Language Selection

English French German Italian Portuguese Spanish

February 2021

How to transfer apt keyring to another Debian based distribution

Filed under

Initially, when I started my Linux journey, I used to switch from one distribution to another. It was interesting a few days later, and I feel monotonous to add GPG Key again to Install various software.

It isn’t enjoyable to find GPG keys again and add them one by one for all packages.

I need to find some solution through which I can take backup or move the key to another computer.

Read more

Security Leftovers

Filed under
  • After SolarWinds breach, lawmakers ask NSA for help in cracking Juniper cold case

    Juniper revealed its incident in December 2015, saying that [attackers] had slipped unauthorized code into the firm’s software that could allow access to firewalls and the ability to decrypt virtual private network connections. Despite repeated inquiries from Capitol Hill— and concern in the Pentagon about the potential exposure of its contractors to the [crack] — there has been no public U.S. government assessment of who carried out the [crack], and what data was accessed.

  • Home working increases cyber-security fears

    A senior computer network manager for a global financial services company, Peter (who did not want to give his surname, or the name of his employer, due to his firm's anxieties surrounding cyber-security), says they are bombarded from all directions.

  • Google Discloses Severe Bug in Libgcrypt Encryption Library—Impacting Many Projects

    A "severe" vulnerability in GNU Privacy Guard (GnuPG)'s Libgcrypt encryption software could have allowed an attacker to write arbitrary data to the target machine, potentially leading to remote code execution.

    The flaw, which affects version 1.9.0 of libgcrypt, was discovered on January 28 by Tavis Ormandy of Project Zero, a security research unit within Google dedicated to finding zero-day bugs in hardware and software systems.

Security Leftovers

Filed under
  • Chris Lamb: Free software activities in January 2021

    One of the original promises of open source software is that distributed peer review and transparency of process results in enhanced end-user security. However, whilst anyone may inspect the source code of free and open source software for malicious flaws, almost all software today is distributed as pre-compiled binaries. This allows nefarious third-parties to compromise systems by injecting malicious code into ostensibly secure software during the various compilation and distribution processes.

    The motivation behind the Reproducible Builds effort is to ensure no flaws have been introduced during this compilation process by promising identical results are always generated from a given source, thus allowing multiple third-parties to come to a consensus on whether a build was compromised.

  • Heap-Based Buffer Overflow in Sudo [CVE-2021-3156]

    The Qualys Research Team has discovered a heap overflow vulnerability in sudo, a near-ubiquitous utility available on major Unix-like operating systems. Any unprivileged user can gain root privileges on a vulnerable host using a default sudo configuration by exploiting this vulnerability.

    Sudo is a powerful utility that’s included in most if not all Unix- and Linux-based OSes. It allows users to run programs with the security privileges of another user. The vulnerability itself has been hiding in plain sight for nearly 10 years. It was introduced in July 2011 (commit 8255ed69) and affects all legacy versions from 1.8.2 to 1.8.31p2 and all stable versions from 1.9.0 to 1.9.5p1 in their default configuration.

  • Josh Bressers: Episode 256 – 9 bits of podcast, 8 bits of computing

    Josh and Kurt talk about 8 bit computing. What sort of security lessons can we learn from the 8 bit world? More than you think.

today's howtos

Filed under
  • How to Run a Shell Script in Linux [Essentials Explained]

    There are two ways to run a shell script in Linux.

  • How to Setup and Use YUM on Fedora? – Linux Hint

    A Linux distro can be described as a collection of inter-dependent packages on top of the Linux kernel. Together, they offer an amazing experience. To keep the packages in order, a package manager is a must-have for every distro.

    In the case of Fedora, YUM and DNF are two package managers. In this guide, we’ll check out how to set up and use YUM on Fedora.

  • Elasticsearch Delete Index How-to – Linux Hint

    Elasticsearch loves data; none of us can dispute that. However, data can become redundant and useless at some point or the other, necessitating its removal.
    Luckily, with Elasticsearch, when data become redundant, all you need to do is access a tool to perform requests and transfer data over the network.

    This quick guide will show you how to use the mighty Elasticsearch API to delete documents and indices.

