Recent Changes - Search:
NTLUG

Linux is free.
Life is good.

Linux Training
10am on Meeting Days!

1825 Monetary Lane Suite #104 Carrollton, TX

Do a presentation at NTLUG.

What is the Linux Installation Project?

Real companies using Linux!

Not just for business anymore.

Providing ready to run platforms on Linux

Show Descriptions... (Show All) (Two Column)

LinuxSecurity - Security Advisories






  • Fedora 43: Critical Update for Kubernetes 1.31 Scheduling Issues
    Update to release v1.31.14 Resolves: rhbz#2398586, rhbz#2398847, rhbz#2399248, rhbz#2399521 Resolves: rhbz#2399702, rhbz#2399720, rhbz#2407787, rhbz#2408057 Resolves: rhbz#2408314, rhbz#2408608, rhbz#2408671, rhbz#2408729 Resolves: rhbz#2409236, rhbz#2409526, rhbz#2409787, rhbz#2410201


LWN.net

  • [$] Unpacking for Python comprehensions
    Unpacking Python iterables of various sorts, such as dictionaries or lists,is useful in a number of contexts, including for function arguments, butthere has long been a call for extending that capability to comprehensions. PEP 798 ("Unpacking inComprehensions") was first proposed in June 2025 to fill that gap. In earlyNovember, the steering council acceptedthe PEP, which means that the feature will be coming to Python 3.15 inOctober 2026. It may be something of a niche feature, but it is aninconsistency that has been apparent for a while—to the point that some Python programmersassume that it is already present in the language.


  • PHP 8.5.0 released
    Version8.5.0 of the PHP language has been released. Changes include a new"|>" operator that, for some reason, makes these two linesequivalent:
    $result = strlen("Hello world"); $result = "Hello world" |> strlen(...);
    Other changes include a new function attribute, "#[\NoDiscard]" toindicate that the return value should be used, attributes on constants, andmore; see themigration guide for details.


  • Security updates for Friday
    Security updates have been issued by AlmaLinux (delve and golang), Debian (webkit2gtk), Oracle (expat and thunderbird), Red Hat (kernel), Slackware (openvpn), SUSE (chromium, grub2, and kernel), and Ubuntu (cups-filters, imagemagick, and libcupsfilters).


  • Racing karts on a Rust GPU kernel driver (Collabora blog)
    In July, Collabora announcedthe Rust-based TyrGPU driver for Arm MaliGPUs. Daniel Almeida has posted an updateon progress with a prototype of the driver running on a Rock 5B boardwith the Rockchip RK3588 system-on-chip:

    The Tyr prototype has progressed from basic GPU job execution torunning GNOME, Weston, and full-screen 3D games like SuperTuxKart,demonstrating a functional, high-performance Rust driver that matchesC-driver performance and paves the way for eventual upstreamintegration! [...]

    Tyr is not ready to be used as a daily-driver, and it will stilltake time to replicate this upstream, although it is now clear that wewill surely get there. And as a mere prototype, it has a lot ofshortcuts that we would not have in an upstream version, even thoughit can run on top of an unmodified (i.e., upstream) version ofMesa.

    That said, this prototype can serve as an experimental driver andas a testbed for all the Rust abstraction work taking placeupstream. It will let us experiment with different design decisionsand gather data on what truly contributes to the project'sobjective.

    There is also a video onYouTube of the prototype in action.



  • [$] BPF and io_uring, two different ways
    BPF allows programs uploaded from user space to be run, safely, within thekernel. The io_uring subsystem, too, can be thought of as a way of loadingprograms in the kernel, though the programs in question are mostly asequence of I/O-related system calls. It has sometimes seemed inevitablethat io_uring would, like many other parts of the kernel, gain BPFcapabilities as a way of providing more flexibility to user space. Thathas not yet happened, but there are currently two patch sets underconsideration that take different approaches to the problem.


  • Security updates for Thursday
    Security updates have been issued by AlmaLinux (bind, bind9.18, container-tools:rhel8, expat, grub2, haproxy, idm:DL1, kernel, kernel-rt, lasso, libsoup, libssh, libtiff, pcs, podman, python-kdcproxy, qt5-qt3d, redis, redis:7, runc, shadow-utils, sqlite, squid, vim, webkit2gtk3, xorg-x11-server, xorg-x11-server-Xwayland, and zziplib), Debian (chromium), Oracle (lasso and postgresql), SUSE (erlang27, ghostscript, grub2, kernel, libIex-3_4-33, python312, and sbctl), and Ubuntu (linux, linux-aws, linux-aws-5.4, linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-ibm, linux-ibm-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4, linux-xilinx-zynqmp, linux-aws-6.8, linux-fips, linux-aws-fips, linux-gcp-fips, linux-oracle, and mysql-8.0, mysql-8.4).


  • [$] LWN.net Weekly Edition for November 20, 2025
    Inside this week's LWN.net Weekly Edition:
    Front: Hardware architectures; Fedora Flatpaks; Debian hardware support; sockaddr structure; NUMA nodes; Homebrew. Briefs: LightDM security; Debian Libre Live; Xubuntu postmortem; Blender 5.0; Git 2.52.0; Rust in Android; Thunderbird 145; Quotes; ... Announcements: Newsletters, conferences, security updates, patches, and more.



  • Postmortem of the Xubuntu.org download site compromise
    In mid-October, the Xubuntudownload site was compromised and had directed users to a maliciouszip file instead of the Torrent file that users expected. ElizabethK. Joseph has publisheda postmortem of the incident, along with plans to avoid such a breachin the future:

    To be perfectly clear: this only impacted our website, and the torrentlinks provided there.

    If you downloaded or opened a file named "Xubuntu-Safe-Download.zip"from the Xubuntu downloads page during this period, you should assumeit was malicious. We strongly recommend scanning your computer with atrusted antivirus or anti-malware solution and deleting the fileimmediately.

    Nothing on cdimages.ubuntu.com or any of the other official Ubunturepositories was impacted, and our mirrors remained safe as long asthey were also mirroring from official resources.

    None of the build systems, packages, or other components of Xubuntuitself were impacted.


