Recent Changes - Search:

Linux is free.
Life is good.

Linux Training
10am on Meeting Days!

1825 Monetary Lane Suite #104 Carrollton, TX

Do a presentation at NTLUG.

What is the Linux Installation Project?

Real companies using Linux!

Not just for business anymore.

Providing ready to run platforms on Linux

Show Descriptions... (Show All/All+Images) (Single Column) - Security Advisories

  • RedHat: RHSA-2019-0082:01 Moderate: python-django security update
    ``/bb: An update for python-django is now available for Red Hat OpenStack Platform 13.0 (Queens). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  • RedHat: RHSA-2019-0094:01 Moderate: redis security update
    ``/bb: An update for redis is now available for Red Hat OpenStack Platform 13.0 (Queens). Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which

  • [$] Adiantum: encryption for the low end
    Low-end devices bound for developing countries, such as those running the Android Go edition, lack encryption support because the hardware doesn't provide anycryptographic acceleration. That means users in developing countries haveno protection for the data on their phones. Google would like to changethat situation. The company worked on adding the Speck cipher to thekernel, but decided against using itbecause of opposition due to Speck's origins at the US NationalSecurity Agency (NSA). As a replacement, the Adiantum encryption mode wasdeveloped; it has been merged for Linux 5.0.

  • Security updates for Wednesday
    Security updates have been issued by Debian (systemd and wireshark), Fedora (openssh, php-horde-Horde-Form, and unrtf), Mageia (aria2, libvncserver, x11vnc, and nss), Oracle (kernel and libvncserver), Scientific Linux (libvncserver), SUSE (kernel, soundtouch, webkit2gtk3, and wget), and Ubuntu (libcaca and policykit-1).

  • [$] Ringing in a new asynchronous I/O API
    While the kernel has had support for asynchronousI/O (AIO) since the 2.5development cycle, it has also had people complaining about AIO for aboutthat long. The current interface is seen as difficult to use andinefficient; additionally, some types of I/O are better supported thanothers. That situation may be about to change with the introduction of a proposednew interface from Jens Axboe called "io_uring". As might be expectedfrom the name, io_uring introduces just what the kernel needed more than anything else:yet another ring buffer.

  • Google Summer of Code mentor projects sought
    It is that time of year again: Google is lookingfor mentor projects for the 2019 Summer of Code. "GSoC is aglobal program that draws university student developers from around theworld to contribute to open source. Each student spends three monthsworking on a coding project, with the support of volunteer mentors, forparticipating open source organizations from late May to August. Last year1,264 students worked with 206 open source organizations." Theapplication deadline is February 6.

  • [$] Fedora, UUIDs, and user tracking
    "User tracking" is generally contentious in free-software communities—evenif the "tracking" is not really intended to do so. It is oftendistributions that have the most interest in counting their users, butLinux users tend to be more privacy conscious than users of more mainstreamdesktop operating systems. The Fedora project recently discussed how tocount its users and ways to preserve their privacy while doing so.

  • Security updates for Tuesday
    Security updates have been issued by Arch Linux (irssi and systemd), CentOS (systemd), Debian (xen and zeromq3), Fedora (gnutls, kernel, kernel-headers, kernel-tools, and nbdkit), Oracle (libvncserver and systemd), Red Hat (libvncserver), and Ubuntu (haproxy, libarchive, and php-pear).

  • An ancient OpenSSH vulnerability
    An advisory from Harry Sintonen describes several vulnerabilities in thescp clients shipped with OpenSSH, PuTTY, and others. "Manyscp clients fail to verify if the objects returned by the scp server matchthose it asked for. This issue dates back to 1983 and rcp, on which scp isbased. A separate flaw in the client allows the target directory attributesto be changed arbitrarily. Finally, two vulnerabilities in clients mayallow server to spoof the client output." The outcome is that ahostile (or compromised) server can overwrite arbitrary files on the clientside. There do not yet appear to be patches available to address theseproblems.

  • Security updates for Monday
    Security updates have been issued by Arch Linux (python-django and python2-django), Debian (sqlite3, systemd, and vlc), Fedora (mingw-nettle and polkit), Mageia (graphicsmagick, python-django, spice-vdagent, and to), openSUSE (aria2, discount, gpg2, GraphicsMagick, gthumb, haproxy, irssi, java-1_7_0-openjdk, java-1_8_0-openjdk, libgit2, LibVNCServer, and sssd), Red Hat (systemd), Scientific Linux (systemd), Slackware (irssi and zsh), SUSE (LibVNCServer and sssd), and Ubuntu (gnome-bluetooth and systemd).

  • Kernel prepatch 5.0-rc2
    The second 5.0 prepatch is out for testing."So the merge window had somewhat unusual timing with the holidays,and I was afraid that would affect stragglers in rc2, but honestly, thatdoesn't seem to have happened much. rc2 looks pretty normal."

LXer Linux News

  • What’s New in MX Linux 18 Continuum
    MX Linux 18 codename Continuum has been released, this release features Xfce 4.12 as default environment include xfce4 component, based on Debian 9.6 scratch and powered by Linux Kernel 4.19 series, which means that it offers support for the latest hardware components available on the market.

  • Bash Shell Utility Reaches 5.0 Milestone
    As we look forward to the release of Linux Kernel 5.0 in the coming weeks, we can enjoy another venerable open source technology reaching the 5.0 milestone: the Bash shell utility. The GNU Project has launched the public version 5.0 of GNU/Linux’s default command language interpreter.

  • Why teachers should get out of their comfort zones and into the open
    Through several years of hard work and many iterations, my fellow teachers and I were eventually able to develop a comprehensive, school-wide project-based learning model, where students worked in collaborative teams on projects that made real connections between required curriculum and community-based applications. Doing so gave these students the ability to develop skills they can use for a lifetime...

  • How To Install and Configure Redmine on CentOS 7
    Redmine is one of the most popular open source project management and issue tracking software tools. It is cross-platform and cross-database and built on top of the Ruby on Rails framework. In this tutorial we will cover the steps needed to install and configure the latest version of Redmine on an CentOS 7 server using MariaDB as a database back-end and Passenger + Nginx as a Ruby application server.

  • Ten Years After - Opening Worlds
    There are still people in the technology field today that consider Linux a "hobbiest" toy. Can a serious student get through 6 years of college with just Linux? Some can, and some cannot. We'll take a look at the latter here.

  • Data Types & Data Modelling In MySQL - MySQL Series Part 2
    In this article, we will be learning about the various data types in MySQL and also how data modeling is done. I am assuming you have a working instance of MySQL on your computer. If not, you can read the step by step installation instructions.

