Occasionally, I will forget to link something from the mailing list in this post. To see my full mailing list activity (patches, reviews, and reports), you can view it on lore.kernel.org. Linux kernel patches Build errors: These are patches to fix various build errors that I found through testing different configurations with LLVM or were exposed by our continuous integration setup. The kernel needs to build in order to be run :)| Nathan Chancellor
This report provides statistical data on published vulnerabilities and exploits we researched during Q4 2025. It also includes summary data on the use of C2 frameworks in APT attacks.| Securelist
Igalia is an open source consulting firm specialised in the development of innovative projects and solutions. Our engineers have expertise in a wide range of technological areas, including browsers and client-side web technologies, graphics pipeline, compilers and virtual machines. We have the most WPE, WebKit, Chromium/Blink and Firefox expertise found in the consulting business, including many reviewers and committers. Igalia designs, develops, customises and optimises GNU/Linux-based solut...| Igalia
This week I played diceCTF 2026 with team fewer and spent 12 hours solving a Linux kernel challenge, cornelslop. This post is a simple writeup without too much detail, and you can find the full exploit here.| Blog
In Filesystem 101, we covered the structural relationships of the Linux filesystem from a process perspective. In this post, we continue analyzing how it interacts with other kernel subsystems.| Blog
Recently I explored the filesystem design of Linux and found it is little more complicated than I expected, so I decided to write a post organizing it. This post analyzes the filesystem from a high-level view, skipping detailed implementation. I hope that after reading it, you will understand more about the Linux filesystem.| Blog
So, you need to open a port on your Ubuntu server. The quick answer is the sudo ufw allow <port>/<protocol> command. Punching in sudo ufw... The post A Guide to Ubuntu Firewall Allow Port with UFW appeared first on ARPHost, LLC.| ARPHost, LLC
If you’ve been around Linux long enough, you’ve seen the argument loop endlessly: Both sides are right. And that’s why the debate refuses to die. The real shift: systemd stopped being “just init” Technically, systemd still is an init system when it runs as PID 1—but in practice it’s a system and service manager that […]| System Administration
143 vs 36 minutes is far too big difference| marcin.juszkiewicz.com.pl
I run this from time to time because it's faster than starting a system update and then canceling it if I only want to see the updates.| From Development to Production on Nick Janetakis
Since I switched to native Linux, I really missed IrfanView for image viewing but mpv is filling that gap quite nicely.| From Development to Production on Nick Janetakis
According to the developer, Sunbunny, Tentacles is a quadruple-stereo vibrato with spatio-spectral panning, available for free. That is a lot of interesting words in one sentence! The aptly named plugin splits your signal into four parallel processing chains, each with its own band-pass filtering, saturation, vibrato, and stereo-position controls that can be adjusted separately. It [...] View post: Sunbunny just released Tentacles, a FREE creative tremolo and spatial effect| Bedroom Producers Blog
Morphulus has released Spectrus, a modular multi-effect plugin with a permanently free tier and a paid Pro version. Let’s cover the differences between the two versions first. The free version of Spectrus includes seven effects with no time limit. The Pro version, which unlocks all 21 effects, is priced at $49 as a one-time purchase [...] View post: Morphulus releases Spectrus, a modular multi-effect plugin with 7 free effects| Bedroom Producers Blog
Using Linux's memfd_create(2) syscall to load shared libraries and execute binaries entirely from memory, bypassing noexec restrictions without ever touching disk.| Gavin Ray Blog
I’ll just assert that there’s no way to use seccomp() correctly. Just like how there’s no way to use gets() correctly, causing it to eventually be removed fr...| blog.habets.se
Forwarding port 80 or 22 from Vagrant virtual machines to their host system is fairly simple. Piping non-privileged ports outside the VM–from, say, a development HTTP server–requires not much extra work. Yet, it’s not always obvious how to do this. In this post, I explain how a Jekyll development HTTP server running within a Vagrant VM can allow connections from its host and why the configuration works.| P.T.C.
