There's a couple of ways to do this depending on your use case.| Nick Janetakis
Running AI on the edge or at home made easy with a NVIDIA Jetson Orin Nano, Nomad and Ollama| atodorov.me
View of sugar cane fields from where I was working. 💡 What Is Chimera Linux? Chimera Linux is a unique from-scratch Linux distribution created in 2021 by q66 that combines the Linux kernel, musl libc, FreeBSD userland, apk package manager, and dinit binary init system. The whole system is built with the LLVM toolchain. Since I started running the first alpha release of Chimera Linux in 2023, my goal has been to eventually migrate to Chimera as my primary operating system. This includes per...| www.wezm.net
Copyright © Stratascale 2025. All Rights Reserved.| www.stratascale.com
Documenting software architecture isn't just about diagrams - it's about preserving the reasoning behind design decisions. This post explores why high-level documentation matters, how to write it effectively, and which tools and models (like C4 and arc42) help maintain clarity and consistency over time.| KDAB
Effective debugging in embedded Linux requires a full-stack approach and the right tools. This post covers key techniques—from hardware abstraction and static analysis to profiling and logging—to help you build more reliable systems.| KDAB
An update on improving passkey support in Linux| www.iinuwa.xyz
It's super easy for Javascript developers now to use Ubuntu on Windows 11 with WSL.| Jonathan Creamer
A technical moan, I’m afraid. Since upgrading from 3/0.4Mbps ADSL to 40/10Mbps FTTC Internet today, I’ve had to use a […]| mcnewton's notes
When connecting FreeRADIUS or ntlm_auth to winbind, you may need to know where winbind’s privileged pipe is so that the […]| mcnewton's notes
I recently got to the bottom of a very longstanding problem where I’ve been unable to get a DLNA media […]| mcnewton's notes
Starlink, OpenWrt, and Eeros… Oh My!| btxx.org
The X11 Window System has been used since September 1987 for Unix desktop systems, allowing applications to display their windows. Today, one of the server implementations of the protocol is the X.Org X server and XWayland, which both use the same codebase. While reviewing the X server, several legacy security issues were identified. These appear […]| Insinuator.net
FriendlyElec has released the NanoPi R3S LTS, an updated version of its compact single-board network platform based on the Rockchip RK3566. This revision introduces key hardware changes, including HDMI 2.0 video output, a repositioned USB 3.0 Type-A port, and a more refined peripheral layout, while retaining dual gigabit Ethernet and broad software support. The board […]| LinuxGizmos.com
Libre Computer has released new firmware updates for its low-cost single-board computers, the AML-A311D-CC Alta and the AML-S905D3-CC Solitude. These SBCs are designed with Raspberry Pi-compatible form factors and target applications such as embedded Linux development and low-power computing. The Alta board, launched in 2023, is based on the Amlogic A311D SoC, which combines four […]| LinuxGizmos.com
The June 2025 release of DietPi v9.14 adds support for new Orange Pi boards, introduces the GZDoom game engine, and brings system improvements, bug fixes, and driver refinements for better SBC compatibility. DietPi: DietPi is a lightweight, Debian-based operating system optimized for single-board computers and embedded systems. It emphasizes minimal resource usage, offering users […]| LinuxGizmos.com
ASUS IoT has introduced two new 3.5-inch single board computers, the C5153ES-IM-AA and C7156ES-IM-AA, both based on Intel Core Ultra processors. According to ASUS, these boards are designed for embedded and industrial use cases, offering high performance, wide input voltage support from 9 to 36 volts, and multiple expansion options. Based on the official datasheets, […]| LinuxGizmos.com
A technical blog about Rust, Linux and other topics.| jamesmcm.github.io
Mostly notes to myself. Shotwell stores most of its information in a database. Which I lost. Because I'm an idiot. But a bunch of metadata is also stored in the image's EXIF metadata! Most importantly is the "Original File Name" which should become the "Description" in DigiKam. Unfortunately, there's no way to copy those values automatically on import. So here's a one-liner which will read…| Terence Eden’s Blog
Things have taken a bad turn for Bcachefs as Linux supremo Linus Torvalds is not happy with their objections.| It's FOSS News
It is pleasing, indeed, whenever you think of something that would be useful for a particular platform and then you find out that the company is working on it. This is indeed what I thought of when we reviewed the IBM i – A Strategic Preview For 2025 And Beyond session hosted by IBM i chief technology officer Steve Will at the recent POWERUp 2025 conference in Anaheim, California. I was not able to attend the event, but my co-editor, Alex Woodie, was able to, and hence we were quite pleased...| IT Jungle