  • GStreamer Conference 2025 video recordings now available
    Recordings from the GStreamerConference 2025, held in London in late October, are nowavailable on the GStreamer Conferences Archive site. Includes theGStreamerState of the Union talk by Tim-Philipp Müller, Stateof MPEG 2 Transport Stream (MPEG-TS) by Edward Hervey, and manyothers.


  • Security updates for Wednesday
    Security updates have been issued by Debian (pdfminer), Fedora (chromium and firefox), Mageia (bubblewrap, flatpak, cups-filters, and thunderbird), Oracle (container-tools:rhel8, kernel, and squid), Red Hat (kernel), Slackware (libarchive), SUSE (gimp, itextpdf, kernel, thunderbird, and unbound), and Ubuntu (lasso).


  • Blender 5.0 released
    Version5.0 of the Blender animation system has been released. Notableimprovements include improved color management, HDR capabilities, anda new storyboarding template. See the releasenotes for a lengthy list of new features and changes, and the bugfixespage for the 588 commits that fixed bugs in Blender 4.5 or older.



  • [$] The current state of Linux architecture support
    There have been several recent announcements about Linux distributions changingthe list of architectures they support, or adjusting how they build binaries forsome versions of those architectures.Ubuntu introduced architecture variants, Fedoraconsidered dropping support for i686 butreversed course after some pushback, and Debian developershave discussed raising its architecture baseline for the upcomingDebian 14("forky").Linux supports a large number of architectures, and it's not alwaysclear where or by whom they are used. With increasing concerns about diminishing support for legacyarchitectures, it's a good time to look at the overall state of architecturesupport on Linux.


  • [$] Pouring packages with Homebrew
    The Homebrew project is anopen-source package-management system that comes with a repository ofuseful packages for Linux and macOS. Even though Linux distributionshave their own package management and repositories, Homebrew is oftenused to obtain software that is not available in a distribution's repositoryor to install more current versions of projects than are availablefrom long-term-support (LTS) distributions. Homebrew 5.0.0,released on November 12, 2025, expanded Linux support to include64-bit Arm packages in addition to x86_64, and turned on concurrentdownloads by default to speed up package downloads.


  • Security updates for Tuesday
    Security updates have been issued by Debian (libwebsockets), Fedora (chromium and fvwm3), Mageia (apache, firefox, and postgresql13, postgresql15), Oracle (idm:DL1), Red Hat (bind, bind9.18, firefox, and openssl), SUSE (alloy, ghostscript, and openssl-1_0_0), and Ubuntu (ffmpeg and freeglut).


LXer Linux News




  • Panasonic Automotive Advances Linux Collaboration Through OIN
    On Thursday, Japan-based Panasonic Automotive Systems announced that it had become a community member of Durham, North Carolina-based Open Invention Network. OIN is a nonprofit that’s mandated to protect the “Linux system” — the kernel plus key open-source components — using a large patent portfolio as defense against infringement claims.


  • Nautilus File Manager In GNOME 50 Will Load Thumbnails Much Faster
    Just last week GNOME's Nautilus file manager "GNOME Files" made headlines for finally supporting Ctrl+INsert and Shift+Insert while this week there is more activity worth pointing out. Nautilus in GNOME 50 will be loading thumbnail images much faster than in prior versions...


  • Wine 10.19 Released: Game Changing Support for Windows Reparse Points on Linux
    If you use Linux and occasionally run Windows applications, whether via native Wine or through gaming layers like Proton, you’ll appreciate what just dropped in Wine 10.19. Released November 14 2025, this version brings a major enhancement: official support for Windows reparse points, a filesystem feature many Windows apps rely on, and a host of other compatibility upgrades.




  • TUXEDO Computers Drops Snapdragon X1 Elite Linux Laptop Plans
    Back in mid-2024, the Bavarian Linux PC vendor TUXEDO Computers teased plans for developing a Snapdragon X Elite Linux laptop. Initially they hoped to have it out by Christmas 2024. That didn't happen and now approaching Christmas 2025 they confirmed they have stopped their plans for shipping a Snapdragon X1 Elite laptop for Linux customers...




  • Sovereign Tech Fund Hiring A New Leader For Driving Open-Source Funding
    Germany's Sovereign Tech Fund / Sovereign Tech Agency has been a godsend the past few years for the open-source community. This funding from the German government has led to significant funding for dozens of prominent open-source infrastructure projects to provide more resources for enhancing security, enabling new features, and more. As the Sovereign Tech Fund prepares for the next phase of growth, they are hiring a new head to lead the efforts...



  • Linux 6.19 Slated To Land "mm/cid" Rewrite That Has Very Positive Performance Potential
    A set of Linux kernel patches posted back in October for rewriting the kernel's memory-mapped concurrency ID code for some nice performance wins looks like it will land for Linux 6.19. This is the code that prominent Intel engineer Thomas Gleixner found to yield up to an 18% improvement for the PostgreSQL database. My testing of this "mm/cid" code has also shown some nice performance wins too...



  • LILYGO Expands T-Beam Series With New 1W LoRa GPS Board
    LILYGO has introduced the T-Beam 1W, an ESP32-S3 development board that combines LoRa connectivity, GNSS positioning, an OLED display, and SD card storage. It follows the familiar T-Beam layout while adding a higher-power LoRa front end for long-range communication tasks. The system is built around the ESP32-S3FN8, a dual-core Tensilica LX7 processor with 16 MB […]


  • Intel Preps Linux KVM For Diamond Rapids' AVX10.2 & Expanded AMX
    The latest feature enablement work happening by Intel for the Linux kernel with next-generation Diamond Rapids server processors are the adjustments to the Kernel-based Virtual Machine (KVM) for readying the new CPU ISA capabilities for a virtualized world...



  • Updated Steam Runtime Switches To Debian 13 Libraries, SDL2 Using Compatibility Layer
    An updated version of the Steam Linux Runtime 4 branch was rolled out that has now shifted from Debian 11 to Debian 13 libraries for some significant upgrades. In the process more libraries have gone x86_64 only in foregoing the i386 builds. In addition, the SDL 2 library support for the Steam Runtime is now provided by sdl2-compat as the compatibility layer for SDL2 atop SDL3...



Error: It's not possible to reach RSS file http://services.digg.com/2.0/story.getTopNews?type=rss&topic=technology ...