Linux rootkits are becoming more advanced as attackers move beyond old kernel module tricks and begin abusing modern Linux features such as eBPF and io_uring. These tools were built for performance, tracing, and system flexibility. However, security researchers warn that they can also help malware stay hidden. The shift shows how Linux threats are evolving […] The post New Linux Rootkits Leverage eBPF and io_uring For Stealth appeared first on Cyber Security News.| Cyber Security News
So California finally did it. They passed Assembly Bill 1043. And now your OS's vendor is legally required to collect your birthdate and report it to every app developer... so they can verify you're not a baby. Now, I read the entire text (and I recommend| The Bryant Review
How many tools do you use as a developer? I’m guessing that the answer is “many.” There are token generators, The post IT-Tools brings many useful developer tools into one convenient location appeared first on The New Stack.| The New Stack | DevOps, Open Source, and Cloud Native News
If you want to keep your Linux instances safe and secure, your best course is to use Long Term Support The post Long-term support for Linux releases gets a new lease on life appeared first on The New Stack.| The New Stack | DevOps, Open Source, and Cloud Native News
There are thousands upon thousands of Linux distributions, so when a new flavor comes into being, the first thing I The post AerynOS is a Linux distribution geared toward performance and bulletproof updates appeared first on The New Stack.| The New Stack | DevOps, Open Source, and Cloud Native News
If you work with servers, chances are you type ssh a lot. Maybe you log into staging, production, or a random cloud VM you spun up last week. And if you’re like most developers, you probably copy-paste long commands with usernames, hostnames, and key files every single time. It works. But it’s messy. There’s a […] The post Stop Copy-Pasting Keys: Master SSH Config for One-Line Logins appeared first on howtouselinux.| howtouselinux
For over 40 years, the Linux terminal has followed a strict “silent” code: when you type your password after a sudo command, the screen stays perfectly still. To a seasoned pro, this is second nature; to a newcomer, it often looks like the computer has frozen. Now, a major change in sudo-rs—the memory-safe Rust reimplementation […] The post Linux sudo Might Start Showing Password Asterisks — Here’s What’s Changing appeared first on howtouselinux.| howtouselinux
The next long-term release of Ubuntu is on the way. Ubuntu 26.04 LTS is expected to arrive in April 2026, and it could become one of the most important Ubuntu desktop updates in years. Why? Because this release isn’t just another routine upgrade. It introduces a new generation of desktop tools, stronger security features, and […] The post Ubuntu 26.04 LTS Is Coming: 7 Big Changes You Should Know appeared first on howtouselinux.| howtouselinux
If you work with Linux, servers, or programming, Vim is almost impossible to avoid. It’s powerful, fast, and available on nearly every Unix-like system. But the learning curve can feel steep at first. This Vim cheat sheet gives you the most useful commands in a simple and practical format. You’ll learn how to open files, […] The post Vim Cheat Sheet: Essential Commands Every Developer Should Know appeared first on howtouselinux.| howtouselinux
If you’ve ever copied something in a Linux terminal and wished you could paste it into a browser, file, or GUI app — xclip is the tool you need. Quick Summary: xclip Commands Cheat Sheet Task Command Install xclip (Ubuntu/Debian) sudo apt install xclip Install xclip (RHEL/CentOS) sudo dnf install xclip Copy text to clipboard […] The post How to Copy Paste Clipboard on Linux (With Examples) – Use xclip Tricks appeared first on howtouselinux.| howtouselinux
Whether you are configuring a web server, setting up SSH access, or troubleshooting a network connection, knowing how to check IP address in Ubuntu is a fundamental skill. There are two types of IP addresses you usually need to find: Here is a quick summary of the most effective commands to check IP address in […] The post How to Check IP Address in Ubuntu: A Complete Guide appeared first on howtouselinux.| howtouselinux