IBM currently competes with a slew of independent IBM i clouds with its Power Virtual Server (PowerVS) offering. But as IBM’s PowerVS grows bigger and more capable, there is still a question: Can the independent IBM i clouds survive? Clouds have been around in one form or another for as long as the IBM midrange server has existed. Whether it’s termed co-location, a computer bureau, an application service provider (ASP), a managed service provider (MSP), or the cloud, people have been runn...| IT Jungle
Threat actors have been observed exploiting file upload vulnerabilities to deploy web shells and advanced malware on both Windows and Linux systems. The campaign, which showcases a blend of publicly available tools and custom malicious payloads, indicates a highly coordinated effort to compromise organizational networks through initial access, persistence, and lateral movement. Sophisticated Attack Campaign […] The post Threat Actors Exploit Windows and Linux Server Vulnerabilities to Deplo...| GBHackers Security | #1 Globally Trusted Cyber Security News Platform
I recently got into Linux kernel development by rewriting a driver from C to Rust.| blog.buenzli.dev
Ubuntu Server is one of the most widely used Linux server distributions out there. Whether you’re spinning up cloud instances or managing a homelab, chances are you’ve interacted with it. But with Ubuntu 26.04 LTS on the horizon (scheduled for release in April 2026), the Ubuntu team is taking a closer look at some long-standing … The post Bye Screen and Wget, Hello Tmux and Curl – Ubuntu Is Replacing Old Tools appeared first on howtouselinux.| howtouselinux
Earlier this month, a subtle but significant change was quietly reverted in the Linux kernel’s development branch: a patch that had enabled DAMON, a memory access monitoring tool, by default. At first glance, it seemed like a reasonable enhancement. But then Linus Torvalds stepped in and shut it down with a firm “no.” So, what …| howtouselinux
Opinionated Arch/Hyprland Setup. Contribute to basecamp/omarchy development by creating an account on GitHub.| GitHub
In the kernelCTF environment, people tend to leak kernel addresses via hardware side channels. I started to wonder if there were alternative methods to leak the kernel base. During my exploration, I discovered that triggering the WARN() function can produce error messages that include multiple memory addresses — potentially revealing both kernel text and heap addresses.| Blog
Inspired by @4ttil4sz1a’s post on the SSD-disclosure blog, I spent some time understanding how D-Bus and Polkit work on Ubuntu and other Unix-based Linux distributions, with the goal of exploring more kernel attack surfaces.| Blog
The repo Linux kernel exploitation contains a bunch of great resources for learning about Linux kernel vulnerabilities. Among them, the tty and N_GSM subsystems stood out to me - mostly because I’m not too familiar with them. To get a better grasp, I checked out two N_GSM vulnerability write-ups shared by @roddux, which helped me dive into how the tty subsystem is actually implemented.| Blog
1. CVE-2022-49080: mm/mempolicy: fix mpol_new leak in shared_policy_replace https://web.git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4ad099559b00ac01c3726e5c95dc3108ef47d03e| Blog
Part1: The Evolution of Dirty COW (1) Part2: The Evolution of Dirty COW (2)| Blog
Part1: The Evolution of Dirty COW (1) Part2: The Evolution of Dirty COW (2)| Blog
CVE-2024-53104 是一個 Linux kernel UVC (USB Video Class) driver 上的 Out-Of-Bound Write 漏洞,並且在該漏洞被揭露以前,似乎已經在 Android 上使用一陣子了。| Blog
It’s common to see the following code pattern in the release handlers of network protocols:| Blog
Recently, Ubuntu introduced sandbox mechanisms to reduce the attack surface, and they seemed unbreakable. However, after carrying out in-depth research, we found that the implementation contained some issues, and bypassing it was not as difficult as expected. This post will explain how we began our research at the kernel level and discovered a bypass method. We will also share some interesting stories from the process.| Blog
Context| Techdecline's Blog
ZL Audio has released a freeware compressor plugin called ZL Compressor, available for Windows, Linux, and macOS. We’ve already covered ZL Equalizer, a powerful dynamic EQ plugin from the same developer, so it’s interesting to see what they came up with in the realm of compressors. ZL Compressor has four different operating modes: Clean: Modern, transparent [...] View post: ZL Audio just released ZL Compressor dynamics plugin for free| Bedroom Producers Blog
