Language Selection

English French German Italian Portuguese Spanish

January 2018

today's leftovers

Filed under
Misc
  • Open Source Security Podcast: Episode 80 - GPS tracking and jamming
  • How to add a repository on your Linux machine
  • Modify SVG using GSVGtk: First Repor

    GSVGtk is a library to provide GTK+ widgets you can use to access SVG files. It is powered by GSVG, in a way it can access each shape and its properties using a GObject API based on W3C SVG 1.1 specification.

    Currently, GSVGtk uses Clutter to encapsulate SVG shapes, render them inside Clutter Actors, through librsvg, and maps events to source SVG in order to eventually modify original definitions, like its position.

    In the following video, you can see GSVGtk’s Container based on Clutter, loading an SVG file, take some shapes from it to show on the scene.

  • logo.png for default avatar for GitLab repos

    I added a logo.png to GNOME Tweaks at GNOME and it automatically showed up in Salsa when I imported the new version.

  • What’s New in Peppermint OS 8 Respin

    Peppermint OS 8 respin is the latest release of Peppermint OS Linux Distribution. This release based on Ubuntu 16.04 LTS (Xenial Xerus), powered by linux kernel 4.10 series, using LXDE desktop environment with new “Pepirus” xfwm4, GTK+ and icon themes. Also, brings 64 bit and 32 bit installation images. The 64 bit release provides complete support for UEFI systems and secure boot.

  • Imagine the world's biggest Kanban / Scrumboard

    Imagine a Kanban board that could aggregate issues from multiple backends, including your CalDAV task list, Bugzilla systems (Fedora, Mozilla, GNOME communities), Github issue lists and the Debian Bug Tracking System, visualize them together and coordinate your upstream fixes and packaging fixes in a single sprint.

    [...]

    If you'd like to see this or any of the other proposed projects go ahead, you don't need to be a Debian Developer to suggest ideas, refer a student or be a co-mentor. Many of our projects have relevance in multiple communities. Feel free to get in touch with us through the debian-outreach mailing list.

The Linux Foundation is Growing

Filed under
Linux
  • Linux Foundation fights fragmentation with network umbrella

    Open source platforms are becoming more and more fundamental to the new telecoms network architecture, raising exciting prospects for a more democratic ecosystem and rapid innovation. But open source also comes with the risk of fragmentation, which has already been seen in industry splits over different approaches to management and orchestration (MANO) in virtualized networks. A large number of open projects has emerged in the areas of virtualization, software-defined networking (SDN), MANO and even telecoms hardware initiatives like Facebook’s OpenCellular.

  • The Linux Foundation Announces 30 New Silver Members

    The Linux Foundation, the nonprofit organization enabling mass innovation through open source, announced the addition of 30 Silver members. Linux Foundation members help support development of the greatest shared technology resources in history, while accelerating their own innovation through open source leadership and participation.

Red Hat and Fedora Leftovers

Server: Microservices, Replika, STORK, OpenStack

OSS Leftovers

Filed under
OSS
  • India's RJio Plots Open Source Disruption

    Owned by Indian billionaire Mukesh Ambani, the telco believes that it is high time India developed products and services tailored specifically to the Indian market. "If you observe, a lot of effort has been put into the IT space [in India], but what has not happened is a focused effort [for innovation] in the telecom space," says Matthew Oommen, RJio's president of networks, global strategy and service development, on the sidelines of India's recent Digital Open Summit.

  • Open Source Initiative Turns 20

    The Open Source Initiative (OSI) will celebrate its 20th anniversary on Friday, Feb. 2, and the global non-profit organization dedicated to raising awareness and adoption of open source software is gonna par-tay. By which I mean, the OSI has scheduled activities around the world this year to commemorate the event. (I'm hoping there will be snacks.)