Managing disk space is a critical skill for any Linux user. Whether you are cleaning up a server or managing personal documents, you often need to check file size in Ubuntu terminal to see what is taking up space. Fortunately, Linux provides several built-in commands to help you verify file and directory sizes quickly. Here […]| howtouselinux
Discover the 2025 must-have Ubuntu apps for productivity, media, security, and more. Find your perfect toolkit in our expert guide. The post Exploring the Best Ubuntu Apps: Ultimate Guide for Every User appeared first on Ikkaro.| Ikkaro
One day, I suddenly wondered how to detect when a USB device is plugged or unplugged from a computer running Linux. For most users, this would be solved by relying on libusb. However, the use case I was investigating might not actually want to do so, and so this led me down a poorly-documented rabbit hole. ↫ ArcaneNibble (or R) And ArcaneNibble (or R) is taking you down with them.| OSnews
🇬🇧->🇵🇱 Przejdź do polskiej wersji tego wpisu / Go to polish version of this post Table of contents: Introduction Architecture: What’s happening under the hood? Termux - the terminal that is a system PRoot - the safe sandbox Termux-X11 - next-gen graphics Hardware and Software Requirements Hardware Requirements Necessary Applications Installation Process Step 1 - Android Configuration Step 2 - Installing Termux and Termux-X11 Step 3 - Environment Configuration Step 4 - Launching...| Tomasz Dunia - Blog
🇵🇱->🇬🇧 Go to english version of this post / Przejdź do angielskiej wersji tego wpisu Spis treści: Wstęp Architektura rozwiązania: Co dzieje się pod maską? Termux - terminal, który jest systemem PRoot - bezpieczna piaskownica Termux-X11 - grafika nowej generacji Przygotowanie sprzętowe i programowe Wymagania sprzętowe Niezbędne aplikacje Proces instalacji Krok 1 - Konfiguracja Androida Krok 2 - Instalacja Termux i Termux-X11 Krok 3 - Konfiguracja środowiska Krok 4 - uruc...| Tomasz Dunia - Blog
My ISP blocks torproject.org, so when I try to run Tor Browser for the first time, torbrowser-launcher cannot install it. ~$ Tor Browser Launcher By Micah Lee, licensed under MIT version 0.3.2 https://github.com/micahflee/torbrowser-launcher Downloading Tor Browser for the first time. Downloading https://aus1.torproject.org/torbrowser/update_3/release/Linux_x86_64-gcc3/x/en-US Error starting download: https://aus1.torproject.org/torbrowser/update_3/release/Linux_x86_64-gcc3/x/en-US Are you co...| Recent Questions - Tor Stack Exchange
I’ve had a SNUNMU GK3 mini-PC kicking about since early-2023, barely used. An impulse buy that ended up on a shelf, alongside a drawer full of old drives from various machines and NAS attempts that never quite came together. Picking up a 5-bay USB enclosure finally gave me a reason to use all of it. It’s not polished and it’s not redundant, but it’s simple, flexible, and entirely under my control.| Max Glenister
Linux server patch management is the process that protects your systems from cyberattacks, fixes bugs, improves their performance, and keeps them compliant with regulatory standards. It works by identifying, testing, deploying, and verifying software patches across your servers. The post Linux Server Patch Management: Complete Guide for Secure Updates first appeared on Action1.| Action1
I did not want to manage a Linux VPS in 2016 for the first time ever – something which I am not proud to say, but is the truth.. I'm going to be completely upfront about that to you. I knew how to do it all from years| CoderOasis
In this blogpost, we introduce the analysis of one SMB implementation: kSMBd. It will be followed up by a talk at OffensiveCon 2023 named “Abusing Linux in-kernel SMB server to gain kernel remote code execution”.| THALIUM
I’m proud to release version 1.1.0 of “Warnel Chawpiovs”, a homebrew game for PC (Windows, Linux, MacOS versions are now available) and Nintendo Switch. This new release adds cards from the Mad Titan’s Shadow...| Wololo.net