  • The Evil-Twin Framework: A tool for testing WiFi security
    The increasing number of devices that connect over-the-air to the internet over-the-air and the wide availability of WiFi access points provide many opportunities for attackers to exploit users. By tricking users to connect to rogue access points, hackers gain full control over the users' network connection, which allows them to sniff and alter traffic, redirect users to malicious sites, and launch other attacks over the more


	Copyright 2019|Linux Insider"LinuxInsider"]]
  • Blue Collar Linux: Something Borrowed, Something New
    Sometimes it takes more than a few tweaks to turn an old-style desktop design into a fresh new Linux distribution. That is the case with the public release of Blue Collar Linux. Blue Collar Linux has been under development for the last four years. Until its public release this week, it has circulated only through an invitation for private use by the developer's family, friends and associates looking for an alternative to the Windows nightmare.

  • Top Open Source Tools for Staying on Time and on Task
    Keeping up to date with multiple daily activity calendars, tons of information, and long must-do lists can be a never-ending challenge. This week's Linux Picks and Pans reviews the best open source Personal Information Managers that will serve you well on whatever Linux distribution you run. In theory, computer tools should make managing a flood of personal and business information child's play.

  • Where Linux Went in 2018 - and Where It's Going
    For those who try to keep their finger on the Linux community's pulse, 2018 was a surprisingly eventful year. Spread over the last 12 months, we've seen various projects in the Linux ecosystem make great strides, as well as suffer their share of stumbles. All told, the year wrapped up leaving plenty to be optimistic about in the year to come, but there is much more on which we can only speculate.

  • Kodachi Builds Privacy Tunnel for Linux
    Online and Internet security are not topics that typical computer users easily comprehend. All too often, Linux users put their blind trust in a particular distribution and assume that all Linux OSes are equally secure. However, not all Linux distros are created with the same degree of attention to security and privacy control. Kodachi Linux offers an alternative to leaving them to chance.

  • Breaking Up the Crypto-Criminal Bar Brawl
    As if e-commerce companies didn't have enough problems with transacting securely and defending against things like fraud, another avalanche of security problems -- like cryptojacking, the act of illegally mining cryptocurrency on your end servers -- has begun. We've also seen a rise in digital credit card skimming attacks against popular e-commerce software such as Magento.

  • Q4OS: A Diamond in the Rough Gets Some Polish
    Sometimes working with Linux distros is much like rustling through an old jewelry drawer. Every now and then, you find a diamond hidden among the rhinestones. That is the case with Q4OS. I took a detailed first look at this new distro in February 2015, primarily to assess the Trinity desktop. That was a version 1 beta release. Still, Trinity showed some potential. I have used it on numerous old and new computers.

  • Pantheon Desktop Makes Linux Elementary
    Developers of U.S.-based Elementary OS recently released the community's annual major update, Juno 5. What makes this distro so nontraditional is its own desktop interface, called "Pantheon." This desktop interface is somewhat of a hybrid, inspired by Apple's Debian Ubuntu-based OS X. It combines some similarities of the GNOME 3 Shell with the visual finesse of the OS X dock.

  • The Road Ahead for Open Source
    Linux and the open source business model are far different today than many of the early developers might have hoped. Neither can claim a rags-to-riches story. Rather, their growth cycles have been a series of hit-or-miss milestones. The Linux desktop has yet to find a home on the majority of consumer and enterprise computers. However, Linux-powered technology has long ruled the Internet.

  • Deepin Builds a Better Linux Desktop
    Deepin 15.8, released last month, is loaded with more efficient layout tweaks that give the distribution greater functionality and maturity. Deepin, based in China, shed its Ubuntu base when with the 2015 release of version 15, which favored Debian Linux. That brought numerous subtle changes in the code base and software roots. Ubuntu Linux itself is based on Debian.

  • How to Use a VPN for Safer Online Shopping
    With the holidays fast approaching, are you looking to buy presents online? The holiday season has become synonymous with online shopping. This isn't really surprising as physical stores usually attract crowds of deal hunters. This often conjures up images of throngs of people waiting in line outside the store, some even camping out. This activity is tolerable for some and even fun for others.


  • LG Will Launch a Phone With a Second Screen Attachment
    An anonymous reader quotes a report from CNET: LG's next smartphone may have you seeing double. And no, it's not because of a foldable display. The company will launch a smartphone, whose name hasn't been finalized, that will have an option for a second-screen attachment, according to a person familiar with the situation. The attachment, which the person describes as a sort of case with a screen, could potentially double the total screen size of the device. It's one of multiple phones launching at the Mobile World Congress trade show next month, the person said. While the company is mulling the G8 name, it's unclear whether the multiple-screen phone will carry the name of its flagship line. There was some confusion over LG launching a foldable smartphone thanks to a report by Korean-language outlet Naver. But this phone won't fold.

    Read more of this story at Slashdot.

  • Elon Musk Wants To Put An AI Hardware Chip In Your Skull
    "iTMunch reports that Elon Musk apparently believes that the human race can only be "saved" by implanting chips into our skulls that make us half human, half artificial intelligence," writes Slashdot reader dryriver. From the report: Elon Musk's main goal, he explains, is to wire a chip into your skull. This chip would give you the digital intelligence needed to progress beyond the limits of our biological intelligence. This would mean a full incorporation of artificial intelligence into our bodies and minds. He argues that without taking this drastic measure, humanity is doomed. There are a lot of ethical questions raised on the topic of what humanity according to Elon Musk exactly is, but he seems undeterred. "My faith in humanity has been a little shaken this year," Musk continues, "but I'm still pro-humanity." The seamless conjunction of humans and computers gives us humans a shot at becoming completely "symbiotic" with artificial intelligence, according to Elon Musk. He argues that humans as a species are all already practically attached to our phones. In a way, this makes us almost cyborg-like. The only difference is that we haven't managed to expand our intelligence to that level. This means that we are not as smart as we could be. The data link that currently exists between the information that we get from our phones or computers is not as fast as it could be. "It will enable anyone who wants to have superhuman cognition," Musk said. "Anyone who wants." As for how much smarter humans will become with these AI chips, Musk writes: "How much smarter are you with a phone or computer or without? You're vastly smarter, actually," Musk said. "You can answer any question pretty much instantly. You can remember flawlessly. Your phone can remember videos (and) pictures perfectly. Your phone is already an extension of you. You're already a cyborg. Most people don't realize you're already a cyborg. It's just that the data rate [...] it's slow, very slow. It's like a tiny straw of information flow between your biological self and your digital self. We need to make that tiny straw like a giant river, a huge, high-bandwidth interface."

    Read more of this story at Slashdot.