Slashdot

  • 780,000 Windows Users Downloaded Linux Distro Zorin OS in the Last 5 Weeks
    In October Zorin OS claimed it had 100,000 downloads in a little over two days in the days following Microsoft's end of support for Windows 10. And one month later, Zorin OS developers now claim that 780,000 people downloaded it from a Windows computer in the space of a month, according to the tech news site XDA Developers.In a post on the Zorin blog, the developers of the operating system Zorin OS 18 announced that they've managed to accrue one million downloads of the operating system in a single month [since its launch on October 14]. While this is plenty impressive by itself, the developers go on to reveal that, out of that million, 78% of the downloads came from a Windows machine. That means that at least 780,000 people on Windows gave Zorin OS 18 a download... [I]t's easy to see why: the developers put a heavy emphasis on making their system the perfect home for ex-Windows users.


    Read more of this story at Slashdot.


  • Physicists Reveal a New Quantum State Where Electrons Run Wild
    ScienceDaily reports:Electrons can freeze into strange geometric crystals and then melt back into liquid-like motion under the right quantum conditions. Researchers identified how to tune these transitions and even discovered a bizarre "pinball" state where some electrons stay locked in place while others dart around freely. Their simulations help explain how these phases form and how they might be harnessed for advanced quantum technologies... When electrons settle into these rigid arrangements, the material undergoes a shift in its state of matter and stops conducting electricity. Instead of acting like a metal, it behaves as an insulator. This unusual behavior provides scientists with valuable insight into how electrons interact and has opened the door to advances in quantum computing, high-performance superconductors used in energy and medical imaging, innovative lighting systems, and extremely precise atomic clocks... [Florida State University assistant professor Cyprian Lewandowski said] "Here, it turns out there are other quantum knobs we can play with to manipulate states of matter, which can lead to impressive advances in experimental research."


    Read more of this story at Slashdot.


  • Tiny 'Micro-Robots' in your Bloodstream Could Deliver Drugs with Greater Precision
    The Washington Post reports:Scientists in Switzerland have created a robot the size of a grain of sand that is controlled by magnets and can deliver drugs to a precise location in the human body, a breakthrough aimed at reducing the severe side effects that stop many medicines from advancing in clinical trials... "I think surgeons are going to look at this," [said Bradley J. Nelson, an author of the paper in Science describing the discovery and a professor of robotics and intelligent systems at ETH Zurich]. I'm sure they're going to have a lot of ideas on how to use" the microrobot. The capsule, which is steered by magnets, might also be useful in treating aneurysms, very aggressive brain cancers, and abnormal connections between arteries and veins known as arteriovenous malformations, Nelson said. The capsules have been tested successfully in pigs, which have similar vasculature to humans, and in silicone models of the blood vessels in humans and animals... Nelson said drug-ferrying microrobots of this kind may be three to five years from being tested in clinical trials.The problem faced by many drugs under development is that they spread throughout the body instead of going only to the area in need... A major cause of side effects in patients is medications traveling to parts of the body that don't need them. The capsules developed in Switzerland, however, can be maneuvered into precise locations by a surgeon using a tool not that different from a PlayStation controller. The navigation system involves six electromagnetic coils positioned around the patient, each about 8 to 10 inches in diameter... The capsules are made of materials that have been found safe for people in other medical tools... When the capsule reaches its destination in the body, "we can trigger the capsule to dissolve," Nelson said.


    Read more of this story at Slashdot.


  • Court Ends Dragnet Electricity Surveillance Program in Sacramento
    A California judge has shut down a decade-long surveillance program in which Sacramento's utility provider shared granular smart-meter data on 650,000 residents with police to hunt for cannabis grows. The EFF reports: The Sacramento County Superior Court ruled that the surveillance program run by the Sacramento Municipal Utility District (SMUD) and police violated a state privacy statute, which bars the disclosure of residents' electrical usage data with narrow exceptions. For more than a decade, SMUD coordinated with the Sacramento Police Department and other law enforcement agencies to sift through the granular smart meter data of residents without suspicion to find evidence of cannabis growing. EFF and its co-counsel represent three petitioners in the case: the Asian American Liberation Network, Khurshid Khoja, and Alfonso Nguyen. They argued that the program created a host of privacy harms -- including criminalizing innocent people, creating menacing encounters with law enforcement, and disproportionately harming the Asian community. The court ruled that the challenged surveillance program was not part of any traditional law enforcement investigation. Investigations happen when police try to solve particular crimes and identify particular suspects. The dragnet that turned all 650,000 SMUD customers into suspects was not an investigation. "[T]he process of making regular requests for all customer information in numerous city zip codes, in the hopes of identifying evidence that could possibly be evidence of illegal activity, without any report or other evidence to suggest that such a crime may have occurred, is not an ongoing investigation," the court ruled, finding that SMUD violated its "obligations of confidentiality" under a data privacy statute. [...] In creating and running the dragnet surveillance program, according to the court, SMUD and police "developed a relationship beyond that of utility provider and law enforcement." Multiple times a year, the police asked SMUD to search its entire database of 650,000 customers to identify people who used a large amount of monthly electricity and to analyze granular 1-hour electrical usage data to identify residents with certain electricity "consumption patterns." SMUD passed on more than 33,000 tips about supposedly "high" usage households to police. [...] Going forward, public utilities throughout California should understand that they cannot disclose customers' electricity data to law enforcement without any "evidence to support a suspicion" that a particular crime occurred.


    Read more of this story at Slashdot.