notes > 2026 > 03 > scheduler-bug| iafisher.com
There are many tools to uplift privileges for a regular user on FreeBSD to either different account or to the root rights with all possible power. For a start on any FreeBSD system any admin user needs to be in the wheel group to be even able to switch to root with su(1) command. From […]| 𝚟𝚎𝚛𝚖𝚊𝚍𝚎𝚗
It often starts with a comment – your comment – and it is not different this time. In the comments section below Native FreeBSD Kerberos/LDAP with FreeIPA/IDM article in one of the plac…| 𝚟𝚎𝚛𝚖𝚊𝚍𝚎𝚗
In Zeiten der IP-Telefonie ist es praktisch, dass man auch mit einem entsprechenden Client direkt ohne ein zusätzliches Telefon direkt vom Rechner telefonieren kann. Auch unter Linux gibt es die sogenannten SIP-Clients, mit denen man über einen SIP-Provider telefonieren kann.| Hommel-Net Weblog
Learn how to install and use Nextcloud AIO on Ubuntu to manage files, users, and media in a private cloud environment.| Make Tech Easier
Part 2 of our kernel vulnerability analysis. Part 1 covered bug lifetimes and VulnBERT. This post digs into the human side: who introduces vulnerabilities, when they do it, and what we can do about it.| pebblebed.com
The kernel CNA now assigns CVEs to almost every bug fix but refuses to score them. Manual triage can't scale; blind patching causes update fatigue. bootc (bootable containers) reconciles both: atomic updates, environmental triage by design, and patch-as-policy.| Tuan-Anh Tran
I’ve spent a lot of time recently reflecting on 2026 as the Year of the Linux Desktop. While I stand by the idea that “opinionated software” like COSMIC is the warp drive we’ve been waiting for, looking back from the bridge of The Mad Botter reveals a different sensor reading. The “Year of Linux” isn’t […] The post Resistance is Futile 2026 is Linux’s appeared first on dominickm.com.| dominickm.com
I run EndeavourOS on my main workstation. I recently switched from XFCE to Cinnamon due to having flickering/performance issues with XFCE after a Nvidia update. I was still using XFCE’s Thunar as my file manager. However, I ran into a strange bug starting yesterday where toggling “show hidden files” caused Thunar to crash with a segmentation fault (I love segfaults). I searched for a solution, but found that while I do not seem to be the first person to have had this issue with Thunar, ...| The Emu Café Social
Not another hjkl tutorial. This is the stuff you still get wrong after years of using Vim - efficient navigation, copy/paste that actually works, YAML-specific workflows, and the motions that turn config file editing from a chore into a joy.| Larvitz Blog
A privacy-respecting, open source and secure TV ecosystem| Plasma Bigscreen
UUIDs are fine for Earth. But what if you need UUIDs that can span the stars? The post That Was a Fun Read! Pondering Cosmological UUIDs appeared first on LowEndBox.| LowEndBox
A dive into the spectrum of sandboxing and isolation, from Linux namespaces and gVisor to hardware-enforced microVMs and WebAssembly, and why picking the right boundary matters for multi-tenant workloads.| Shayon Mukherjee
Lenovo has recently unveiled new ThinkEdge devices for edge AI applications: the Intel “Arrow Lake”-powered ThinkEdge SE60n Gen 2 fanless computer for up to 97 TOPS of AI performance, the ThinkEdge SE10n Gen 2 edge gateway, the compact ThinkEdge SE30n Gen 2 “Raptor Lake” edge client with up to Intel Core 7 150U, and the company’s first industrial all-in-one (AIO) Panel PC, the ThinkEdge SE50a. We’ll focus on the ThinkEdge SE60n Gen2 fanless embedded computer in this article. It...| CNX Software – Embedded Systems News
We’ve already checked CHUWI CoreBook Air Plus 16 hardware in the first part of the review, before testing the AMD Ryzen 5 6600H laptop with Windows 11 Pro, and today I’ll report my experience using the CoreBook Air Plus 16 laptop with Linux using Ubuntu 25.10 distribution. The Ubuntu review will include system information, benchmarks, YouTube 4K and 8K video playback, feature testing, storage and WiFi 6 performance, and measurement of fan noise and power consumption/battery life. Ubuntu 2...| CNX Software – Embedded Systems News
