Language Selection

English French German Italian Portuguese Spanish

PCLinuxOS Falls Short Of Ubuntu?

Filed under
Ubuntu




We're number 2!

PCLinuxOS users chant "We're number 2! We're number 2! ...Oh wait that doesn't sound right! Big Grin

PCLinuxOS 2010

Smile Look out Ubuntu ,we're on your tail!

PCLOS 2010

My lappy (w/NVidia graphics) likes it.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Compute module offers choice of 8th or 9th Gen Coffee Lake

Aaeon’s “COM-CFHB6” COM Express Basic Type 6 module is available with 8th or 9th Gen H-series Core and Xeon CPUs and offers up to 48GB DDR4 with ECC plus support for 12x USB ports and 24 PCIe 3.0 lanes. Aaeon has announced a COM Express Basic Type 6 module that supports Intel’s 8th Gen Coffee Lake and 9th Gen Coffee Lake Refresh H-series chips. We’ve seen similar combinations on Congatec’s refreshed Conga-TS370 and Kontron’s similarly updated COMe-bCL6. The new COM-CFHB6 module follows other Aaeon Basic Type 6 entries including its 6th Gen Skylake powered COM-KBHB6. Read more

today's howtos

Alpine 3.10.2 released

The Alpine Linux project is pleased to announce the immediate availability of version 3.10.2 of its Alpine Linux operating system. Read more

Security: Updates, Linux "Lockdown" Patches, Webmin FUD (Mischaracterisation) and Dawn for Security Vulnerabilities in HPC

  • Security updates for Tuesday

    Security updates have been issued by Debian (flask), openSUSE (clementine, dkgpg, libTMCG, openexr, and zstd), Oracle (kernel, mysql:8.0, redis:5, and subversion:1.10), SUSE (nodejs6, python-Django, and rubygem-rails-html-sanitizer), and Ubuntu (cups, docker, docker-credential-helpers, kconfig, kde4libs, libreoffice, nova, and openldap).

  • Linux "Lockdown" Patches Hit Their 40th Revision

    The long-running Linux "Lockdown" patches were sent out again overnight for their 40th time but it remains to be seen if these security-oriented patches will be pulled in for the upcoming Linux 5.4 cycle. The Linux Lockdown functionality is for restricting access to the kernel and underlying hardware by blocking writes to /dev/mem, restricting PCI BAR and CPU MSR access, disabling system hibernation support, limiting Tracefs, and restricting or outright disabling other functionality that could alter the hardware state or running Linux kernel image. Linux Lockdown has been opt-in only and designed for use-cases like honoring UEFI SecureBoot for ensuring nothing nefarious could happen once booted into the operating system by bad actors. Most end-users won't voluntarily want the lockdown mode due to all the restrictions in place, but could be a favor for enterprises and very security conscious users.

  • Backdoor Found in Webmin Utility [Ed: It is not a back door but a bug inserted by a malicious entity rather than the project developers themselves; this incident demonstrates or classically highlights the need for reproducible builds.]

    On August 17, the developer of the popular Webmin and Usermin Unix tools pushed out an update to fix a handful of security issues. Normally that wouldn’t generate an avalanche of interest, but in this case, one of those vulnerabilities was introduced intentionally by someone who was able to compromise the software build infrastructure used by the developers.

  • A New Dawn for Security Vulnerabilities in HPC

    In February 2018, Russian nuclear scientists at the Federal Nuclear Center were arrested for using their supercomputer resources to mine the crypto-currency, Bitcoin. Previously, high-performance computing (HPC) security breaches like this tended to be few and far between. However, recent trends are increasing the vulnerabilities and threats faced by HPC systems. Previously, compute clusters enjoyed a level of security through obscurity due to their idiosyncratic architectures in terms of both hardware, with different CPU architectures and networking, and software of often home-grown applications running on Unix-like operating systems. In addition, the reward for compromising a cluster wasn’t all that great. Although hacking into HPC data generated by atomic weapons research and pharmaceutical modelling does present a valuable outcome; meteorological institutes, astrophysics laboratories or other mathematical research is less so.