  • Ukraine Is Jamming Russia's 'Superweapon' With a Song
    Longtime Slashdot reader fahrbot-bot shares a report from 404 Media: The Ukrainian Army is knocking a once-hyped Russian superweapon out of the sky by jamming it with a song and tricking it into thinking it's in Lima, Peru. The Kremlin once called its Kh-47M2 Kinzhal ballistic missiles "invincible." Joe Biden said the missile was "almost impossible to stop." Now Ukrainian electronic warfare experts say they can counter the Kinzhal with some music and a re-direction order. [...] Kinzhals and other guided munitions navigate by communicating with Russian satellites that are part of the GLONASS system, a GPS-style navigation network. Night Watch uses a jamming system called Lima EW to generate a disruption field that prevents anything in the area from communicating with a satellite. Many traditional jamming systems work by blasting receivers on munitions and aircraft with radio noise. Lima does that, but also sends along a digital signal and spoofs navigation signals. It "hacks" the receiver it's communicating with to throw it off course. Night Watch shared pictures of the downed Kinzhals with 404 Media that showed a missile with a controlled reception pattern antenna (CRPA), an active antenna that's meant to resist jamming and spoofing. "We discovered that this missile had pretty old type of technology," Night Watch said. "They had the same type of receivers as old Soviet missiles used to have. So there is nothing special, there is nothing new in those types of missiles." Night Watch told 404 Media that it used this Lima to take down 19 Kinzhals in the past two weeks. First, it replaces the missile's satellite navigation signals with the Ukrainian song "Our Father Is Bandera." Any digital noise or random signal would work to jam the navigation system, but Night Watch wanted to use the song because they think it's funny. "We just send a song... we just make it into binary code, you know, like 010101, and just send it to the Russian navigation system," Night Watch said. "It's just kind of a joke. [Bandera] is a Ukrainian nationalist and Russia tries to use this person in their propaganda to say all Ukrainians are Nazis. They always try to scare the Russian people that Ukrainians are, culturally, all the same as Bandera." Once the song hits, Night Watch uses Lima to spoof a navigation signal to the missiles and make them think they're in Lima, Peru. Once the missile's confused about its location, it attempts to change direction. These missiles are fast -- launched from a MiG-31 they can hit speeds of up to Mach 5.7 or more than 4,000 miles per hour -- and an object moving that fast doesn't fare well with sudden changes of direction.


    Read more of this story at Slashdot.


  • Magician Forgets Password To His Own Hand After RFID Chip Implant
    A magician who implanted an RFID chip in his hand lost access to it after forgetting the password, leaving him effectively locked out of the tech embedded in his own body. The Register reports: "It turns out," said [said magician Zi Teng Wang], "that pressing someone else's phone to my hand repeatedly, trying to figure out where their phone's RFID reader is, really doesn't come off super mysterious and magical and amazing." Then there are the people who don't even have their phone's RFID reader enabled. Using his own phone would, in Zi's words, lack a certain "oomph." Oh well, how about making the chip spit out a Bitcoin address? "That literally never came up either." In the end, Zi rewrote the chip to link to a meme, "and if you ever meet me in person you can scan my chip and see the meme." It was all suitably amusing until the Imgur link Zi was using went down. Not everything on the World Wide Web is forever, and there is no guarantee that a given link will work indefinitely. Indeed, access to Imgur from the United Kingdom was abruptly cut off on September 30 in response to the country's age verification rules. Still, the link not working isn't the end of the world. Zi could just reprogram the chip again, right? Wrong. "When I went to rewrite the chip, I was horrified to realize I forgot the password that I had locked it with." The link eventually started working again, but if and when it stops, Zi's party piece will be a little less entertaining. He said: "Techie friends I've consulted with have determined that it's too dumb and simple to hack, the only way to crack it is to strap on an RFID reader for days to weeks, brute forcing every possible combination." Or perhaps some surgery to remove the offending hardware.


    Read more of this story at Slashdot.


  • Iran's Capital Is Moving. The Reason Is an Ecological Catastrophe
    An anonymous reader quotes a report from Scientific American: Amid a deepening ecological crisis and acute water shortage, Tehran can no longer remain the capital of Iran, the country's president has said. The situation in Tehran is the result of "a perfect storm of climate change and corruption," says Michael Rubin, a political analyst at the American Enterprise Institute. "We no longer have a choice," said Iranian president Masoud Pezeshkian during a speech on Thursday. Instead Iranian officials are considering moving the capital to the country's southern coast. But experts say the proposal does not change the reality for the nearly 10 million people who live in Tehran and are now suffering the consequences of a decades-long decline in water supply. Iran's capital has moved many times over the centuries, notes the report. "But this marks the first time the Iranian government has moved the capital because of an ecological catastrophe." Yet, Rubin says, "it would be a mistake to look at this only through the lens of climate change" and not factor in the water, land, and wastewater mismanagement and corruption that have made the crisis worse. Linda Shi, a social scientist and urban planner at Cornell University, says: "Climate change is not the thing that is causing it, but it is a convenient factor to blame in order to avoid taking responsibility" for poor political decisions.


    Read more of this story at Slashdot.


  • Cryptographers Cancel Election Results After Losing Decryption Key
    The International Association of Cryptologic Research (IACR) was forced to cancel its leadership election after a trustee lost their portion of the Helios voting system's decryption key, making it impossible to reveal or verify the final results. Ars Technica reports: The IACR said Friday that the votes were submitted and tallied using Helios, an open source voting system that uses peer-reviewed cryptography to cast and count votes in a verifiable, confidential, and privacy-preserving way. Helios encrypts each vote in a way that assures each ballot is secret. Other cryptography used by Helios allows each voter to confirm their ballot was counted fairly. "Unfortunately, one of the three trustees has irretrievably lost their private key, an honest but unfortunate human mistake, and therefore cannot compute their decryption share," the IACR said. "As a result, Helios is unable to complete the decryption process, and it is technically impossible for us to obtain or verify the final outcome of this election." The IACR will switch to a two-of-three private key system to prevent this sort of thing from happening again. Moti Yung, the trustee responsible for the incident, has resigned and is being replaced by Michael Abdalla.


    Read more of this story at Slashdot.


  • Google Starts Testing Ads In AI Mode
    Google has begun testing sponsored ads inside its Gemini-powered AI Mode, placing labeled "sponsored" links at the bottom of AI-generated responses. Engadget reports: [A] Google spokesperson says the result shown is akin to similar tests it's been running this year. "People seeing ads in AI Mode in the wild is simply part of Google's ongoing tests, which we've been running for several months," the spokesperson said. The push to start offering ads in AI Mode was announced in May. The company also told 9to5Google that there are no current plans to fully update AI Mode to incorporate ads. For now, the software seems to be prioritizing organic links over sponsored links, but we all know how insidious ads can be once the floodgates open...


    Read more of this story at Slashdot.