VDPU381 and VDPU383 video decoders are found in Rockchip RK3588 and RK3576 SoCs and variants like the RK3588S and RK3576J. So far, we had to rely on the Rockchip BSP to support hardware video decoding, but Collabora has just announced upstream/mainline Linux support for H.264 (AVC) and H.265 (HEVC) video decoding for RK3588 and RK3576 SoCs. Highlights of H.265/H.264 video decoder implementation on mainline Linux: A 17-patch series adding decoder support, in addition to dt-bindings and device ...| CNX Software – Embedded Systems News
EXAVIZ Cruiser is a mini-ITX-compatible carrier board for the Raspberry Pi CM5 featuring up to nine Ethernet ports (one 2.5GbE port, and up to eight GbE PoE+ ports) designed for Network Video Recorders (NVRs), Smart Home gateways, and edge AI applications. The board also features two 4K-capable HDMI 2.0 video outputs, two SATA ports, an M.2 PCIe Gen2/3 x1 socket for an NVMe SSD, an AI accelerator, or a SATA expansion module, three USB 3.0 ports, and four USB 2.0 interfaces. It also supports 2...| CNX Software – Embedded Systems News
We’ve reported on 10BASE-T1S and 10BASE-T1L Single Pair Ethernet (SPE) chips from Microchip and Analog Devices in the past, which support Ethernet communication over a single twisted-pair cable. But those chips integrate a full Ethernet PHY or MAC-PHY inside the device. NXP takes a different approach with their TJA1410 (automotive) and TJF1410 (industrial) Physical Medium Dependent (PMD) transceivers. These new PMDs separate the analog physical layer from the digital Ethernet logic. By inte...| CNX Software – Embedded Systems News
The PocketBeagle 2 Industrial is an update to the PocketBeagle 2 Rev A1 SBC featuring 1GB DDR4 RAM, a 64GB eMMC flash, and industrial temperature range support. The original board only comes with 512MB DDR4 memory, an eMMC flash footprint (unpopulated), and commercial temperature range support. Apart from those changes, the other specifications remain the same, with a Texas Instruments AM6254 quad-core Cortex-A53 SoC, an MSPM0L1105 Cortex-M0+ microcontroller, a microSD card slot, a USB-C port...| CNX Software – Embedded Systems News
Maintained by Fraunhofer AISEC, GyroidOS is an open-source, multi-arch OS-level virtualization solution designed for embedded devices with hardware security features, and aiming to support security certification processes such as Common Criteria (ISO/IEC 15408), DIN SPEC 27070 – IDS Trust Security profile, and IEC-62443 cybersecurity standards. The virtualization layer is based on Linux-specific features like namespaces, cgroups, and capabilities to provide isolation of different guest oper...| CNX Software – Embedded Systems News
Back in August last year, we wrote about NXP’s IW623 tri-band (2.4GHz, 5GHz, 6GHz) Wi-Fi 6E and Bluetooth LE Audio SoC, but at the time, there was no ready-to-use module based on it. Now, NXP has partnered with Silex Technology to launch the SX-SDMAX6E module, available in a surface-mount LGA package or an M.2 2230 Key-E card. The module supports Bluetooth 5.x connectivity via UART and Wi-Fi via SDIO. It operates from a 3.3V supply with 1.8V support on the LGA version. It has an industrial ...| CNX Software – Embedded Systems News
AMD has introduced the VEK385 Evaluation Kit built around the Versal AI Edge Gen 2 XC2VE3858 SoC FPGA, which combines eight Cortex-A78AE cores, ten Cortex-R52 cores, FPGA fabric with 543,104 LUTs, 144 AI Engine-ML v2 tiles (up to 184 INT8 TOPS), 2,064 DSPs, a Mali-G78AE GPU, and an integrated ISP. The kit features 20 GB of LPDDR5X memory, a PCIe x8 edge connector supporting Gen5 x4 and Gen3/4 x8, and two HDMI 2.1 RX/TX ports for video. There is also an SFP28 port for 25–100 Gb/s Ethernet, a...| CNX Software – Embedded Systems News