  • Collection 1 Data Breach Exposes More Than 772 Million Email Addresses
    A collection of almost 773 million unique email addresses and just under 22 million unique passwords were exposed on cloud service MEGA. Security researcher Troy Hunt said the collection of data, dubbed Collection #1, totaled over 12,000 separate files and more than 87GB of data. ZDNet reports: "What I can say is that my own personal data is in there and it's accurate; right email address and a password I used many years ago," Hunt wrote. "In short, if you're in this breach, one or more passwords you've previously used are floating around for others to see." Some passwords, including his own, have been "dehashed", that is converted back to plain text. Hunt said he gained the information after multiple people reached out to him with concerns over the data on MEGA, with the Collection #1 dump also being discussed on a hacking forum. "The post on the forum referenced 'a collection of 2000+ dehashed databases and Combos stored by topic' and provided a directory listing of 2,890 of the files," Hunt wrote.  The collection has since been removed. You can visit Hunt's Have I Been Pwned service to see if you are affected by this breach.

    Read more of this story at Slashdot.

  • Fasting Can Improve Overall Health By Causing Circadian Clocks In the Liver and Skeletal Muscle To Rewire Their Metabolism, Study Finds
    An anonymous reader quotes a report from ScienceDaily: In a University of California, Irvine-led study, researchers found evidence that fasting affects circadian clocks in the liver and skeletal muscle, causing them to rewire their metabolism, which can ultimately lead to improved health and protection against aging-associated diseases. The study was published recently in Cell Reports. The research was conducted using mice, which were subjected to 24-hour periods of fasting. While fasting, researchers noted the mice exhibited a reduction in oxygen consumption (VO2), respiratory exchange ratio (RER), and energy expenditure, all of which were completely abolished by refeeding, which parallels results observed in humans.   "The reorganization of gene regulation by fasting could prime the genome to a more permissive state to anticipate upcoming food intake and thereby drive a new rhythmic cycle of gene expression. In other words, fasting is able to essentially reprogram a variety of cellular responses. Therefore, optimal fasting in a timed manner would be strategic to positively affect cellular functions and ultimately benefiting health and protecting against aging-associated diseases." This study opens new avenues of investigation that could ultimately lead to the development of nutritional strategies to improve health in humans.

    Read more of this story at Slashdot.

  • Key West Moves To Ban Sunscreens That Could Damage Reefs
    Yesterday, the Key West City Commission unanimously voted to ban the sale of sunscreens that contain two ingredients -- oxybenzone and octinoxate -- that a growing body of scientific evidence says harm coral reefs. The measure must now be reviewed again by the commission before it becomes law. The second vote is scheduled for February 5th. Miami Herald reports: Environmental researchers have published studies showing how these two ingredients, which accumulate in the water from bathers or from wastewater discharges, can damage coral reefs through bleaching and harming the corals' DNA. In some instances, the corals can die. A Feburary 2016 study in the Archives of Environmental Contamination and Toxicology examining the impact of oxybenzone in corals in Hawaii and the U.S. Virgin Islands concluded that the sunscreen ingredient "poses a hazard to coral reef conservation and threatens the resiliency of coral reefs to climate change.''   Last year, Hawaii banned the sale or distribution of any sunscreens containing oxybenzone and octinoxate, a measure that will go into effect on Jan. 1, 2021. It was the first state in the nation to implement such a ban. In Florida, the website for the South Florida Reef Ambassador Initiative, which falls under the state's Department of Environmental Protection, tells divers to "Avoid sunscreens with Oxybenzone and Avobenzone. The benzones are compounds that are lethal to coral reproduction in very small amounts." Experts who have studied the issue say sunscreens with zinc oxide or titanium dioxide, which are minerals, also block ultraviolet rays. They create a barrier on the skin that deflect the sun's rays .

    Read more of this story at Slashdot.

  • Researchers Report Breakthrough In Ice-Repelling Materials
    "Researchers from the University of Houston have reported a new theory in physics called stress localization, which they used to tune and predict the properties of new materials," reports Phys.Org. "Based on those predictions, the researchers reported in Materials Horizons that they have created a durable silicone polymer coating capable of repelling ice from any surface." The new research has huge implications for aircraft, power transmission lines, and more. From the report: Hadi Ghasemi, Bill D. Cook Assistant Professor of mechanical engineering at UH and corresponding author for the work, said the findings suggest a way to take trial and error out of the search for new materials, in keeping with the movement of materials science toward a physics-driven approach. "You put in the properties you want, and the principle will tell you what material you need to synthesize," he said, noting that the concept can also be used to predict materials with superb antibacterial or other desirable properties.   The new material uses elastic energy localization where ice meets the material, triggering cracks at the interface that slough off the ice. Ghasemi said it requires minimal force to cause the cracks; the flow of air over the surface of an airplane acts as a trigger, for example. The material, which is applied as a spray, can be used on any surface, and Ghasemi said testing showed it is not only mechanically durable and unaffected by ultraviolet rays -- important for aircraft which face constant sun exposure -- but also does not change the aircraft's aerodynamic performance. Testing indicates it will last for more than 10 years, with no need to reapply, he said.

    Read more of this story at Slashdot.

  • Fortnite Bugs Gave Hackers Access To Millions of Player Accounts, Researchers Say
    Researchers at cybersecurity firm Check Point say three vulnerabilities chained together could have allowed hackers to take control of any of Fortnite's 200 million players. "The flaws, if exploited, would have stolen the account access token set on the gamer's device once they entered their password," reports TechCrunch. "Once stolen, that token could be used to impersonate the gamer and log in as if they were the account holder, without needing their password." From the report: The researchers say that the flaw lies in how Epic Games, the maker of Fortnite, handles login requests. Researchers said they could send any user a crafted link that appears to come from Epic Games' own domain and steal an access token needed to break into an account.   Here's how it works: The user clicks on a link, which points to an subdomain, which the hacker embeds a link to malicious code on their own server by exploiting a cross-site weakness in the subdomain. Once the malicious script loads, unbeknownst to the Fortnite player, it steals their account token and sends it back to the hacker. "If the victim user is not logged into the game, he or she would have to log in first," a researcher said. "Once that person is logged in, the account can be stolen." Epic Games has since fixed the vulnerability.

    Read more of this story at Slashdot.

  • Marco Rubio Introduces Privacy Bill To Create Federal Regulations On Data Collection
    An anonymous reader quotes a report from Fortune: Senator Marco Rubio (R-Fla.) introduced a bill Wednesday aimed at creating federal standards of privacy protection for major internet companies like Facebook, Amazon, and Google. The bill, titled the American Data Dissemination Act, requires the Federal Trade Commission to make suggestions for regulation based on the Privacy Act of 1974. Congress would then have to pass legislation within two years, or the FTC will gain the power to write the rules itself (under current laws, the FTC can only enforce existing rules). While Rubio's bill is intended to reign in the data collection and dissemination of companies like Facebook, Amazon, Apple, Google, and Netflix, it also requires any final legislation to protect small businesses from being stifled by new rules. The caveat comes when one considers states' rights to create their own privacy laws. Under Rubio's legislation, any national regulations would preempt state laws -- even if the state's are more strict. "While we may have disagreements on the best path forward, no one believes a privacy law that only bolsters the largest companies with the resources to comply and stifles our start-up marketplace is the right approach," Rubio wrote in an op-ed for The Hill, announcing his bill.