  • SEC Dismisses Case Against SolarWinds, Top Security Officer
    The SEC has officially dismissed its high-profile case against SolarWinds and its CISO that was tied to a Russia-linked cyberattack involving the software company. Reuters reports: The landmark case, which SEC brought in late 2023, rattled the cybersecurity community and later faced scrutiny from a judge who dismissed many of the charges. The SEC had said SolarWinds and its chief information security officer had violated U.S. securities laws by concealing vulnerabilities in connection with the high-profile 2020 Sunburst cyber attack. The SEC, SolarWinds and CISO Timothy Brown filed a motion on Thursday to dismiss the case with prejudice, according to a joint stipulation posted on the agency's website. A SolarWinds spokesperson said the firm is "clearly delighted" with the dismissal. "We hope this resolution eases the concerns many CISOs have voiced about this case and the potential chilling effect it threatened to impose on their work," the spokesperson said.


    Read more of this story at Slashdot.


  • Malaysia's Palm Oil Estates Are Turning Into Data Centers
    An anonymous reader quotes a report from Bloomberg: Malaysia's palm oil giants, long-blamed for razing rainforests, fueling toxic haze and driving orangutans to the brink of extinction, are recasting themselves as unlikely champions in a different, potentially greener race: the quest to lure the world's AI data centers to the Southeast Asian country (source paywalled; alternative source). Palm oil companies are earmarking some of the vast tracts of land they own for industrial parks studded with data centers and solar panels, the latter meant to feed the insatiable energy appetites of the former. The logic is simple: data centers are power and land hogs. By 2035, they could demand at least five gigawatts of electricity in Malaysia -- almost 20% of the country's current generation capacity and roughly enough to power a major city like Miami. Malaysia also needs space to house server farms, and palm oil giants control more land than any other private entity in the country. The country has been at the heart of a regional data center boom. Last year, it was the fastest-growing data center market in the Asia-Pacific region and roughly 40% of all planned capacity in Southeast Asia is now slated for Malaysia, according to industry consultant DC Byte. Over the past four years, $34 billion in data center investments has poured into the country -- Alphabet's Google committed $2 billion, Microsoft announced a $2.2 billion investment and Amazon is spending $6.2 billion, to name a few. The government aims for 81 data centers by 2035. The rush is partly a spillover from Singapore, where a years-long moratorium on new centers forced operators to look north. Johor, just across the causeway, is now a hive of construction cranes and server farms -- including for firms such as Singapore Telecommunications, Nvidia and ByteDance. But delivering on government promises of renewable power is proving harder. The strains are already being felt in Malaysia's data center capital. Sedenak Tech Park, one of Johor's flagship sites, is telling potential tenants they'll need to wait until the fourth quarter of 2026 for promised water and power hookups under its second-phase expansion, according to DC Byte. The vacancy rate in Johor's live facilities is just 1.1%, according to real estate consultant Knight Frank. Despite its rapid growth, the market is nowhere near saturation, with six gigawatts of capacity expected to be built out over time, said Knight Frank's head of data centers for Asia Pacific, Fred Fitzalan Howard. That potential bottleneck has incentivized palm oil majors such as SD Guthrie Bhd. to pitch themselves as both landowners and green-power suppliers. The $8.9 billion palm oil producer, SD Guthrie, is the world's largest palm oil planter by acreage, with more than 340,000 hectares in Malaysia. "SD Guthrie is pivoting to solar farms and industrial parks, betting that tech giants hungry for server space will prefer sites with ready access to renewable energy," reports Bloomberg. "The company has reserved 10,000 hectares for such projects over the next decade, starting with clearing old rubber estates and low-yielding palm plots in areas near data center and semiconductor investment hubs." "The company's calculation is based on this: one megawatt of solar requires about 1.5 hectares. Helmy said SD Guthrie wants one gigawatt in operation within three years, enough to power up to 10 hyperscale data centers used for AI computing. The new business is expected to make up about a third of its profits by the end of the decade."


    Read more of this story at Slashdot.


  • Firefox 147 Will Support The XDG Base Directory Specification
    Phoronix's Michael Larabel reports: A 21 year old bug report requesting support of the XDG Base Directory specification is finally being addressed by Firefox. The Firefox 147 release should respect this XDG specification around where files should be positioned within Linux users' home directory. The XDG Base Directory specification lays out where application data files, configuration files, cached assets, and other files and file formats should be positioned within a user's home directory and the XDG environment variables for accessing those locations. To date Firefox has just positioned all files under ~/.mozilla rather than the likes of ~/.config and ~/.local/share.


    Read more of this story at Slashdot.


  • Google Must Double AI Serving Capacity Every 6 Months To Meet Demand
    Google's AI infrastructure chief told employees the company must double its AI serving capacity every six months in order to meet demand. In a presentation earlier this month, Amin Vahdat, a vice president at Google Cloud, gave a presentation titled "AI Infrastructure." It included a slide on "AI compute demand" that said: "Now we must double every 6 months.... the next 1000x in 4-5 years." CNBC reports: The presentation was delivered a week after Alphabet reported better-than-expected third-quarter results and raised its capital expenditures forecast for the second time this year, to a range of $91 billion to $93 billion, followed by a "significant increase" in 2026. Hyperscaler peers Microsoft, Amazon and Meta also boosted their capex guidance, and the four companies now expect to collectively spend more than $380 billion this year. Google's "job is of course to build this infrastructure but it's not to outspend the competition, necessarily," Vahdat said. "We're going to spend a lot," he said, adding that the real goal is to provide infrastructure that is far "more reliable, more performant and more scalable than what's available anywhere else." In addition to infrastructure build-outs, Vahdat said Google bolsters capacity with more efficient models and through its custom silicon. Last week, Google announced the public launch of its seventh generation Tensor Processing Unit called Ironwood, which the company says is nearly 30 times more power efficient than its first Cloud TPU from 2018. Vahdat said the company has a big advantage with DeepMind, which has research on what AI models can look like in future years. Google needs to "be able to deliver 1,000 times more capability, compute, storage networking for essentially the same cost and increasingly, the same power, the same energy level," Vahdat said. "It won't be easy but through collaboration and co-design, we're going to get there."


    Read more of this story at Slashdot.