  • Swatantra17

    Last month Thiruvananthapuram witnessed one of the biggest Free and Open Source Software conference called Swatantra17. Swatantra is a flagship triennial ( actually used to be triennial, but from now on organizers decided to conduct in every 2 years.) FOSS conference from ICFOSS. This year there were more than 30 speakers from all around the world. The event held from 20-21 December at Mascot hotel, Thiruvananthapuram. I was one of the community volunteer for the event and was excited from the day it announced Smile .

  • DO or UNDO - there is no VACUUM

    To put this another way, it is in general true that PostgreSQL’s VACUUM implementation has gotten progressively better at reclaiming space occupied by dead tuples more quickly and with less expenditure of effort. And that’s really good, because the faster you reclaim space, the less new space you end up allocating, which keeps tables small and performance high. However, the examples above show that VACUUM isn’t the whole problem. In these examples, even if VACUUM ran at the earliest instant when it could reclaim the space occupied by dead tuples and ran infinitely fast, the table would still become bloated. In the case where the bloat is caused by many short queries run while one long-running transaction remains open, we could, with smarter snapshot management, limit the worst-case bloat to approximately a factor of two -- that is, we’d keep the version of the tuple visible to the old snapshot and the current version, and discard the intermediate versions, a trick PostgreSQL currently can’t manage. However, even a factor of two is a lot, and what if there are multiple distinct open snapshots?  Further, in the case where the bloat is created by a SQL statement that induces scattered updates throughout the table, no improvement to VACUUM can possibly help. By the time that SQL statement finishes, the damage is already done.

  • Scratch group projects – 2018

    Once again, it’s time for this year’s Scratch projects from my grade 10 students. Up next is python, but their final projects are available at https://scratch.lesbg.com. Feel free to play them and rate them. This is a first attempt for students, so do please be gentle on the ratings.

  • Why Create a New Unix Shell?

FSF and GNU Debugger (GDB) 8.1

Filed under
GNU
  • Free Software Foundation was gifted 91 bitcoin

    The Free Software Foundation, has announced that it received its largest donation ever, 91.45 bitcoin from an anonymous entity called Pineapple Fund. The 91.45 bitcoin, at the time of payment, was roughly equal to $1 million. The Free Software Foundation is an organisation that promotes the concept of free software, which is defined by the ‘four essential freedoms’.

  • GDB 8.1 released!

    Release 8.1 of GDB, the GNU Debugger, is now available via anonymous FTP.  GDB is a source-level debugger for Ada, C, C++, Objective-C, Pascal and many other languages.  GDB can target (i.e., debug programs running on) more than a dozen different processor architectures, and GDB itself can run on most popular GNU/Linux, Unix and Microsoft Windows variants.

  • GDB 8.1 Debugger Brings Better Rust Support, Improved Python Scripting

    Version 8.1 of the GNU Debugger (GDB) is now available for developers.

    The GDB 8.1 debugger update brings Python scripting enhancements, improved Rust language support, breakpoints on C++ functions are now set on all scopes by default, a number of new commands have been added, the GDBserver has received a few enhancements, there is better auto-completion support for this debugger, and a variety of other improvements to help developers debug their code in a variety of languages.

  • GDB 8.1 released

    Version 8.1 of the GDB debugger is out. Changes include better support for the Rust language and various other improvements to make debugging easier; see the announcement and the news file for the full list.

Security: Updates, Google, Hacking Team, Microsoft-NSA, Django

Filed under
Security
  • Security updates for Wednesday
  • How Did Google Wipe Out 700,000 Malicious Android Apps From Play Store? Using Artificial Intelligence
  • Hacking Team Is Still Alive Thanks to a Mysterious Investor From Saudi Arabia

    The 2015 breach of spyware vendor Hacking Team seemed like it should have ended the company. Hacking Team was thoroughly owned, with its once-secret list of customers, internal emails, and spyware source code leaked online for anyone to see. But nearly three years later, the company trudges on, in large part thanks to a cash influx in 2016 from a mysterious investor who had been publicly unknown until now.

    The hack hurt the company’s reputation and bottom line: Hacking Team lost customers, was struggling to make new ones, and several key employees left. Three years later—after the appearance of this new investor—the company appears to have stopped the bleeding. The company registered around $1 million in losses in 2015, but bounced back with around $600,000 in profits in 2016.