The OnLogic Factor 101 (FR101) is an ultra-small form factor, fanless industrial computer built around the Qualcomm QCS6490 platform for edge AI and data gateway applications. Designed for space-constrained applications, it targets light machine vision, inspection, monitoring, and low-speed autonomous systems. The octa-core Qualcomm Kryo 670 (Cortex-A78/A55-class) processor is paired with 8GB LPDDR4x memory and 128GB UFS flash storage. The fanless system features 10GbE and Gigabit Ethernet po...| CNX Software – Embedded Systems News
Previously, we wrote about the Louder Raspberry Pi, an open-source media center that integrates the Louder Raspberry Hat based on a 25W TAS5805M Class-D amplifier. Now, the developer has introduced the Louder Raspberry Hat Plus, upgrading from the TAS5805M amplifier to the more powerful TAS5825M, capable of driving up to 53W in mono (PBTL) mode while offering improved efficiency and thermal performance. The Louder Raspberry Hat Plus is compatible with all Raspberry Pi models and comes in 1X a...| CNX Software – Embedded Systems News
MediaTek Genio 360 and Genio 360P are respectively hexa-core and octa-core Arm Cortex-A76/A55 AIoT processors featuring a MediaTek NPU delivering up to 8 TOPS of AI performance, and designed for cost-sensitive embedded applications. The chips support up to 8GB of memory and eMMC 5.1, SPI NOR, and SD 3.0 storage interfaces. They feature two 4-lane MIPI DSI and one 4-lane DP/eDP interfaces for single or dual display setups, two 4-lane MIPI CSI camera interfaces, audio inputs/outputs, Gigabit Et...| CNX Software – Embedded Systems News
MediaTek MT7902 wireless modules are used in many Windows laptops, but so far, a Linux driver has been missing. This is about to change, as Mediatek has finally committed a patchset for MT7902 to the mainline Linux mailing list. This is personal. I bought an ASUS Vivobook 16 in August 2023, and Ubuntu 22.04 worked pretty well out of the box, except for support for the Wi-Fi 6E and Bluetooth module, detected as “Network controller: MEDIATEK Corp. Device 7902” with lscpi but without working...| CNX Software – Embedded Systems News
TerraMaster has sent us a sample of the F2-425 Plus 3+2-bay NAS for review. It’s powered by an Intel Processor N150 CPU paired with 8GB of RAM, with two 3.5-inch SATA bays and three M.2 NVMe sockets for storage, as well as two 5GbE RJ45 jacks, and a few USB ports. Since we’ve already written the specifications in the previous article, we’ll focus the first part of the review on an unboxing and a teardown to check out the hardware design, before showing how to install the drives, and giv...| CNX Software – Embedded Systems News
AsteroidOS 2.0 Linux-based, open-source smartwatch operating system has just been released with features such as always-on display support, Tilt-to-Wake, a customizable QuickPanel, multiple launcher styles, Nightstand mode, performance improvements, and support for about 30 devices. It’s been a long journey. We first noted the open-source project in 2016 when Florent Revest showcased a basic user experience on the LG G Watch, just before giving a talk at FOSDEM 2016 introducing AsteroidOS....| CNX Software – Embedded Systems News
AppArmor Commands with examples AppArmor provides command-line tools to manage profiles, switch modes, troubleshoot issues, and generate policies. Below is a practical list of commonly used AppArmor commands with examples (mainly used in Ubuntu, Debian, and openSUSE). Check AppArmor Status View Overall Status bashsudo aa-status Output shows: Enable or Disable a Profile Put Profile in […]| Online Tutorial Hub
Understanding AppArmor in linux The “Security Guard” of Linux: “Who can access what?” is the main focus of conventional Linux permissions (Read, Write, Execute); “What can this specific application do?” is the focus of AppArmor (Application Armor). Programs are restricted by this Mandatory Access Control (MAC) scheme, which limits their use to a specific set […]| Online Tutorial Hub
What is the SELinux policy? A Linux system’s SELinux policy is a collection of security guidelines that specify how users, files, and processes can communicate. It is a component of the Linux kernel’s built-in security system, Security-Enhanced Linux. Mandatory Access Control (MAC) is enforced by SELinux policy, in contrast to conventional permission systems. This implies […]| Online Tutorial Hub