  • Tech Company CTO and Others Indicted For Exporting Nvidia Chips To China
    An anonymous reader quotes a report from Ars Technica: The US crackdown on chip exports to China has continued with the arrests of four people accused of a conspiracy to illegally export Nvidia chips. Two US citizens and two nationals of the People's Republic of China (PRC), all of whom live in the US, were charged in an indictment (PDF) unsealed on Wednesday in US District Court for the Middle District of Florida. The indictment alleges a scheme to send Nvidia "GPUs to China by falsifying paperwork, creating fake contracts, and misleading US authorities," John Eisenberg, assistant attorney general for the Justice Department's National Security Division, said in a press release yesterday. The four arrestees are Hon Ning Ho (aka Mathew Ho), a US citizen who was born in Hong Kong and lives in Tampa, Florida; Brian Curtis Raymond, a US citizen who lives in Huntsville, Alabama; Cham Li (aka Tony Li), a PRC national who lives in San Leandro, California; and Jing Chen (aka Harry Chen), a PRC national who lives in Tampa on an F-1 non-immigrant student visa. The suspects face a raft of charges for conspiracy to violate the Export Control Reform Act of 2018, smuggling, and money laundering. They could serve many decades in prison if convicted and given the maximum sentences and forfeit their financial gains. The indictment says that Chinese companies paid the conspirators nearly $3.9 million. One of the suspects was briefly the CTO of Corvex, a Virginia-based AI cloud computing company that is planning to go public. Corvex told CNBC yesterday that it "had no part in the activities cited in the Department of Justice's indictment," and that "the person in question is not an employee of Corvex. Previously a consultant to the company, he was transitioning into an employee role but that offer has been rescinded."


    Read more of this story at Slashdot.


  • British Army Will Use Call of Duty To Train Soldiers
    British soldiers are using computer games such as Call of Duty to sharpen their "war-fighting readiness," an Army chief has said. From a report: General Sir Tom Copinger-Symes, the deputy commander of Cyber and Specialist Operations Command, said the war in Ukraine, where remote-operated drones have become crucial on the battlefield, proved the worth of having soldiers skilled in video gaming. The Ministry of Defence on Friday announced the launch of the International Defence Esports Games (IDEG), a video gaming tournament that will pit the best of Britain's "future cyber warriors" against military teams from 40 other countries.


    Read more of this story at Slashdot.


The Register


  • Copackaged optics have officially found their killer app - of course it's AI
    With power in such short supply, every watt counts
    SC25 Power is becoming a major headache for datacenter operators as they grapple with how to support ever larger deployments of GPU servers - so much so that the AI boom is now driving the adoption of a technology once thought too immature and failure-prone to merit the risk.…


  • Self-destructing thumb drive can brick itself and wipe your secret files away
    Catch: you have to plug it into a computer first
    If you’ve ever watched Mission Impossible, where Jim Phelps gets instructions from an audio tape that catches fire after five seconds, TeamGroup has an external SSD with your name on it. The T-Create Expert P35S is a portable USB-powered SSD that comes with a self-destruct button, which wipes all your data and physically renders the device useless.…


  • Researchers get inside the mind of bots, find out what texts they trained on
    RECAP agent overcomes model alignment efforts to hide memorized proprietary content
    If you've ever wondered whether that chatbot you're using knows the entire text of a particular book, answers are on the way. Computer scientists have developed a more effective way to coax memorized content from large language models, a development that may address regulatory concerns while helping to clarify copyright infringement claims arising from AI model training and inference.…



  • Makers slam Qualcomm for tightening the clamps on Arduino
    But the Wiring folks were disenchanted even before Qualcomm swallowed Arduino
    Qualcomm quietly rewrote the terms of service for its newest acquisition, programmable microcontroller and SBC maker Arduino, drawing intense fire from the maker community for grabbing additional rights to user-generated content on its platform and prohibiting reverse-engineering of what was once very open software.…


  • Pentagon pumps $29.9M into bid to turn waste into critical minerals
    It's unclear how much scandium and gallium ElementUSA will contribute to the supply chain, or when
    The US Department of Defense is asserting its desire to be an integral part of the American rare earths and critical minerals supply chain with a deal to establish a domestic pipeline of gallium and scandium production.…



  • Rhyme is the key to set AIs free when verse outsmarts security
    Poetry proves potent jailbreak tool for today's top models
    Are you a wizard with words? Do you like money without caring how you get it? You could be in luck now that a new role in cybercrime appears to have opened up – poetic LLM jailbreaking.…


  • Google's AI is eating your email by default. Here's how to shut its mouth
    Want out of those new 'smart features'? We’ve got you covered
    Google's "don't be evil" ethos is so 2015. These days, the Chocolate Factory is all about integrating users with bots, whether they like it or not. Now, it's rolling out Workspace "smart features" that process personal content with AI, and many users are finding the settings enabled by default.…


  • SpaceX loses debut V3 Super Heavy in ground test mishap
    Redesigned booster ruptures during early checks, delaying latest Starship iteration
    SpaceX has responded to Blue Origin's announcement of a heftier version of its New Glenn rocket in the only way it knows how – by accidentally destroying a Starship booster.…


  • Four charged over alleged plot to smuggle Nvidia AI chips into China
    Prosecutors say front companies, falsified paperwork, and overseas drop points used to dodge US export rules
    Four people have been charged in the US with plotting to funnel restricted Nvidia AI chips into China, allegedly relying on shell firms, fake invoices, and covert routing to slip cutting-edge GPUs past American export controls.…







  • AI nudification site fined £55K for skipping age checks
    Decision marks second penalty issued under the UK's Online Safety Act
    The UK's online regulator has lobbed a £50,000 fine at an AI nudification website for failing to implement mandatory age checks, potentially allowing under-18s to waltz past the virtual velvet rope.…



  • Microsoft exec finds AI cynicism 'mindblowing'
    The tech is impressive. Shoehorning it into absolutely everything is not
    Opinion In a tweet lamenting all the "cynics" unmoved by AI, Microsoft AI boss Mustafa Suleyman demonstrated that Redmond's Reality Distortion Field is running at full power.…








  • SC25 gets heavy with mega power and cooling solutions
    Hydrogen-powered turbines, megawatt-scale coolant loops, and 800V power take center stage at annual supercomputing conference
    SC25 Hydrogen-fueled gas turbines, backup generators, and air handlers probably aren't the kinds of equipment you'd expect on the show floor of a supercomputing conference. But your expectations would be wrong.…