    Motherboard has learned that this apparent recovery is in part thanks to the new investor, who appears to be from Saudi Arabia—and whose lawyer’s name matches that of a prominent Saudi attorney who regularly works for the Saudi Arabian government and facilitates deals between the government and international companies.

  • NSA exploit EternalBlue is back and powering WannaMine cryptojacking malware

    SAY HELLO to WannaMine, the cryptojacking malware that's using leaked NSA hacking tools to infiltrate computers and syphon processor power to crunch calculations needed to 'mine; cryptocurrencies.

    But first a history lesson. You may remember the EternalBlue, a Windows exploit developed by the NSA that was leaked by hacking group Shadow Brokers.

    Pretty soon after the exploit was used to launch the massive WannaCry ransomware attack that locked down NHS systems and affected some 230,000 computers across 150 countries. EternalBlue was then used to spearhead the arguably more dangerous NotPetya attacks.

  • Johnny Hacker hauls out NSA-crafted Server Message Block exploits, revamps 'em

    EternalBlue, EternalSynergy, EternalRomance and EternalChampion formed part of the arsenal of NSA-developed hacking tools that were leaked by the Shadow Brokers group before they were used (in part) to mount the devastating NotPetya cyber attack.

    [...]

    "After that, the exploit module will drop to disk (or use a PowerShell command), explains zerosum0x0, and then copy directly to the hard drive."

  • 10 tips for making the Django Admin more secure

    Offloading the responsibility for making your app secure onto QA testers or an information security office is tempting, but security is everyone's responsibility. The Django Admin is one of our favorite features of Django, but unless it's locked down correctly, it presents opportunities for exploitation. To save your users from compromised data, here are 10 tips to make the Django Admin more secure.

11 Myths About the RISC-V ISA

Filed under
Hardware
OSS

Despite its rich ecosystem and growing number of real-world implementations, misconceptions about RISC-V are keeping companies around the world from fully realizing its benefits.

Read more

Mozilla: Rust, Privacy and More

Filed under
Moz/FF
  • Where’s Rust headed in 2018? Ask the community.

    2017 was a big year for the Rust systems programming language. Now, members of the open source project are looking to consolidate last year’s progress – making Rust easier to learn and use – and publish the first major update to the stable 2015 Rust release.

    “We’re making Rust a much nicer place to be,” said Aaron Turon, a Rust core team member and engineering manager at Mozilla. “We’re working to create a more productive environment for programmers – especially those new to the language.”

  • The 2018 Rust Event Lineup

    Every year there are multiple Rust events around the world, bringing together the community. Despite being early in the year, we’re excited to be able to highlight several events that are already being organized!

  • This Week in Rust 219

    Hello and welcome to another issue of This Week in Rust! Rust is a systems language pursuing the trifecta: safety, concurrency, and speed. This is a weekly summary of its progress and community. Want something mentioned? Tweet us at @ThisWeekInRust or send us a pull request. Want to get involved? We love contributions.

  • Retrospective: Looking Glass

    In December, we launched a tv show tie-in with Mr. Robot, Looking Glass, that alarmed some people because we didn’t think hard enough about the implications of shipping an add on that had the potential to be both confusing and upsetting. We’re deeply sorry for this and we understand why it’s important for us to learn and grow from this experience. As mentioned last month, we conducted a post-mortem to better understand how and why this happened and how we can do better.

  • Mozilla Reps Community: Rep of the Month – December 2017
  • Mozilla Security Blog: Preventing data leaks by stripping path information in HTTP Referrers

    To help prevent third party data leakage while browsing privately, Firefox Private Browsing Mode will remove path information from referrers sent to third parties starting in Firefox 59.

More in Tux Machines

today's howtos and programming bits

Security: Open Source Security Podcast, Screwed Drivers, and Voting Machines

  • Open Source Security Podcast: Episode 157 - Backdoors and snake oil in our cryptography

    Josh and Kurt talk about snakeoil cryptography at Black Hat and the new backdoored cryptography fight. Both of these problems will be with us for a very long time. These are fights worth fighting because it's the right thing to do.

