- Web Server
- Control Panels
- Site Map/RSS Feeds
Linux and Open Source news headlines
"Facebook" is a registered trademark of Facebook, Inc. All rights reserved.http://lxer.com/
Last update14 min 41 sec ago
February 6, 2013
Six years after the launch of the IcedTea project, developer Andrew John Hughes feels that it's time to take stock. Questions were previously raised over the role of the project, which aims to make it possible to use OpenJDK using only free software build tools for GNU/Linux platforms, when OpenJDK 7 was released.
Last week I heard it not once, not twice but three times in three different conversations with three different people that building KDE software and getting involved was mysterious and perceived as difficult. We have documentation on the KDE wikis for this, but I admit that it can take time to read through everything and find the shortest path from point A (e.g. a machine with Linux installed) to point B (building software from git.kde.org).
So doing it's rounds right now is news about John Carmack of id software chiming on on Wine gaming, here are his thoughts and my thoughts.
February 5, 2013
This tutorial shows how to combine four single storage servers (running Ubuntu 12.10) to a distributed replicated storage with GlusterFS. Nodes 1 and 2 (replication1) as well as 3 and 4 (replication2) will mirror each other, and replication1 and replication2 will be combined to one larger storage server (distribution). Basically, this is RAID10 over network. If you lose one server from replication1 and one from replication2, the distributed volume continues to work. The client system (Ubuntu 12.10 as well) will be able to access the storage as if it was a local filesystem. GlusterFS is a clustered file-system capable of scaling to several peta-bytes. It aggregates various storage bricks over Infiniband RDMA or TCP/IP interconnect into one large parallel network file system. Storage bricks can be made of any commodity hardware such as x86_64 servers with SATA-II RAID and Infiniband HBA.
You just think that's a Chromebook beckoning you with an open source OS, easier upgradeability and fast connections to the cloud. All those qualities could make it a Linux netbook in disguise -- or at least what the netbooks of a few years ago promised before they all started selling preloaded with Windows. The key? More manufacturers buying into the flexibility of the Linux kernel in the Chrome OS.
Last week I mentioned that I was going to do a live cast on Google Hangout .. and I did. It went well enough to consider doing it again, in fact. Having learned the ropes a bit in the process and played with a few tools over the weekend, I'm going to try to make it a weekly adventure. Yes, my weekly live vidcast is back after it sat lonely and scared in my closet for several years! ;)
The transaction will be financed through a combination of cash and equity contributed by Mr. Dell, cash funded by investment funds affiliated with Silver Lake, cash invested by MSD Capital, L.P., a $2 billion loan from Microsoft, rollover of existing debt, as well as debt financing that has been committed by BofA Merrill Lynch, Barclays, Credit Suisse and RBC Capital Markets (in alphabetical order), and cash on hand. There is no financing condition.
In this article we will look on how to automatically chroot jail selected user ssh login based on the user group. This technique can be quite useful if you what your user to be provided with a limited system environment and at the same time keep them separate from your main system. You can also use this technique to create a simple ssh honeypot. In this tutorial you will learn how to create a basic chroot environment and how to configure your main system's sshd to automatically chroot jail selected users upon the ssh login.
Developers at Google and Mozilla have demonstrated interoperability between their implementations of WebRTC, allowing them to make video calls without plug-ins. WebRTC is being developed within the W3C and IETF communities as a future standard for HTML5-capable browsers to allow them to create HD video quality connections, between servers and browsers or between browser peers, without resorting to third-party or non-standard plugins. Two different web browsers being able to communicate using WebRTC is a significant milestone in that standard's development. Using the current Chrome 25 Beta and a recent Firefox Nightly, Todd Simpson, Mozilla's Chief Innovation Officer and Hugh Finnan, Google's Director of Product Management were able to video chat from their respective browsers.
On the Linux Planet, few issues have been more contentious in recent years than Microsoft's Secure Boot and Oracle's acquisition of Sun Microsystems. Both issues surfaced again this past week.
Software developers are racing to patch a recently discovered vulnerability that allows attackers to recover the plaintext of authentication cookies and other encrypted data as they travel over the Internet and other unsecured networks.The discovery is significant because in many cases it makes it possible for attackers to completely subvert the protection provided by the secure sockets layer and transport layer protocols. Together, SSL, TLS, and a close TLS relative known as Datagram Transport Layer Security are the sole cryptographic means for websites to prove their authenticity and to encrypt data as it travels between end users and Web servers. The so-called "Lucky Thirteen" attacks devised by computer scientists to exploit the weaknesses work against virtually all open-source TLS implementations, and possibly implementations supported by Apple, Microsoft, and Cisco Systems as well.
Dell’s (NASDAQ: DELL) board of directors will reportedly meet this evening (Monday, Feb. 4) to vote on a leverage buyout that may take the company private, Bloomberg reported. Indeed, Silver Lake Management, Microsoft (NASDAQ: MSFT) and Michael Dell are expected to to be among Dell’s key investors. Among the potential concerns for channel partners: Will Microsoft’s potential stake in Dell allow the software giant to dictate the types of software Dell offers to mobile, desktop, server and cloud partners?
Wait a minutes, did I just write that the patch addressed 50 security holes? I’ve got a five pound block of Swiss cheese in the fridge that has fewer holes than that. I think if I was Larry Ellison I would be ashamed to admit I’d allowed that many security vulnerabilities to accrue unfixed while any project was under my care. I think I’d fix ten a day or something in five separate patches and try to make it look like I had my security eagles working overtime finding new holes ahead of the bad guys.