  • Elasticsearch List Indices and Size – Linux Hint

    Having up-to-date information about your devices can help troubleshoot and manage your system. Knowing this, Elasticsearch provides simple ways to display elaborate statistics about indices in your cluster.
    This tutorial discusses the art of using Elasticsearch CAT API to view detailed information about indices in the cluster. This information should help you manage how the clusters are performing and what actions to take.

    You may already know that Elasticsearch loves JSON and uses it for all its APIs. However, displayed information or data is only useful to you when it’s in a simple, well-organized form; JSON might not accomplish this very well. Thus, Elasticsearch does not recommend using CAT API with applications but for human reading only.

  • Elasticsearch Reindex All Indices and Check the Status – Linux Hint

    When you’re working with databases, you’ll inevitably need to make changes such as adding, removing, and modifying data.
    When you’re modifying data in an Elasticsearch index, it can lead to downtime as the functionality gets completed and the data gets reindexed.

    This tutorial will give you a much better way of updating indices without experiencing any downtime with the existing data source. Using the Elasticsearch re-indexing API, we will copy data from a specific source to another.

    Let us get started.

  • Using Snap Package Manager on Ubuntu – Linux Hint

    Snap is a tool used to bundle an app and its required dependencies so that it works on different Linux distributions without any modification.
    Snap apps are hosted in the Snap Store. At the time of this writing, there are thousands of open-source and proprietary apps available in the snap store.

    In this article, I am going to show you how to use the Snap package manager on Ubuntu. So, let’s get started!

Python Programming

Filed under
  • How to use Python NumPy mean(), min() and max() functions? – Linux Hint

    Python NumPy library has many aggregate or statistical functions for doing different types of tasks with the one-dimensional or multi-dimensional array. Some of the useful aggregate functions are mean(), min(), max(), average(), sum(), median(), percentile(), etc. The uses of mean(), min(), and max() functions are described in this tutorial. The mean() function is used to return the arithmetic mean value of the array elements. The arithmetic mean is calculated by dividing the sum of all elements of the array by the total number of array elements. If the particular axis is mentioned in the function, then it will calculate the mean value of the particular axis. max() function is used to find out the maximum value from the array elements or the elements of the particular array axis. min() function is used to find out the minimum value from the array elements or the particular array axis.

  • Python NumPy histogram() tutorial – Linux Hint

    A histogram is a mapping of intervals to frequencies. It is used to approximate the probability density function of the particular variable. It is known as the bar graph also. Many options are available in python for building and plotting histograms. NumPy library of python is useful for scientific and mathematical operations. One of this library’s important features is to implement histogram by using the histogram() function. This function is used to create the histogram that represents the frequency distribution of data graphically. In the histogram, the class intervals are represented by bins that look like horizontal rectangles, and the variable height represents the frequencies. The knowledge of creating NumPy array is necessary to understand the examples shown in this tutorial.

  • Python Date and Time Module – Linux Hint

    In this article, we are going to discuss the Python Date and Time module. Python does not have its data type to represent a date, but it allows the programmer to import a DateTime module. In addition to the date, time can also be displayed by Python in various ways. With the assistance of date and time modules, it is possible to set the Python time and date.

  • Python Lambda – Linux Hint

    In this article, we will try to learn about Python Lambda.

  • How to Use Python NumPy unique() Function – Linux Hint

    NumPy library is used in python to create one or more dimensional arrays, and it has many functions to work with the array. The unique() function is one of this library’s useful functions to find out the unique values of an array and return the sorted unique values. This function can also return a tuple of array values, the array of the associative indices, and the number of times each unique value appears in the main array. The different uses of this function are shown in this tutorial.

  • How to Use Python NumPy Random Function? – Linux Hint

    When the value of the number changes in each execution of the script, then that number is called a random number. The random numbers are mainly used for the various types of testing and sampling. Many ways exist in Python to generate the random number, and using a random module of the NumPy library is one way to do it. Many functions exist in random module to generate random numbers, such as rand(), randint(), random(), etc. The uses of the random() function of the random module to generate random numbers in Python are shown in this tutorial.