    Read more of this story at Slashdot.

  • Federal Prosecutors Are Investigating Huawei For Allegedly Stealing Trade Secrets, Says Report
    According to The Wall Street Journal, federal prosecutors have launched a criminal investigation to see if Huawei allegedly stole trade secrets from U.S. companies. The probe is reportedly built out of civil lawsuits against the telecommunications firm. The Hill reports: People familiar with the probe told the Journal that it is at an advanced stage and that an indictment could soon be coming. Huawei has long faced scrutiny from both lawmakers and national security officials, who have labeled the firm as a national security threat over its ties to the Chinese government. The company has denied that characterization, and China this week called for other countries to end âoethe groundless fabrications and unreasonable restrictionsâ on Huawei and other firms.

    Read more of this story at Slashdot.

  • New Satellite Network Will Make It Impossible For a Commercial Airplane To Vanish
    pgmrdlm quotes a report from CBS News: For the first time, a new network of satellites will soon be able to track all commercial airplanes in real time, anywhere on the planet. Currently, planes are largely tracked by radar on the ground, which doesn't work over much of the world's oceans. The final 10 satellites were launched Friday to wrap up the $3 billion effort to replace 66 aging communication satellites, reports CBS News' Kris Van Cleave, who got an early look at the new technology. On any given day, 43,000 planes are in the sky in America alone. When these planes take off, they are tracked by radar and are equipped with a GPS transponder. All commercial flights operating in the U.S. and Europe have to have them by 2020. It's that transponder that talks to these new satellites, making it possible to know exactly where more than 10,000 flights currently flying are.

    Read more of this story at Slashdot.

The Register

  • Like, subscribe and comment: Sage takes a breath as cloud sales bounce
    'Ecncouraging' numbers as it switches from licensing to subs push
    Shape-shifting accounting software biz Sage issued a trading update this morning and the good news - for investors at least - is that it didn't contain any nasty surprises, but did highlight a bounce in cloud sales.…

  • Diplomat warns that tech industry has become a pawn as politicos fight dirty
    They see AI, cybersecurity as 'battle fronts' - and rising populism will make it worse - former UN official
    Oracle OpenWorld Technology and cyber security will be the "battle fronts" of global competition, and artificial intelligence will become crucial to the US-China trade war, a former UN official has said.… offline for now


  • ZFS On Linux Landing Workaround For Linux 5.0 Kernel Support
    Last week I reported on ZFS On Linux breaking with Linux 5.0 due to some kernel symbols sought by this out-of-tree file-system driver no longer being exported and the upstream developers not willing to adjust for the ZoL code. That's still the case but the ZFS On Linux developers have a patch so at least the file-system driver will be able to build on Linux 5.0...

  • GNOME's Builder IDE Goes Through Its Biggest Code Refactoring Ever
    The lead developer of the GNOME Builder integrated development environment, Christian Hergert, has just led his project through its largest code re-factoring yet. Builder 3.32 coming out in March with GNOME 3.32 features more than 100k lines of code changed with various underlying improvements as well as some new features for developers...

  • Systemd 241 Paired With Linux 4.19+ To Enable New Regular File & FIFO Protection
    The Linux 4.19 kernel brought the ability to disallow the opening of FIFOs and regular files not owned by the user in world-writable sticky directories in the name of security. Had this ability been around previously it could have prevented a number of CVEs going back a long time. In helping ensure this functionality gets utilized, Systemd 241 will now set these sysctl options to enable the behavior by default...

  • Fedora Still Needs Help Testing The New Zchunk Metadata Support
    Fedora has been working on transitioning to Zchunk for its DNF metadata due to its good compression ratio while being delta-friendly and leveraging the existing work of Zstandard and Zsync/casync. The metadata has been offered in Zchunk for some weeks while more client testing is needed before landing that support in Rawhide and in turn for Fedora 30...

  • Intel To Eventually Explore Offering A Graphics Control Panel For Linux Systems
    Intel's Linux graphics driver stack has never offered its own vendor-specific driver control panel GUI like is common among all major graphics vendors on Windows, but instead they've opted for the command-line experience and making use of common interfaces with what's offered by the different desktop environments for resolution handling, multi-monitor setup, etc. But moving forward they may end up bringing a new graphics driver control panel to Linux...

  • Mesa 19.0 Deprecates GNU Autotools Build System In Favor Of Meson
    Last month was a proposed patch that would have killed the Autotools build system within Mesa. Developers have decided for the upcoming Mesa 19.0 release not to eliminate this GNU Autotools support but rather to mark it as deprecated and require an extra flag in order to make use of it...

Engadget"Engadget RSS Feed"

  • Facebook purges more than 500 Russian-led disinformation pages

    "Coordinated Inauthentic Behavior" is such an anodyne way of describing weaponizing information to poison attitudes and democracies. That's the euphemism that Facebook is employing to talk about its latest purge of accounts and pages that may be part of a Russian disinformation campaign. More than 500 pages and accounts have recently been removed, according to a report by Facebook's cybersecurity policy chief.

    In a blog post, Nathaniel Gleicher says that the problematic pages came from Russia, and operated in the Baltics, Central Asia, the Caucasus, the Ukraine, as well as in Europe. The accounts were made up to look like individual politicians, or general-interest websites covering news, sports, weather and politics.

    Facebook included statistics for one Russian network of 364 pages and 75 profiles, which spent around $135,000 on Facebook Ads. These ads ran from October 2013 through January 2019, and the network created 190 events, of which 1,200 people expressed interest in attending. It's not clear if any of them actually took place, but the creation of fake events is a tactic that's been seen several times before.

    A second network of 107 pages and 41 Instagram accounts, identified by US law enforcement, was directly targeted to the Ukraine. Facebook didn't go into details, but said that it found "technical overlap" with other fake news and opinion hacking tactics it found during the US midterms. This behavior is consistent with the actions of Russia's so-called troll-farm, the Internet Research Agency.

    This network had grown an audience of around 180,000 followers on Facebook, with another 55,000 people following the Instagram pages. Similarly, Facebook received $25,000 in ad spending from this network, with ads running from January 2018 through to that December.

    According to Facebook, the people behind the larger of the two networks were tied to, or employees of, Russian "news" outlet Sputnik. Like RT, Sputnik is funded directly by the Russian government, and both are perceived as being a propaganda or information warfare vehicle for the Kremlin. Both are of interest to law enforcement agencies, and have been targeted by Twitter and Google in the past.