zoxide is a smart and fast alternative to cd that learns your directory usage patterns and allows you to jump to directories quickly. It’s one of my favorite command-line tools and it’s an essential part of my workflow.| (think)
At Electronic Arts (EA), the Frostbite Enginering Workflows team has thousands of developers who work on powerful game engines behind popular games. EA has relied on Visual Studio for years due to several features such as IntelliSense, Build Insights, and the overall debugging experience and eagerly use newer integrations such as GitHub Copilot. They also […]| C++ Team Blog
A line-by-line teardown of the most smug, exclusionary comment I’ve gotten since starting this blog—and why the so-called “freedom” they preach looks a lot more like a wall.| fireborn.mataroa.blog
The Qualys Threat Research Unit (TRU) has discovered two linked local privilege escalation (LPE) flaws. The first (CVE-2025-6018) resides in the PAM configuration of openSUSE Leap 15 and SUSE Linux Enterprise 15. Using this vulnerability, an unprivileged local attacker—for example, via SSH—can elevate to the “allow_active” user and invoke polkit actions normally reserved for a physically present […]| Qualys Security Blog
Red Hat Enterprise Linux (RHEL) is a leading enterprise-grade Linux distribution widely regarded as the gold standard for mission-critical server environments. It provides robust, secure, and scalable solutions for organizations ranging from small bu...| freeCodeCamp Programming Tutorials: Python, JavaScript, Git & More
A couple of lessons learned in moving from Fabric3 to Fabric| Giles' Blog
Let’s do some Docker networking with Zabbix proxies. The presented Docker configurations apply to other similar client-server applications as well, so you may find this useful even if you don…| Majornetwork
We identified a resurgence of the Prometei botnet's Linux variant. Our analysis tracks the activity of this cryptominer and its new features. The post Resurgence of the Prometei Botnet appeared first on Unit 42.| Unit 42
There are many myths about X and Wayland, here I debunk the most common ones.| Felipe Contreras
I ask Enrico Weigelt — the maintainer of the new XLibre fork — a couple of questions about the status and future of Xorg/XLibre.| Felipe Contreras
KDE Mascot Release notes: Now available in the snap store! Along with that, I have fixed some outstanding bugs: Ark: now can open/save files in removable media Kasts: Once again has sound WIP: Upda…| Scarlett Gately Moore
This blog post describes a recent debugging session that led through a surprising set of issues involving Bash, `getcwd()`, and OverlayFS. What started as a simple customer bug report turned into a deep dive worth sharing.| sigma star gmbh
AI Scraper scourge The AI scraper (I can only assume thats what they are) scourge continued, and intensified in the last week. This time they were hitting pagure.io really quite hard. We blocked a bun| Kevin's musings
Desktop environments play an important role in Linux operating systems. And two of the strongest contenders are KDE Plasma and GNOME. Even though both of these have their own set of distinguished properties, one of these would be better for your business than the other. KDE Plasma vs GNOME is one of the oldest debates. […]| CyberPanel
Cause when you fail, somebody has to laugh at you| whynot.fail
JP was puzzled that using podman run --memory=2G … would not result in the 2G limit being visible inside the container. While we were able to identify this as a visualization problem — tools like free| die-welt.net
Learn how to create your first Docker image using a Dockerfile with step-by-step instructions and test it using a simple app.| Make Tech Easier
Ripgrep has a convenience pattern to search for but if you're using regular grep you can use a long regex.| From Development to Production on Nick Janetakis
We'll go over how to set ANSI colors as well as reset them so you can add assorted colors and styles to your scripts.| From Development to Production on Nick Janetakis
We'll go over a plugin to make it easier to filter tab complete results and find commands related to a specific command.| From Development to Production on Nick Janetakis
We'll even support custom logic where you can control running anything depending on which process is running.| From Development to Production on Nick Janetakis
This can be handy for outputting labels in a human readable way.| From Development to Production on Nick Janetakis
In just a few minutes you can have all of your Tmux related configs neatly tucked away outside of your root home directory.| From Development to Production on Nick Janetakis
Sometimes you might want extra features like listing all files except for a specific one, we'll cover a few examples.| From Development to Production on Nick Janetakis
