- Web Server
- Control Panels
- Site Map/RSS Feeds
Linux and Open Source news headlines
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.http://lxer.com/
Last update25 min 34 sec ago
December 30, 2013
This article describes how you can create a working Linux system for the Olinuxino A13 and Olinuxino A13Micro from scratch.
User account management is one of the most critical jobs of system admins. In particular, password security should be considered the top concern for any secure Linux system. In this tutorial, I will describe how to set password policy on Linux. I assume that you are using PAM (Pluggable Authentication Modules) on your Linux system, which is the case on all recent Linux distros.
Fast and furious firms battle to design dashboard of the futureCES 2014 Apple and Google are preparing to compete on yet another front. They reportedly plan to race each other to design the world's most powerful smart car dashboard.…
It's not even January 2014 yet, and already Canonical faces another media flare-up about its Ubuntu Linux operating system. But this time, the negative stories about the open source vendor -- which critics accuse of storing WiFi passwords in an insecure way via NetworkManager -- are not fair.
This actually looks increadibly cool, Deadlock is a FPS mixing environmental puzzles with plaftormers elements and it pulls it off rather well.
As an extra holiday present for Linux and open-source fans, Intel has quietly released a large batch of new programming documentation that covers their latest-generation Haswell graphics cores. The new "programmer's reference manuals" cover the 2013 Haswell HD Graphics, Iris Graphics, and Iris Pro Graphics. This massive batch of documentation is spread across twelve volumes and does document their hardware registers...
Tired of that shiny new game console you opened up on Christmas morning already? Looking for gameplay that's a little more timeless? Maybe you just want to show your ingrate kids what gaming was like back when you were young. In any case, The Internet Archive has got you covered with dozens of emulated ROM images of games for classic game systems of the '70s and '80s running right in your browser.
Over the last five years, e-learning platforms have gained popularity and notoriety for alleviating some of the strain caused by our education problems. Namely, for helping bring resources and materials to classrooms and countries that can't afford the proprietary and closed options.
There’s plenty about Rockstar vs Everybody Android to remind me of the SCO fiasco. Enough so to make me wish we still had PJ and Groklaw to take care of the play-by-play. Last week, Google returned fire. Wouldn’t it be nice to have PJ’s take on this?
Why don't academics discuss research before starting the work?In a recent blog post, Jack Kelly asked this simple question, and it is a striking one for those of us who are familiar with collaborating at high levels as part of an open source community. One of the pillars of the open source way is rapid prototyping and the idea of: release early, release often.In the scientific research community, however, the history of and current state of affairs is closed and secretive. Jack Kelly even began his post with:Warning: this is a hopelessly idealistic proposal...
In 2008, the British Library, in partnership with Microsoft, embarked on a project to digitize thousands of out-of-copyright books from the 17th, 18th, and 19th centuries. Included within those books were maps, diagrams, illustrations, photographs, and more. The Library has uploaded more than a million of them onto Flickr and released them into the public domain. It's now asking for help.
As some extra weekend benchmarks as we near the end of 2013, here are test results when comparing Debian GNU/Linux 7.2, Ubuntu 14.04 in its current development state, Fedora 20, Red Hat Enterprise Linux 6.5, Red Hat Enterprise Linux 7.0 Beta 1, and openSUSE 13.1.
Xubuntu doesn't necessarily look like the prettiest distribution you will ever use but by following my customisation guide and by installing further applications from the Ubuntu repositories you will get an operating system that is responsive, customisable and fully featured.
I didn't know it (Linux) existed until the day I was introduced to it. That's a chance event for some, but for me it was part of a plan.
The Midnight Commander file manager provides a variety of helpful options that will let users customize the interface to fit their needs. This file manager supports custom user interface color schemes for increased personalization. The color scheme can be modified conveniently at any time by editing a single configuration file.
While most of the Linux desktop world is focused around Wayland, X11, and Mir for the basis of the display technologies, DirectFB has continued marching forward and picked up many features this year and there will be another batch of features presented soon with DirectFB 1.8.
Many security policies require you to change the port number of the SSH service to ensure greater security in a Linux system. Situation now used throughout the IT world and used mostly by users who have their own private server. Today I want to show you how to add another security layer without having to change the SSH port. To do this we’ll incorporate the famous Google Authenticator to our ssh service, in this way we’ll have a safe, two steps security, by entering our password and the combination given from the GA application. Let’s see how to do this…
December 29, 2013
According to a new report from Der Spiegel based on internal NSA documents, the signals intelligence agency's elite hacking unit (TAO) is able to conduct sophisticated wiretaps in ways that make Hollywood fantasy look more like reality. The report indicates that the NSA, in collaboration with the CIA and FBI, routinely and secretly intercepts shipping deliveries for laptops or other computer accessories in order to implant bugs before they reach their destinations. According to Der Spiegel, the NSA's TAO group is able to divert shipping deliveries to its own "secret workshops" in a method called interdiction, where agents load malware onto the electronics or install malicious hardware that can give US intelligence agencies remote access.