  • How to Use Python NumPy linspace() Function? – Linux Hint

    Various types of arrays can be created in Python using the NumPy library. You have to know the ways of creating a NumPy array before using the linspace() function in Python. Sometimes we need to create the array with evenly spaced or non-evenly spaced numbers. Both evenly spaced and non-evenly spaced arrays with a range of numbers can be created using the linspace() function. It is a useful function for numerical calculation. How the linspace() function can be used in the python script has been shown in this tutorial.

Games: Encodya, Payday 2 and Gamepad

Filed under
  • Point-And-Click Adventure ‘Encodya’ Launches On PC, Mac And Linux

    Publisher Assemble Entertainment and developer Chaosmonger Studio have released their Bladerunner-meets-Full Throttle point-and-click adventure game, Encodya on Steam and GOG.

  • How to play Payday 2 on Linux

    Payday 2 is a cooperative FPS developed by Overkill Software and published by 505 games. In the game, players team up in a group of 4 to do bank robberies. In this guide, we’ll show you how to get Payday 2 working on Linux.

  • Nibble Stew: Using a gamepad to control a painting application

    One of the hardest things in drawing and painting is controlling the individual strokes. Not only do you have to control the location but also the pressure, tilt and rotation of the pen or brush. This means mastering five or six degrees of freedom at the same time with extreme precision. Doing it well requires years of practice. Modern painting applications and tools like drawing tablets emulate this experience quite well, but the beauty of computers is that we can do even more.

More in Tux Machines

Security Leftovers

Devices: Arduino Nano, HarmonyOS,and Pi

  • Arduino Nano Floppy Emulator For When Your Disk Is Not Accessible | Hackaday

    Among the plethora of obsolete removable media there are some which are lamented, but it can be difficult to find those who regret the passing of the floppy disk. These flexible magnetic disks in hard plastic covers were a staple of computing until some time in the early 2000s, and their drives could be found by the crateload in any spares box. But what about today, when there’s a need for a real floppy drive and none is to be found? Enter [Acemi Elektronikci], with an Arduino Nano based floppy emulator, that plugs into the floppy port of a PC old enough to have one, and allows the easy use of virtual floppy disks.

  • HarmonyOS development board shows up for $11

    Last year, we noted the Hisilicon Hi3861 based HiSpark WiFi IoT development board with supports LiteOS and HarmonyOS that was available in China for just under $10, or as part of a devkit with baseboard and modules for around $60. Although not very practical, buying from Taobao was possible, but there’s now what appears to be a new revision of the Hi3861V100 based HarmonyOS development board in a wider form factor on Banggood for $10.99.

  • Raspberry Pi CM4 handheld console looks like a Nintendo Switch Lite - CNX Software

    StonedEge and Dmcke5 have come up with an incredibly well-designed Raspberry Pi CM4 handheld console that looks like a Nintendo Switch Lite “clone”, and that can run Dreamcast and PSP emulators at full speed using RetroPie. The RetroLite CM4 The design includes a 5-inch display, speakers, all buttons, joysticks, and D-PAD controlled via a custom Arduino board, a micro HDMI port to connect an external display, and a 4000 mAh LiPo battery charged over the USB Type-C port, and it seems to work, albeit we are told there’s still some more work to do.

  • Lilbits: TCL’s concept smart glasses, PineNote E Ink tablet, and using the Raspberry Pi 400 as a keyboard
  • “Industrial Pi” Use Cases with Ubuntu and AMD

    DFI’s GHF51 mini industrial-grade motherboard, and the EC90A-GH mini fanless industrial computer, are the world’s first industrial computer products that have passed the Ubuntu IoT hardware certification and are equipped with high-performance AMD processors. The 1.8-inch motherboard of the Ryzen R1000 processor has the same small size as the Raspberry Pi but brings unprecedented powerful computing performance, powerful expansion capabilities, and durability tailored for industrial applications. Combining the online update mechanism of the Ubuntu Certified Hardware and the online application store, the breakthrough development of “Industrial Pi” will redefine the future of the Industrial Internet of Things. 

Audiocasts/Shows: WordPress, Linux Action News, Scams, and Fake Security

  • WP Briefing: Episode 18: The Economics of WordPress

    In episode 18 of WP Briefing, Josepha Haden Chomphosy reflects on a recent lecture that she gave to students at Hendrix College in which she explored the economics of WordPress and the principles that sustain the project’s ecosystem.