  • Trump, Republicans try again to stop states from regulating AI
    If at first you don’t succeed, swing again - Big Tech certainly isn’t complaining
    The Trump administration and congressional Republicans are trying again to eliminate state-level AI regulations in favor of a federal standard. The plan faces opposition from many state governments and civil-society organizations, while AI vendors have welcomed it.…


  • Thunderbird 145 finally adds ‘native’ Exchange support
    EWS-powered email only for now, with calendars and contacts still on the to-do list
    It's easy to forget in the FOSS world, but Exchange still runs most corporate email – and the new version of Thunderbird can talk to it directly.…




  • AWS under pressure as big three battle to eat the cloud market
    Google and Microsoft are catching up, while Oracle and neoclouds are growing from a small base
    The big three cloud companies are all growing thanks to an expanding market, but Amazon is under increasing pressure from Microsoft and Google, while newcomers are on the rise.…


  • TP-Link accuses rival Netgear of 'smear campaign' over alleged China ties
    Networking vendor claims rival helped portray it as a national-security risk in the US
    TP-Link is suing rival networking vendor Netgear, alleging that the rival and its CEO carried out a smear campaign by falsely suggesting, it says, that the biz had been infiltrated by the Chinese government.…



  • Google and Westinghouse lean on AI to speed US nuclear plant builds
    Pair say digital twin-powered scheduling will cut costs, shrink timelines for 10 planned reactors
    Google and atomic power biz Westinghouse Electric claim that AI will speed construction and cut the cost of building the new US power plants it is planning in response to rising demands for energy to fuel AI.…




  • Manchester hits snooze again on joining Palantir-run NHS data platform
    Care board still waiting for evidence that it will be in the best interests of the population
    Greater Manchester Integrated Care Board (ICB) has again put off its adoption of an NHS data platform prescribed by the UK government and run by Palantir until there is more evidence that it will be in the "best interests" of the city's population.…



  • Palo Alto CEO tips nation-states to weaponize quantum computing by 2029
    Company thinks you’ll contemplate replacing most security kit in the next few years to stay safe
    Palo Alto Networks CEO Nikesh Arora has suggested hostile nation-states will possess quantum computers in 2029, or even a little earlier, at which point most security appliances will need to be replaced.…


  • US, UK, Australia sanction Lockbit gang’s hosting provider
    ‘Bulletproof’ hosts partly dodged the last attack of this sort
    Cybercrime fighters in the US, UK, and Australia have imposed sanctions on several Russia-linked entities they claim provide hosting services to ransomware gangs Lockbit, BlackSuit, and Play.…



  • Fortinet 'fesses up to second 0-day within a week
    Attackers may be joining the dots to enable unauthenticated RCE
    Fortinet has confirmed that another flaw in its FortiWeb web application firewall has been exploited as a zero-day and issued a patch, just days after disclosing a critical bug in the same product that attackers had found and abused a month earlier.…




Polish Linux

  • Security: Why Linux Is Better Than Windows Or Mac OS
    Linux is a free and open source operating system that was released in 1991 developed and released by Linus Torvalds. Since its release it has reached a user base that is greatly widespread worldwide. Linux users swear by the reliability and freedom that this operating system offers, especially when compared to its counterparts, windows and [0]


  • Essential Software That Are Not Available On Linux OS
    An operating system is essentially the most important component in a computer. It manages the different hardware and software components of a computer in the most effective way. There are different types of operating system and everything comes with their own set of programs and software. You cannot expect a Linux program to have all [0]


  • Things You Never Knew About Your Operating System
    The advent of computers has brought about a revolution in our daily life. From computers that were so huge to fit in a room, we have come a very long way to desktops and even palmtops. These machines have become our virtual lockers, and a life without these network machines have become unimaginable. Sending mails, [0]


  • How To Fully Optimize Your Operating System
    Computers and systems are tricky and complicated. If you lack a thorough knowledge or even basic knowledge of computers, you will often find yourself in a bind. You must understand that something as complicated as a computer requires constant care and constant cleaning up of junk files. Unless you put in the time to configure [0]


  • The Top Problems With Major Operating Systems
    There is no such system which does not give you any problems. Even if the system and the operating system of your system is easy to understand, there will be some times when certain problems will arise. Most of these problems are easy to handle and easy to get rid of. But you must be [0]


  • 8 Benefits Of Linux OS
    Linux is a small and a fast-growing operating system. However, we can’t term it as software yet. As discussed in the article about what can a Linux OS do Linux is a kernel. Now, kernels are used for software and programs. These kernels are used by the computer and can be used with various third-party software [0]


  • Things Linux OS Can Do That Other OS Cant
    What Is Linux OS?  Linux, similar to U-bix is an operating system which can be used for various computers, hand held devices, embedded devices, etc. The reason why Linux operated system is preferred by many, is because it is easy to use and re-use. Linux based operating system is technically not an Operating System. Operating [0]


  • Packagekit Interview
    Packagekit aims to make the management of applications in the Linux and GNU systems. The main objective to remove the pains it takes to create a system. Along with this in an interview, Richard Hughes, the developer of Packagekit said that he aims to make the Linux systems just as powerful as the Windows or [0]


  • What’s New in Ubuntu?
    What Is Ubuntu? Ubuntu is open source software. It is useful for Linux based computers. The software is marketed by the Canonical Ltd., Ubuntu community. Ubuntu was first released in late October in 2004. The Ubuntu program uses Java, Python, C, C++ and C# programming languages. What Is New? The version 17.04 is now available here [0]


  • Ext3 Reiserfs Xfs In Windows With Regards To Colinux
    The problem with Windows is that there are various limitations to the computer and there is only so much you can do with it. You can access the Ext3 Reiserfs Xfs by using the coLinux tool. Download the tool from the  official site or from the  sourceforge site. Edit the connection to “TAP Win32 Adapter [0]


OSnews

  • LionsOS: an adaptable OS based on the seL4 microkernel
    LionsOS is an operating system based on the seL4 microkernel with the goal of making the achievements of seL4 accessible. That is, to provide performance, security, and reliability. It is not a conventional operating system, but contains composable components for creating custom operating systems that are specific to a particular task. Components are joined together using the Microkit tool. ↫ LionsOS website The project is under active research and development, led by the Trustworthy Systems research group at UNSW Sydney in Australia. The source code is available on GitHub.