    In 2017, Google pledged to down-rank both Sputnik and RT in its news platform to prevent what it saw as disinformation from spreading. That same year, Twitter announced that it would no longer take advertising money from RT and Sputnik, although it did not suspend their accounts. In addition, Twitter said that it would donate the $1.9 million in fees it had received to charity. Facebook has not yet commented on what it plans to do with the $160,000 it received in fees.

    Source: Facebook Newsroom

  • Facebook makes its image compression tech available to all

    Most applications need to compress the photos you upload, because better cameras also mean bigger image files. The larger the file is, the more data you use and the longer the upload takes. Facebook is helping smaller developers address the need for image compression by releasing the technology it developed for faster image uploads as an open source tool. It's called Spectrum, and it can be integrated into iOS and Android projects, so you'll likely come across it on non-Facebook apps whichever platform you use.

    Now, Facebook isn't exactly known for fantastic image compression -- if you regularly upload photos through its mobile app, you might even consider its optimization powers kinda lousy. It might do a better job than what some developers can come up with, though, and can provide the function for those who'd rather not write custom programs. Facebook says Spectrum has "improved reliability and quality of image uploads across [its] apps" and says the tool can reduce file sizes for up to 15 percent while maintaining their quality. The open source project is now available on GitHub.

    Source: Spectrum

  • Tesla's referral perks are going away

    Tesla is ending its customer referrals scheme that gives free electric charging to its EV buyers, among other perks. In a tweet, Elon Musk announced the program will end on February 1st, stating in a subsequent reply that it's "adding too much cost to the cars, especially Model 3." Asked if Tesla was replacing it with another program, Musk responded: "no, the whole referral incentive system will end."

    The program started life in 2015 with the aim of boosting word-of-mouth around Tesla's vehicles. In its current form, it lets Tesla owners "give five friends six months of free Supercharging with the purchase of a new Model S, Model X or Model 3" using referral codes. An additional three months of free Supercharging is included "if they order without ever having taken a test drive." Other benefits span free chargers, toys for kids, deals on solar panels, and the option to launch your photo into deep space orbit. Tesla also scrapped its lifetime free Supercharging offer last September.

    According to January 17, 2019No, the whole referral incentive system will end
    — Elon Musk (@elonmusk) January 17, 2019Yes, ending on Feb 1. It's adding too much cost to the cars, especially Model 3.
    — Elon Musk (@elonmusk) January 17, 2019
    Source: Elon Musk (Twitter)

  • Microsoft pledges $500 million to help Seattle's housing crisis

    Microsoft is putting its massive balance sheet to good use by pledging $500 million to help address the housing crisis in the greater Seattle area. According to compromised on a tax proposal meant to raise funds for affordable housing and homeless residents. If you'll recall, the city wanted to tax big companies $500 per employee per year, but it had to settle for half that amount after pushback from Amazon. Based on what its consultant found out, the region has "counterintuitively done less to build middle-income housing than low-income housing, especially in the suburbs." That's why the tech giant is splitting its pledge into three.

    Microsoft is lending $225 million to developers to subsidize the preservation and construction of middle-income housing meant for households making between $62,000 and $124,000 per year. The offer will initially be available in Redmond and nearby cities Bellevue, Kirkland, Issaquah, Renton and Sammamish. Meanwhile, it's earmarking $250 million for low-income housing development across the King County region meant for households making $48,150 for two persons. Microsoft expects to make very little profit from the loans, and anything it earns will be reinvested back into the project. The remaining $25 million will be given as philanthropic grants to organizations working to address homelessness in the area.

    Microsoft President Brad Smith and CFO Amy Hood wrote in a blog post:

    "If we're going to make progress, we'll all need to work together as a community. We recognize that Microsoft is in a unique position to put the size of its balance sheet behind this effort... Ultimately, a healthy business needs to be part of a healthy community. And a healthy community must have housing that is within the economic reach of every part of the community, including the many dedicated people that provide the vital services on which we all rely."

    The company knows it can't just throw money at the problem to make it go away, though -- it's not even entirely sure how much $500 million can help. In an effort to make a bigger impact, Microsoft also plans to encourage policy changes for the development of affordable housing in state legislative sessions.

    Source: Microsoft, The New York Times, The Seattle Times

  • 'Sea of Thieves' will take up less space after pending update

    There is good news and bad news for Sea of Thieves players regarding the game's next update. The bad news is you'll have to download and reinstall the entire game. The good news is, as a result of some behind the scenes improvements made by developer Rare, the game installation size will be cut by nearly half on all platforms.

    The update will arrive on February 6th and will be larger than the standard update -- understandably so, seeing as you'll have to reinstall the entire game. However, once the installation is complete, the developers feel confident that they will be able to better optimize updates in the future and keep the amount of hard drive space required for the ever-growing game down to a reasonable size.

    According to the developers, the update will bring down the installation size for the game across the board. The Xbox One version of the game will drop from 35GB to 10GB, Xbox One X will go from 47GB to 25GB and PC will shrink from 47GB to 27GB. Once the update has finished downloading, it should install automatically so you can jump back into the game.

    Source: Microsoft

  • Ford is developing a fully electric F-series pickup truck

    Ford is taking steps to future-proof its business by developing not just a hybrid, but a fully electric pickup truck. Jim Farley, Ford president of global markets, has announced at an event in Detroit that the automaker is electrifying the F-series. The company has been working on a hybrid version of the F-150 since 2015, but this is a completely different project. Unfortunately, Farley didn't confirm which particular model is going to get the EV treatment.

    It wouldn't come as a surprise if Ford is also making a pure electric version of the F-150, though, seeing as it is one of the most recognizable and best-selling American vehicles. The iconic pickup accounts for around a third of the automaker's sales in the US and has a long history behind it, dating back to 1975. It's the perfect model for this project, which feels like a natural development following Ford's investments in the EV market.

    By developing an electric pickup, Ford is hoping that it'll be able to keep up with rivals that are also creating their own. A startup called Rivian unveiled its own take on the category in 2018, and even the vastly more popular Tesla is planning to conjure up an electric pickup truck of its own within the next few years.

    Via: Autoblog

    Source: Detroit Free Press

  • Android Q may include a dark theme and desktop mode

    Many Android users still don't have Pie yet, but details are already emerging for its follow-up. XDA says it has obtained a very early build of Android Q (Quiche? Queso?) that hints at Google's plans. For one, there's a system-wide dark theme. This might be particularly helpful if you're trying to save power on an OLED-equipped phone or just don't want to blind yourself at night. There's a developer option to force the dark mode on apps that don't support it, hinting that it may take a while before every app honors the feature.