How to Install SELinux Step 1: Check if SELinux is Already Installed bashsestatus If installed, you will see: If the command is not found, install it using the steps below. Installation Based on Linux Distribution Install SELinux on RHEL / CentOS / Rocky Linux / AlmaLinux These systems usually include SELinux by default. Install Required […]| Online Tutorial Hub
Understanding Security-Enhanced Linux (SELinux) Standard Permissions (Read, Write, Execute) are quite common among Linux security users. However, these fundamental measures are insufficient for high-security environments. Security-Enhanced Linux, or SELinux, is a potent kernel security module that offers a way to enable security policies for access control. A standard feature of distributions like Red Hat Enterprise […]| Online Tutorial Hub
Linux security model with example Discretionary Access Control (DAC) DAC allows the file owner to decide who can access files or resources. Features: Example: bashls -l file.txt-rw-r--r-- 1 user1 user1 200 Feb 26 file.txt Permissions: Change permission: bashchmod 700 file.txt Now only the owner can access. Use Case: Also read about Linux Security Features, Tools, […]| Online Tutorial Hub
Linux security distro Depending on your particular objective whether you want to operate a secure corporate server or hide from worldwide surveillance you can choose a secure Linux distribution in 2026. The Ultra-Isolated: Qubes OS Most people agree that Qubes OS is the world’s most secure desktop operating system. They call it “Security by Compartmentalization.” […]| Online Tutorial Hub
What is linux security? Linux security is described as a modular, multi-layered protection architecture based on the Principle of Least Privilege (PoLP). It makes use of kernel-level isolation, Mandatory Access Control (MAC), and Discretionary Access Control (DAC) to make sure that users, processes, and apps have the bare minimum of permissions required to operate. In […]| Online Tutorial Hub
Discover Linux system administration commands & interview questions designed to strengthen your system management and troubleshooting skills.| Tutorials
Maybe the code shouldn't be the only documentation?| ArcaneNibble's site
X11 user daemon to automatically run commands triggered by user specified events.| Codeberg.org
Akseli's various rambles and posts about gaming, gamedev, FOSS, programming and other things.| akselmo.dev
Blog posts about GNU Guix.| guix.gnu.org
SUMMARY: Administrators can ensure high availability and prevent data corruption by configuring Oracle Database to automatically start and shut down during Linux system events using either modern systemd services or legacy dbora scripts. Choosing the correct autostart mechanism for your specific Linux version is critical for preventing startup conflicts and ensuring the database is immediately […] The post Setting Up AutoStart for Oracle Database on Linux appeared first on Virtual-DBA Remot...| Virtual-DBA Remote DBA Services & Support – Certified Database Experts
A side effect of the whole freenode kerfluffle is that I’ve been looking at IRCD again. IRC, is of course a very weird and interesting place, and the smaller community of people who run IRCDs are largely weirder and even more interesting. However, in that community of IRCD administrators there happens to be a few incorrect systems programming opinions that have been cargo culted around for years. This particular blog is about one of these bikesheds, namely the kqueue vs epoll debate.| ariadne.space
Akseli's various rambles and posts about gaming, gamedev, FOSS, programming and other things.| akselmo.dev
Few things are more frustrating when first developing your own libraries than RPATH. There have been numerous hacks over the years. Gnu even gave us libtool because POSIX dlopen() just kinda sucked. Hey, for the end user, dlopen() mostly works. It finds dynamically linked libraries in the system standard search paths, all is well with the world. For the developer working on dynamically linked libraries or worse yet, plugins that use dynamically linked libraries from … RPATH NotesRead more T...| Logikal Blog
