orders for its first commercial smartphone running Firefox OS. The Peak+ offers double the RAM and offers better battery and graphics performance than the original Peak developers phone, and it runs the latest Firefox OS 1.1 build.
10 secrets to sustainable in open source communities
Elizabeth Leddy gave the next talk I attended entitled, Wish I Knew How to Quit You: 10 Secrets to Sustainable Open Source Communities. Elizabeth works with Plone but wasn’t really involved in open source until about five years ago. With open source we often start by working at a company that supports a specific open source application and there are two paths we can take. One path is that you start to get annoyed with the way things are going and so you jump to another open source project. Or you can get involved in the open source community so thoroughly that you can move from one related company to another (this is what I have been doing with Koha so I totally understand this path).
The Value of Open Standards
A perennial challenge faced by standards advocates is how to quantify the economic benefits they contend standards can provide.
Fedora 19 Schrödinger’s Cat Review – Back in the box
After a long delayed and divisive Fedora 18, how has the latest Fedora shaped up
Open access to meteorological data to increase accuracy of weather forecasts
Humans have always wanted to know what the weather has in store for them, and have come up with a whole load of ways to predict what’s coming; some better than others.
Weather forecasting as we know it began in earnest in the nineteenth century, when the invention of the electric telegraph revolutionised long-distance communications and made it possible for information about incoming weather to travel faster than the weather itself. Since then weather forecasting has become ever-more accurate, with improvements in the technology of reporting and communicating, as well as in the predictive models, making it possible for us to know the future weather in greater detail than ever before.
The main reason I love Linux: it works. Plain and simple.
I got introduced to Linux in 2006. My first distributions were Kubuntu, then PC Linux OS. Until eventually I arrived to Mint Daryna.
Encrypt Your Data With EncFS (Debian Wheezy)
EncFS provides an encrypted filesystem in user-space. It runs without any special permissions and uses the FUSE library and Linux kernel module to provide the filesystem interface. It is a pass-through filesystem, not an encrypted block device, which means it is created on top of an existing filesystem. This tutorial shows how you can use EncFS on Debian Wheezy to encrypt your data.
« Previous ( 1 ... 3647 3648 3649 3650 3651 3652 3653 3654 3655 3656 3657 ... 7359 ) Next »