    You'll also find a developer option that would "force experimental desktop mode on secondary displays," which might refer to a Samsung DeX-style view. Don't count on it reaching the finished version (it wouldn't even work when XDA enabled it), but Google appears to be considering the idea at a minimum.

    Most other elements in this build are minor (such as wallpaper for all devices with always-on displays). There is an important change to privacy, though. Much as with iOS, you can limit permissions for location and other sensitive features so that it runs only while an app is in the foreground. You wouldn't have to worry about an app gathering data behind your back, or a GPS app chewing up your battery when you aren't using it. A revamp of the overall permissions section would give you a quick glimpse of the features your apps are using.

    You'll probably have to be patient before you can try Android Q yourself, regardless of how many elements survive the development gauntlet. Google didn't release the Android P public preview until May of 2018, and the completed version waited until August. This is more of a tentative glance at the future than a definitive peek.

    Source: XDA-Developers

  • Collection 1 data breach covers more than 772 million email addresses

    If you're signed up for one of the many services that alerts you to data breaches when they're discovered (if you're not, you probably should be) then you likely have an email waiting for you. Troy Hunt runs Have I Been Pwned where he makes it his business to dig up these files as they're being passed around by hackers, and has alerted the world to "Collection #1," which claims to combine usernames and passwords from thousands of databases.

    That includes some where the password data may have been stored encrypted, so if someone has managed to crack open a site where you had an account registered, it's likely they have your info and know what password you were using. If you've logged into a customer support portal or some random forum with your email address and used the same password you use for your main email account, Netflix, Facebook or other accounts, then it could be trivially easy for someone to have that and use it to log in as you.
    Now emailing 768,253 individuals who subscribed for notifications and another 39,923 who are monitoring domains...
    — Troy Hunt (@troyhunt) January 16, 2019
    Unfortunately, for reasons Hunt explains in his blog post, it's impossible to see what account or password may have been included via his site, which is why you should probably be using a password manager (if you have a truly unique password, you can see if it's ever been exposed in one of the breaches on this page). That would make it easy to maintain unique passwords wherever you have accounts, and easily change them if there's a breach.

    So to recap -- sign up for Have I Been Pwned, it's free and can alert you to breaches quickly. Use unique passwords, which could be easier to do if you use a password manager like 1Password or LastPass, or even if you just write them down and store them securely, in addition to multifactor authentication where available. You can't stop your information from popping up in breaches like this, but taking those steps can lower the risk of impact before your personal Facebook page starts offering deep discounts on Ray-Bans or someone in Latvia is adding to your Spotify playlists.

    Source: HIBP


  • Microsoft decouples Cortana and Search in Windows 10s taskbar
    Microsoft has released a new Windows Insider preview build, and it contains a significant chance were all going to be happy about. Going forward, we’ll be decoupling Search and Cortana in the taskbar. This will enable each experience to innovate independently to best serve their target audiences and use cases. Some Insiders have had this update for a few weeks now, and we appreciate all the feedback we’ve received about it so far! For those new to this update, when it rolls out to you, you’ll find clicking the search box in the taskbar now launches our experience focused on giving you the best in house search experience and clicking the Cortana icon will launch you straight into our voice-first digital assistant experience. Cortana is useless, and any steps Microsoft takes to get it out of my way is welcome to me.

  • Early Android Q build has a system-wide dark theme, permission revamp, more
    The early Android Q leaked build we have obtained was built just this week with the February 2019 security patches, and it’s up-to-date with Google’s AOSP internal master. That means it has a ton of new Android platform features that you won’t find anywhere publicly, but there are no Google Pixel software customizations nor are there pre-installed Google Play apps or services so I don’t have any new information to share on those fronts. Still, there’s a lot to digest here, so we’ve flashed the build on the Pixel 3 XL to find out what’s new—both on the surface-level and under-the-hood. This article will focus on all the surface-level changes we’ve found in Android Q. Theres a lot of good stuff in here, most notably a complete redesign of the permissions user interface, as well as even stricter limitations on what applications can do, such as only granting certain permissions while the application in question is in use. Theres also a system-wide dark mode, hints of a DeX-like desktop mode, and a lot more.

  • The curious case of the Raspberry Pi in the network closet
    Christian Haschek found a Raspberry Pi attached in a network closet at the company he works for, and since nobody knew what it was or where it came from, he and his colleagues decided to investigate. I asked him to unplug it, store it in a safe location, take photos of all parts and to make an image from the SD card (since I mostly work remote). I have worked on many Raspberry Pi projects and I felt confident I could find out what it does. At this point nobody thought it was going to be malicious, more like one of our staffers was playing around with something. Interesting  but worrisome  story.

  • Google sets deadlines for 64bit support in Android applications
    64-bit CPUs deliver faster, richer experiences for your users. Adding a 64-bit version of your app provides performance improvements, makes way for future innovation, and sets you up for devices with 64-bit only hardware. We want to help you get ready and know you need time to plan. We’ve supported 64-bit CPUs since Android 5.0 Lollipop and in 2017 we first announced that apps using native code must provide a 64-bit version (in addition to the 32-bit version). Today we’re providing more detailed information and timelines to make it as easy as possible to transition in 2019. Important information for Android developers regarding requirements around 64bit support.

  • Fedora, UUIDs, and user tracking
    User tracking! is generally contentious in free-software communities—even if the tracking! is not really intended to do so. It is often distributions that have the most interest in counting their users, but Linux users tend to be more privacy conscious than users of more mainstream desktop operating systems. The Fedora project recently discussed how to count its users and ways to preserve their privacy while doing so. As always, an exceptionally good article from LWN.

  • DuckDuckGo switches to Apple Maps for search results
    Were excited to announce that map and address-related searches on DuckDuckGo for mobile and desktop are now powered by Apples MapKit JS framework, giving you a valuable combination of mapping and privacy. As one of the first global companies using Apple MapKit JS, we can now offer users improved address searches, additional visual features, enhanced satellite imagery, and continually updated maps already in use on billions of Apple devices worldwide. With this updated integration, Apple Maps are now available both embedded within our private search results for relevant queries, as well as available from the Maps! tab on any search result page. Im sure Apple users in San Francisco will be very happy with this news. For me, this means theres no way Ill be using DuckDuckGos location search and other mapping functions  Apple Maps is entirely unusable in The Netherlands, with severely outdated and faulty maps that are outright dangerous. I understand the privacy angle, but I feel like are better, more accurate options than Apple Maps. The world is larger than Silicon Valley.