I've lost count of the number of times Ubuntu F'ed Networking over the course of my career. Was that the 2008 edition when the . . .| Logikal Blog
Linux runs servers. Linux runs clouds. Linux runs routers, switches, firewalls, and satellites. Linux runs supercomputers. Linux runs the majority of the internet. The post BURNING CHROME | Linux: The operating system that refused to behave appeared first on TECHSABADO.| TECHSABADO
Shedding bugs fresh out of the gate| blog.elementary.io
Ghostty terminal emulator Ghostty is a fast, cross-platform terminal emulator that uses platform-native UI and GPU acceleration.| Tao of Mac
This post provides an update on the Canonical-supported upki project, which brings browser-grade Public Key Infrastructure to Linux through the efficient CRLite data format, with the core revocation engine now functional and available to test. Beyond current progress, this post explores broader integration, performance, and future capabilities like Certificate Transparency enforcement and Merkle Tree Certificates.| Jon Seager
This is also known as: "ifconfig is not installed by default anymore, how do I do this only with the ip command?" I have been slowly training my brain to use the new commands but I sometimes forget some. So, here's a couple of equivalence from the old package to net-tools the new iproute2, about 10 years late: net-toolsiproute2 shorter form what it does arp -anip neighborip n ifconfigip addressip a show current IP address ifconfigip linkip l show link stats (up/down/packet counts) routeip rou...| Blog.
Disable Your SSH Access With This One Simple Trick| sny.sh
An overview of storage-encryption options in Linux.| sigma star gmbh
This article will provide you the step-by-step guide on how to install Jenkins on CentOS 8:| Learnitguide.net - Learn Linux, DevOps and Cloud
Rsync Command in Linux:| Learnitguide.net - Learn Linux, DevOps and Cloud
Yesterday my time I experienced what I think was my first LLM hallucinating a responsible security disclosure. Honestly it was no curl situation, but I think it was still interesting. The bug is on launchpad.net if you’re interested in taking a look. I think in total I spent a couple of hours on the whole […]| Made by Mikal
If you've ever wanted to combine the power of Rust with the interactive goodness of Jupyter notebooks, you're in the right place. Maybe you're tired of compiling every single time you want to test a s| freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
Granting minimal privileges is always a best practice and it is often a requirement. Running as a user other than root, and then not allowing privilege escalation to root, are common guardrails within the principle of least privilege. For many tasks, those guardrails work well, but for building docker images, they are problematic. Building a … Continue reading Building Docker Images Without Root or Privilege Escalation→ The post Building Docker Images Without Root or Privilege Escalation ...| Craig Andrews
I find it hard to believe, but it is true: another year has wrapped up. With the conclusion of 2023, I’m looking back at some of my free and open-source software accomplishments over those 12 months. My contributions are, once again, all over the place: different languages, industries, technology stacks, and architectural layers. I made … Continue reading 2023 Free / Open Source Software Accomplishments→ The post 2023 Free / Open Source Software Accomplishments appeared first on Craig A...| Craig Andrews
Last week during a casual conversation I overheard a colleague saying: "The Linux network stack is slow! You can't expect it to do more than 50 thousand packets per second per core!"| The Cloudflare Blog
Open Source communities are trying to quickly adapt to the present rapid advances in technology. I would like to propose some clarity around something that should be common sense. Automated emails …| Ardent Performance Computing