2 of the options are POSIX compliant while one of them depends on Bash. You can pick one based on your preference.| From Development to Production on Nick Janetakis
You can use sed to replace or delete strings but it can also insert text at specific points, here's how.| From Development to Production on Nick Janetakis
This provides a cross OS compatibile diffing tool with great features like showing individual character diffs or directory diffs.| From Development to Production on Nick Janetakis
I ended up rewriting a tool from Bash to Python and one reason for that was processing lines of output in a loop was slow.| From Development to Production on Nick Janetakis
It uses a single CSV file as a data source and comes with a few commands to help you quickly analyze your finances.| From Development to Production on Nick Janetakis
Finding and replacing strings across files is a common thing to do, here's how to send a filtered list of files to xargs and sed.| From Development to Production on Nick Janetakis
We'll go over 2 different solutions that supports multiple matches on different lines and also on the same line.| From Development to Production on Nick Janetakis
We'll focus on using Bash specifically but also include a fallback plan in case you require a POSIX compliant solution.| From Development to Production on Nick Janetakis
IPFire has released Core Update 195 for version 2.29, marking a significant milestone with the introduction of native WireGuard VPN protocol support. This highly anticipated update transforms the open-source firewall distribution by integrating modern VPN capabilities alongside comprehensive security enhancements and system improvements. WireGuard VPN Integration The standout feature of IPFire 2.29 Core Update 195 […] The post Linux Firewall IPFire 2.29 Core Update 195 Released With VPN P...| Cyber Security News
Note to future self: when you want git to tell you all the files you've modified, but not those you've deleted (e.g. to pipe through xargs and feed to your linter for bulk-linting), the command you're looking for is - git diff --name-only --diff-filter=M| Dan Q
Aiming for a 10 year life-cycle for smartphones| postmarketOS
Pipes are ubiquitous in Unix --- but how fast can they go on Linux? In this post we'll iteratively improve a simple pipe-writing benchmark from 3.5GiB/s to 65GiB/s, guided by Linux `perf`.| mazzo.li
La nueva versión de CRUX refuerza su apuesta por la simplicidad, el rendimiento y el control absoluto del sistema por parte del usuario CRUX, una distribución Linux reconocida por su filosofía minimalista y su orientación a usuarios con experiencia, ha lanzado su versión 3.8 este mes de abril de 2025. Como en cada iteración, el […]| Administración de Sistemas
A sleek, modern take on 'ls'| Xer0x's Underground
Since Void Linux uses a rolling release model, there’s not much to report on in the form of new releases and major new features, so I’m taking the release of version 0.60 of XBPS, Void Linux’ package manager, to cheat my way into talking about this excellent Linux distribution. I always think of Void as the “BSD of Linux distributions”, which should give you some vague hint as to what it’s going for. XBPS 0.60 doesn’t come packed with major new features either, and mostly fixes ...| OSnews
Avoid workspaces| blog.z3bra.org
This is a step by step guide shows how to install the next Python 3.14 (so far in Beta3 development stage) in Debian 12 stable, and create virtual environment with it for your project. Python 3.14 is the next major release of the popular programming language that’s scheduled to be released on October 07, 2025. […] The post How to Install & Setup Python 3.14 (Beta so far) in Debian appeared first on FOSTips.| FOSTips
Amazon Linux 2023 (AL2023) has earned FIPS 140-3 Level 1 validation for several of its cryptographic modules. This means it’s now approved for use in systems that need to meet U.S. and Canadian government standards for encryption. FIPS (Federal Information Processing Standard) 140-3 replaces the older 140-2 version. It sets rules for how cryptographic software and hardware should handle things like encryption, key management, and random number generation. In AL2023, modules such as OpenSSL,...| Help Net Security
The future is Wayland. Let’s make sure we’re invited.| fireborn.mataroa.blog
Linux systems face critical local privilege escalation threats via CVE-2025-6018/6019 flaws—users must patch now.| The Hacker News
Any Linux systems administrator needs to be proficient with a wide range of commands for user management, file handling, system monitoring, networking, security and more. This article covers a range of commands that are essential for managing a Linux server. Keep in mind that some commands will depend on the particular Linux distribution you’re using. Managing user accounts and groups Creating user accounts, setting up initial passwords and determining how often they should be changed, sett...| Can Intel cut its way to profit with factory layoffs? | Network World