  • Intel Core i9-9990XE: up to 5.0 GHz, auction only
    AnandTech has seen documents and supporting information from multiple sources that show that Intel is planning to release a new high-end desktop processor, the Core i9-9990XE. These documents show that the processors will not be sold at retail; rather they will only be sold to system integrators, and then only through a closed online auction.  This new processor will be the highest numbered processor in Intels high-end desktop line. The current top processor is the i9-9980XE, an 18 core part with a base frequency of 3.5 GHz and a turbo frequency of 4.0 GHz. The i9-9990XE, on the other hand, is not simply the 9980XE with an increase in frequency. The Core i9-9990XE will be a 14 core processor, but with a base frequency of 4.0 GHz and a turbo frequency of 5.0 GHz. This makes it a super-binned 9940X. This probably means this is very much a low-yield chip Intel cant make enough of to sell at retail.

  • The first Windows 10 build for foldable devices appears
    According to BuildFeed, which regularly posts about new builds of Windows 10, the first build of a new SKU for foldable devices has been compiled. It comes with the build string rs_shell_devices_foldables.190111-1800, and its from the 19H1 development branch. The build number is 18313.1004. The obvious conclusion to draw is that this is for Microsofts rumored Andromeda device. While the project was shelved back in July, it was originally for a foldable PC that could fit in your pocket. Its likely now that it will be a larger device thats slated for later on this year. Foldable devices are definitely coming this year, but I feel like it might take a while for both users and device and software makers to figure out where, exactly, the fit into our lives.

  • Vintage gaming on Xenix
    This post is about vintage gaming in vintage unusual operating systems, focused on Xenix/x86. Tried Hampas turnkey xenix86 images while they had been tested in fake86, 8086tiny and other emulators. The installation was surprisingly easy, because most software packages in floppy/tape images are basically in .tar format, so lets check GAMES 360k floppy images content on host. I cant get enough of articles like these.

  • Dont kill my app!!
    With Android 6 (Marshmallow), Google has introduced Doze mode to the base Android, in an attempt to unify battery saving across the various Android phones. Unfortunately, vendors (e.g. Xiaomi, Huawei, OnePlus or even Samsung..) did not seem to catch that ball and they all have their own battery savers, usually very poorly written, saving battery only superficially with side effects. Naturally users blame developers for their apps failing to deliver. But the truth is developers do the maximum they can. Always investigating new device specific hacks to keep their (your!) apps working. But in many cases they simply fall short as vendors have full control over processes on your phone. This is a legitimate problem on my OnePlus 6T. I enjoy using this phone, but the aggressive non-standard application cycle management definitely leads to issues with not receiving notifications or login procedures being restarted as you leave an application. It doesnt happen often enough to truly bother me, but I can definitely see how people who make more extensive use of their phone than I do run into this issue every day.

Linux Journal - The Original Magazine of the Linux Community

  • Ditching Out-of-Date Documentation Infrastructure
        by Zack Brown   
    Long ago, the Linux kernel started using 00-Index files to list the contents of each documentation directory. This was intended to explain what each of those files documented. Henrik Austad recently pointed out that those files have been out of date for a very long time and were probably not used by anyone anymore. This is nothing new. Henrik said in his post that this had been discussed already for years, "and they have since then grown further out of date, so perhaps it is time to just throw them out."

    He counted hundreds of instances where the 00-index file was out of date or not present when it should have been. He posted a patch to rip them all unceremoniously out of the kernel.

    Joe Perches was very pleased with this. He pointed out that .rst files (the kernel's native documentation format) had largely taken over the original purpose of those 00-index files. He said the oo-index files were even misleading by now.

    Jonathan Corbet was more reserved. He felt Henrik should distribute the patch among a wider audience and see if it got any resistance. He added:

    I've not yet decided whether I think this is a good idea or not. We certainly don't need those files for stuff that's in the RST doctree, that's what the index.rst files are for. But I suspect some people might complain about losing them for the rest of the content. I do get patches from people updating them, so some folks do indeed look at them.

    Henrik told Jonathan he was happy to update the 00-index files if that would be preferable. But he didn't want to do that if the right answer was just to get rid of them.

    Meanwhile, Josh Triplett saw no reason to keep the 00-index files around at all. He remarked, "I was *briefly* tempted, reading through the files, to suggest ensuring that the one-line descriptions from the 00-INDEX files end up in the documents themselves, but the more I think about it, I don't think even that is worth anyone's time to do."

    Paul Moore also voiced his support for removing the 00-index files, at least the ones for NetLabel, which was his area of interest.

    The discussion ended there. It's nice that even for apparently obvious patches, the developers still take the time to consider various perspectives and try to retain any value from the old thing to the new. It's especially nice to see this sort of attention given to documentation patches, which tend to get left out in the cold when it comes to coding projects.

    Note: if you're mentioned above and want to post a response above the comment section, send a message with your response text to
        Go to Full Article          

  • Keep Smart Assistants from Spying on You with Alias, Security Advisory for Old scp Clients, Major Metasploit Framework Release, Mozilla Working on a New Browser for Android and VirtualBox 6.0.2 Is Out

    News briefs for January 16, 2019.

    A new open-source hardware project called Alias will keep Amazon and  Google smart assistants from spying on you. According to the project's GitHub page, "Alias is a teachable 'parasite' that is designed to give users more control over their smart assistants, both when it comes to customisation and privacy. Through a simple app the user can train Alias to react on a custom wake-word/sound, and once trained, Alias can take control over your home assistant by activating it for you."

    A security advisory from Harry Sintonen was issued this week concerning the scp clients in OpenSSH, PuTTY and more. LWN quotes the advisory: "Many scp clients fail to verify if the objects returned by the scp server match those it asked for. This issue dates back to 1983 and rcp, on which scp is based. A separate flaw in the client allows the target directory attributes to be changed arbitrarily. Finally, two vulnerabilities in clients may allow server to spoof the client output."

    A new major release of the open-source Metasploit Framework is now available. According to the Rapid7 blog post, version 5.0 of the penetration-testing tool is the first milestone update since version 4.0 came out in 2011. Along with a new release cadence, "Metasploit's new database and automation APIs, evasion modules and libraries, expanded language support, improved performance, and ease-of-use lay the groundwork for better teamwork capabilities, tool integration, and exploitation at scale."

    Mozilla is working on a new Android browser called Fenix. According to ZDNet, this "new non-Firefox browser for Android is apparently targeted at younger people, with Mozilla developers on GitHub tagging the description, 'Fenix is not your parents' Android browser'." In addition, mockups suggest that Fenix developers are "currently toying with the idea of putting the URL bar and home button down at the bottom of user interface."

    VirtualBox 6.0.2 was released yesterday, the first maintenance release of the 6.0 series. This release fixed a conflict between Debian and oracle build desktop files, fixed building drivers on SLES 12.4, fixed building shared folder driver with older kernels and much more. See the changelog for all the details.
          News  Security  Metasploit  Mozilla  Android  Fenix  VirtualBox  Privacy  Alias                   

  • Where There's No Distance or Gravity
        by Doc Searls   
    The more digital we become, the less human we remain.