  • Linux Action News 211

    We cover what's special about Plasma's 25th-anniversary edition, chat with CloudLinux's CEO, and detail why Apple supporting Blender is good for all of us.

  • These Open Source SCAMMERS are getting out of control! - Invidious

    No, Inkscape isn't a scam. In fact, it's the best vector illustration tool on the planet. But, much like Krita just a few weeks ago, scammers have registered official-looking domains that are meant to trick people into downloading and installing ransomware. It's sad to see and I can't think of many ways we can combat this besides raising awareness.

  • Josh Bressers: Episode 293 – Scoring OpenSSF Security Scoring

    Josh and Kurt talk about the release of OpenSSF Security Scorecards version 3. This is a great project that will probably make a huge difference. Most of the things the scorecards are measuring are no brainier activities. We go through the list of metrics being measured. There are only a few that we don’t think are fantastic.

IBM/Red Hat Leftovers

  • Use and contribute to a new Open Source Cloud Guide

    Today, at All Things Open, IBM is releasing the Open Source Cloud Guide, which highlights various use cases that are important in hybrid cloud environments, features the important open source projects in those areas, and discusses how various clouds are using open source in their offerings. By open sourcing the guide, developers are able to both use and contribute to the learnings and use cases

  • Announcing Cryostat 2.0: JDK Flight Recorder for containers

    Cryostat is a container-native JVM application that provides a secure API for profiling and monitoring containers with JDK Flight Recorder (JFR). JDK Flight Recorder collects profiling and diagnostic data from applications using JFR events stored in binary flight recordings. When requested, Cryostat can retrieve, store, and analyze flight recordings from containerized Java virtual machines (JVMs) to assess overall application health. Users can download recording files and upload them to JDK Mission Control (JMC) or Grafana for further analysis. This article introduces Cryostat and shares new features in the 2.0 release, including example use cases, tips for getting started, and additional release notes. For more information about Cryostat fundamentals, visit Introduction to Cryostat: JDK Flight Recorder for containers.

  • Kafka Monthly Digest: September 2021

    Welcome to the 44th edition of the Kafka Monthly Digest. In this edition, I'll cover what happened in the Apache Kafka community in September 2021. For last month’s digest, see Kafka Monthly Digest: August 2021 on IBM Developer.

  • Sensitive information detection using the NVIDIA Morpheus AI framework

    The growth of cloud-native applications has driven an explosion of east-west network traffic within a datacenter where applications can create hundreds of thousands of network connections among virtual machines and containers. As a consequence, the ability to track, monitor, and secure a datacenter in a timely manner has risen above that of any individual or team, thus requiring the help of AI and machine learning (AI/ML) to enable ITOps, infrastructure security, and DevSecOps teams to manage the complexity of modern cloud-native applications and the underlying platforms. Red Hat and NVIDIA have been working together to bring the security analytics capabilities of the NVIDIA Morpheus AI application framework to Red Hat infrastructure platforms for cybersecurity developers. This article provides a set of configuration instructions to Red Hat developers working on applications that use the NVIDIA Morpheus AI application framework and NVIDIA BlueField data processing units (DPUs) to secure interservice communication.

  • DevSecOps: 11 questions to ask about your security strategy now

    It’s the fourth and final quarter of 2021, believe it or not. That makes it time for IT leaders to review and evaluate how things are going – and plan for 2022. Security sometimes gets left out of those conversations. We’re here to make sure that doesn’t happen, with an extensive list of questions worth asking as you assess your security posture and look for ways to improve. We’ll start with a series of topics that are particularly relevant for teams that are considering or already implementing a DevSecOps strategy, then we’ll cover a series of fundamental questions worth asking in any organization – especially those currently struggling to modernize their security approach.

  • How Podman runs on Macs and other container FAQs | Enable Sysadmin

    As the Podman machine function becomes more used—particularly on Macs—there have been many questions about how this all works. Some of what is tossed around on the internet is pure speculation, so this article aims to eliminate any speculation. Many people do not realize that containers are really Linux. As such, Linux containers cannot run natively on macOS. Therefore, the containers must run in a Linux virtual machine (VM), and a Podman client interacts with that VM. This is in line with all solutions for running containers on macOS.