The people who love Linux love it for a wide variety of reasons. Some of them appreciate having access to source code and the ability (if they’re so inclined) to modify it. Most love that the majority of Linux distributions are completely free. Some understand and appreciate that Linux is less likely to be attacked by malware and viruses than Windows. And, thanks to the open-source community, they appreciate that vulnerabilities are generally patched quite rapidly. Many Linux users apprecia...| Can Intel cut its way to profit with factory layoffs? | Network World
The Lustre filesystem has a long history, some of which intersects with Linux. It was added to [...]| LWN.net
Edit is a new open source command line text editor from Microsoft that supports Windows, macOS and Linux. Learn what it can do, and how to try it on Ubuntu.| OMG! Ubuntu
I managed to get modern SSL/TLS connections working under Windows XP, by running a lightweight Linux VM which strips the TLS headers and re-applies a self-signed certificate:| Kian Bradley’s Blog
Denmark is making 'digital sovereignty' a priority, replacing Microsoft and other US big tech products with Linux and open source. You're reading Denmark’s Government Ditches Microsoft for Open Source, a blog post from OMG! Ubuntu. Do not reproduce elsewhere without permission.| OMG! Ubuntu
A smoother, friendlier and more helpful desktop experience| KDE Community
Stop Netdata’s sensor spam in your logs by tweaking libsensors config. I’ll show you how with examples from my ASUS W680 board.| Bootloader Blog
We spent a whole week rewriting nouveau's website --- the drivers for NVIDIA cards. It started as a one-person effort, but it led to a few people helping me out. We addressed several issues in the nouveau website and improved it a lot. The redesign is live on [nouveau.freedesktop.org](https://nouveau.freedesktop.org). In this article, we'll go over the problems with the old site and the work we've done to fix them.| TheEvilSkeleton
I find that many Linux users have a misconception about immutable distributions without knowing what it actually *is*. There is a lot of misinformation and generalization in the Internet about immutable distributions being “locked down”, “inflexible”, etc., when we could argue the same with many traditional distributions. In this article, we'll look at what makes an immutable distribution, the concept of an immutable distribution versus implementations, misconceptions about immutable ...| TheEvilSkeleton
Flatpak's permissions can be confusing. Some are technical and need knowledge on how they work, and others are self-explanatory. Some are added before the app starts, known as static permissions, and some are requested when the user runs the app, known as dynamic permissions. Many may also criticize Flatpak for lacking Android-style permissions while being unaware of the existence of XDG Desktop Portals. In this article, I'm going to explain: - What static and dynamic permissions are - The di...| TheEvilSkeleton
Recently, GNOME added an option into GNOME Settings to adjust pointer acceleration, which was a feature that the developers and designers were originally against. One person managed to convince them, by giving one reason. Thanks to them, pointer acceleration options are now available in GNOME Settings! Firstly, I’m going to summarize the relevant parts of the proposal and discussion behind the addition, and explain how it was accepted. Then, to build on top of that, GNOME’s philosophy and...| TheEvilSkeleton
In this post, I explain how to create and share a LVM logical volume over the network via NFS. One of the reasons I use this approach is to provide more storage capacity to existing nodes without h…| Technical Scratchpad
Kaspersky GReAT experts describe the new features of a Mirai variant: the latest botnet infections target TBK DVR devices with CVE-2024-3721.| Securelist
This report contains statistics on vulnerabilities and published exploits, along with an analysis of the most noteworthy vulnerabilities we observed in the first quarter of 2025.| securelist.com
Apple has introduced VM-based Containerization at its WWDC (Worldwide Developer Conference), along with Container – an open-source CLI […]| DEVCLASS
Internet Mail, or email, or whatever kids these days call it, was one of those things that terrified me very early on when I was a strapping young System Administrator. Everything else that I was doing at the time seemed comparitively easy: Linux/BSD installs, system setup, automation, and such …| Das Bityard