    I had been in Los Angeles only a few times in my life before the October day in 1987 when I drove down from our home in the Bay Area with my teenage son to visit family. The air was unusually clear as we started our drive back north, and soon the San Gabriel MountainsLos Angeles' own Alps (you can ski there!)—loomed over the region like a crenelated battlement, as if protecting its inhabitants from cultures and climates that might invade from the north. So, on impulse, I decided to drive up to Mount Wilson, the only crest in the range with a paved road to the top.

    I could see from the maps I had already studied that the drive was an easy one. Our destination also was easily spotted from below: a long, almost flat ridge topped by the white domes of Mount Wilson Observatory (where Hubble observed the universe expanding) and a bristle of towers radiating nearly all the area's FM and TV signals. The site was legendary among broadcast engineering geeks, and I had longed to visit it ever since I was a ham radio operator as a boy in New Jersey.

    After checking out the observatory and the towers, my son and I stood on a promontory next to a parking lot and surveyed the vast spread of civilization below. Soon four visiting golfers from New York came over and started asking me questions about what was where.

    I answered like a veteran docent, pointing out the Rose Bowl, Palos Verdes Peninsula, Santa Catalina and other Channel Islands, the Hollywood Hills, the San Fernando Valley, the Jet Propulsion Laboratory, Santa Anita Park and more. When they asked where the Whittier Narrows earthquake had happened a few days before, I pointed at the Puente Hills, off to the southeast, and filled them in on what I knew about the geology there as well.

    After a few minutes of this, they asked me how long I had lived there. I said all this stuff was almost as new to me as it was to them. "Then how do you know so much about it?", they asked. I told them I had studied maps of the area and refreshed my knowledge over lunch just before driving up there. They were flabbergasted. "Really?", one guy said. "You study maps?"

    Indeed, I did. I had maps of all kinds and sizes at home, and the door pockets of my car bulged with AAA maps of everywhere I might drive in California. I also added local and regional Southern California maps to my mobile inventory before driving down.
        Go to Full Article          

  • Python Testing with pytest: Fixtures and Coverage
        by Reuven M. Lerner   
    Improve your Python testing even more.

    In my last two articles, I introduced pytest, a library for testing Python code (see "Testing Your Code with Python's pytest" Part I and Part II). pytest has become quite popular, in no small part because it's so easy to write tests and integrate those tests into your software development process. I've become a big fan, mostly because after years of saying I should get better about testing my software, pytest finally has made it possible.

    So in this article, I review two features of pytest that I haven't had a chance to cover yet: fixtures and code coverage, which will (I hope) convince you that pytest is worth exploring and incorporating into your work.
    When you're writing tests, you're rarely going to write just one or two. Rather, you're going to write an entire "test suite", with each test aiming to check a different path through your code. In many cases, this means you'll have a few tests with similar characteristics, something that pytest handles with "parametrized tests".

    But in other cases, things are a bit more complex. You'll want to have some objects available to all of your tests. Those objects might contain data you want to share across tests, or they might involve the network or filesystem. These are often known as "fixtures" in the testing world, and they take a variety of different forms.

    In pytest, you define fixtures using a combination of the pytest.fixture decorator, along with a function definition. For example, say you have a file that returns a list of lines from a file, in which each line is reversed:
      def reverse_lines(f):  return [one_line.rstrip()[::-1] + '\n'  for one_line in f]  
    Note that in order to avoid the newline character from being placed at the start of the line, you remove it from the string before reversing and then add a '\n' in each returned string. Also note that although it probably would be a good idea to use a generator expression rather than a list comprehension, I'm trying to keep things relatively simple here.

    If you're going to test this function, you'll need to pass it a file-like object. In my last article, I showed how you could use a StringIO object for such a thing, and that remains the case. But rather than defining global variables in your test file, you can create a fixture that'll provide your test with the appropriate object at the right time.

    Here's how that looks in pytest:
        Go to Full Article          

  • Weekend Reading: All Things Bash
        by Carlie Fairchild   
    Bash is a shell and command language. It is distributed widely as the default login shell for most Linux distributions. We've rounded up some of the most popular Bash-related articles for your weekend reading.


    Writing More Compact Bash Code

    By Mitch Frazier

    In most programming languages, non-scripting ones at least, you want to avoid uninitialized variables. In bash, using uninitialized variables can often simplify your code.


    Normalizing Filenames and Data with Bash

    By Dave Taylor

    URLify: convert letter sequences into safe URLs with hex equivalents.


    Roman Numerals and Bash

    By Dave Taylor

    Fun with retro-coding a Roman numeral converter—Dave heads back to his college years and solves homework anew! 

    Also read Dave's followup article, More Roman Numerals and Bash.


    Create Dynamic Wallpaper with a Bash Script

    By Patrick Wheelan

    Harness the power of bash and learn how to scrape websites for exciting new images every morning.


    Developing Console Applications with Bash

    By Andy Carlson

    Bring the power of the Linux command line into your application development process.


    Parsing an RSS News Feed with a Bash Script

    By Jim Hall

    I can automate an hourly job to retrieve a copy of an RSS feed, parse it, and save the news items to a local file that the website can incorporate. That reduces complexity on the website, with only a little extra work by parsing the RSS news feed with a Bash script.


    Hacking a Safe with Bash

    By Adam Kosmin

    Being a minimalist, I have little interest in dealing with GUI applications that slow down my work flow or application-specific solutions (such as browser password vaults) that are applicable only toward a subset of my sensitive data. Working with text files affords greater flexibility over how my data is structured and provides the ability to leverage standard tools I can expect to find most anywhere.


    Graph Any Data with Cacti!

    By Shawn Powers
        Go to Full Article          

Linux Magazine » Channels

  • Extended File Attributes Rock!
    Worldwide, data is growing at a tremendous rate. However, one recent study has pointed out that the size of files is not necessarily growing at the same rate; meaning the number of files is growing rapidly. How do we manage all of this data and files? While the answer to that question is complex, one place we can start is with Extended File Attributes. Continue reading

  • Checksumming Files to Find Bit-Rot
    In a previous article extended file attributes were presented. These are additional bits of metadata that are tied to the file and can be used in a variety of ways. One of these ways is to add checksums to the file so that corrupted data can be detected. Let's take a look at how we can do this including some simple Python examples. Continue reading

  • What’s an inode?
    As you might have noticed, we love talking about file systems. In these discussions the term "inode" is often thrown about. But what is an inode and how does it relate to a file system? Glad you asked. Continue reading

  • Emailing HPC
    Email is not unlike MPI. The similarities may help non-geeks understand parallel computers a little better. Continue reading

Page last modified on October 08, 2013, at 07:08 PM