  • Screwed Drivers – Signed, Sealed, Delivered

    Our analysis found that the problem of insecure drivers is widespread, affecting more than 40 drivers from at least 20 different vendors – including every major BIOS vendor, as well as hardware vendors like ASUS, Toshiba, NVIDIA, and Huawei. However, the widespread nature of these vulnerabilities highlights a more fundamental issue – all the vulnerable drivers we discovered have been certified by Microsoft. Since the presence of a vulnerable driver on a device can provide a user (or attacker) with improperly elevated privileges, we have engaged Microsoft to support solutions to better protect against this class of vulnerabilities, such as blacklisting known bad drivers.

  • Most states still aren’t set to audit paper ballots in 2020

    Despite some progress on voting security since 2016, most states in the US aren’t set to require an audit of paper ballots in the November 2020 election, according to a new report out this week from the Brennan Center for Justice.

    The report notes that experts and government officials have spent years recommending states adopt verifiable paper ballots for elections, but a handful still use electronic methods potentially vulnerable to cyberattacks. In 2016, 14 states used paperless machines, although the number today is 11, and the report estimates that no more than eight will use them in the 2020 election.

Linux Candy: WallGen – image generator tool

Who loves eye candy? Don’t be shy — you can raise both hands!! Linux Candy is a new series of articles covering interesting eye candy software. We’re only going to feature open-source software in this series. I’m not going to harp on about the tired proverb “All work and no play makes Jack a dull boy”. But there’s a certain element of truth here. If you spend all day coding neural networks, mastering a new programming language, sit in meetings feeling bored witless, you’ll need some relief at the end of the day. And what better way by making your desktop environment a bit more memorable. Let’s start our candy adventure with WallGen. It’s a small command-line utility that generates HQ poly wallpapers with only a few text arguments for inputs. Depending on these arguments, you can create shape-based patterns, randomly filled surfaces, and even image-based patterns. Read more

Richard Brown: Changing of the Guard

After six years on the openSUSE Board and five as its Chairperson, I have decided to step down as Chair of the openSUSE Board effective today, August 19. This has been a very difficult decision for me to make, with reasons that are diverse, interlinked, and personal. Some of the key factors that led me to make this step include the time required to do the job properly, and the length of time I’ve served. Five years is more than twice as long as any of my predecessors. The time required to do the role properly has increased and I now find it impossible to balance the demands of the role with the requirements of my primary role as a developer in SUSE, and with what I wish to achieve outside of work and community. As difficult as it is to step back from something I’ve enjoyed doing for so long, I am looking forward to achieving a better balance between work, community, and life in general. Serving as member and chair of the openSUSE Board has been an absolute pleasure and highly rewarding. Meeting and communicating with members of the project as well as championing the cause of openSUSE has been a joyous part of my life that I know I will miss going forward. openSUSE won’t get rid of me entirely. While I do intend to step back from any governance topics, I will still be working at SUSE in the Future Technology Team. Following SUSE’s Open Source policy, we do a lot in openSUSE. I am especially looking forward to being able to focus on Kubic & MicroOS much more than I have been lately. As I’m sure it’s likely to be a question, I wish to make it crystal clear that my decision has nothing to do with the Board’s ongoing efforts to form an independent openSUSE Foundation. The Board’s decision to form a Foundation had my complete backing as Chairperson, and will continue to have as a regular openSUSE contributor. I have absolute confidence in the openSUSE Board; Indeed, I don’t think I would be able to make this decision at this time if I wasn’t certain that I was leaving openSUSE in good hands. On that note, SUSE has appointed Gerald Pfeifer as my replacement as Chair. Gerald is SUSE’s EMEA-based CTO, with a long history as a Tumbleweed user, an active openSUSE Member, and upstream contributor/maintainer in projects like GCC and Wine. Read more