  • HP, Dell quietly disable HEVC on certain laptops over minute license fee increase
    Inter-corporation bullshit screwing over consumers  a tale as old as time. Major laptop vendors have quietly removed hardware decode support for the H.265/HEVC codec in several business and entry-level models, a decision apparently driven by rising licensing fees. Users working with H.265 content may face reduced performance unless they verify codec support or rely on software workarounds. ↫ Hilbert Hagedoornn at The Guru of 3D You may want to know how much these licensing fees are, and by how much theyre increasing next year, making these laptop OEMs remove features to avoid the costs. The HEVC licensing fee is $0.20 per device, and in 2026 its increasing to $0.24. Yes, a $0.04 increase per device is forcing! these giant companies to screw over their consumers. Nobodys coming out a winner here, and everyone loses. We took a wrong turn, but nobody seems to know when and where.


  • The why of LisaGUI
    LisaGUI is an amazing project that recreates the entire user interface of the Apple Lisa in the browser, using nothing but CSS, a bit of HTML, and SVG files, and its an absolute joy to use and experience. Its creator, Andrew Yaros, has published a blog post diving into the why and how of LisaGUI. I had been trying to think of a good project to add to my programming portfolio, which was lacking. Finding an idea I was willing and able to execute on proved harder than expected. Good ideas are born from necessity and enthusiasm; trying to create a project for its own sake tends to be an uphill battle. I was also hoping to think of a specific project idea that hasnt really been tried before. As you may have guessed by the title of this post, LisaGUI ended up being that project, although I didnt really set out to make it as much as I stumbled into it while trying to accomplish something else. ↫ Andrew Yaros Im someone who prefers to run the real thing on real hardware, but in a lot of cases, thats just not realistic anymore. Hardware like the Apple Lisa are not only hard to find and expensive, they also require considerable knowledge and skill to maintain and possibly repair, which not everyone can do. For these types of machines, virtualisation, emulation, and recreation are much better, more accessible options, especially if it involves hardware and software youre not interested enough in to spend time and money on them.


  • Fixing! the broken Solaris Management Console Oracle wont fix
    In my detailed article about the Sun Microsystems ecosystem of the late 2000s, I mentioned an issue I ran into with the latest (leaked) patchset for Solaris 10, the one from 2020, available on Archive.org. Sun does not make Solaris 10 patches and patchsets from 2014 and later freely available online, restricting them to big enterprise customers with expensive support contracts. The same restrictions apply to mere support documents for Solaris 10, so that issues documented by Oracle, including causes and possible solutions, are only accessible to those with support contracts. The specific issue I ran into is that after installing the 2020 patchset, the Solaris Management Console, a GUI application written in Java with which you can manage certain aspects of your system, would no longer work. It would start up, but any settings panel you tried to load would throw up an RMI_ERR: error unmarshalling return, rendering the SMC effectively non-functional. This problem is documented in Oracle Doc ID 1559490.1, but of course, the Cause and Solution sections are hidden. I like weird commercial UNIX configuration GUIs, so even though you can do all of the SMCs tasks with command-line tools, I still want it to work. Judging by the error and the countless references to Java updates, its easy to figure out that the root cause is an updated version of Java installed by the patchset that the SMC doesnt like. Youd think uninstalling any relevant patches would solve the problem, but I tried that and it didnt make a difference, so I was hoping Oracle perhaps had a later patch to fix the issue, or perhaps a proper workaround to get the SMC working again. Well, a screenshot of the remainder of that Oracle Doc ID mysteriously materialised on my Ultra 45 this morning, and it turns out that Oracle just0 Doesnt care. Honestly, I cant blame them. Solaris 10 is old, outdated, pure legacy, and the very small number of organisations still using it are probably using it in Solaris Zones on servers anyway, and definitely not as a workstation/desktop operating system. There is zero incentive for Oracle to waste any time trying to fix this issue that, lets be honest, really only affects one person in the entire world: me. Still, I wanted it fixed, and so I brute-forced a solution. Its pretty straightforward: just change your default Java version back to one that the Solaris Management Console can work with. While I have Java 1.6.0 and 1.8.0 installed on the Ultra 45, with 1.6.0 being the default, the SMC will only work when 1.5.0 is set as your default Java version. Theres a wide variety of ways to do this, ranging from hatchets to scalpels, but considering nothing else on Solaris 10/SPARC on the Ultra 45 relies on 1.6.0 or later (as far as I can tell, at least), I took a hatchet approach and just changed the /usr/java symlink so that it pointed to 1.5.0 again. Its that simple. Like I said, there are far more elegant ways of doing this, down to various scripts and other things to force only the SMC to use this specific Java version, but its not worth the effort to figure that out, and this works just as well. So, just in case theres ever going to be a second person looking to fix this problem, here you are. You weird, weird person.


  • Microsoft warns its new AI! agents in Windows can install malware
    Microsoft has just announced a whole slew of new AI! features for Windows, and this time, theyll be living in your taskbar. Microsoft is trying to transform Windows into a “canvas for AI,” with new AI agents integrated into the Windows 11 taskbar. These new taskbar capabilities are designed to make AI agents feel like an assistant in Windows that can go off and control your PC and do tasks for you at the click of a button. It’s part of a broader overhaul of Windows to turn the operating system into an “agentic OS.” Microsoft is integrating a variety of AI agents directly into the Windows 11 taskbar, including its own Microsoft 365 Copilot and third-party options. “This integration isn’t just about adding agents; it’s about making them part of the OS experience,” says Windows chief Pavan Davuluri. ↫ Tom Warren at The Verge These AI! agents will control your computer, applications, and files for you, which may make some of you a little apprehensive, and for good reason. AI! tools dont have a great track record when it comes to privacy  Windows Recall comes to mind  and as such, Microsoft claims this time, itll be different. These new AI! agents will run in what are essentially dedicated Windows accounts acting as sandboxes, to ensure they can only access certain resources. While I find the addition of these AI! tools to Windows insufferable and dumb, Im at least glad Microsoft is taking privacy and security seriously this time, and I doubt Microsoft would repeat the same mistakes they made with the entirely botched rollout of Windows Recall. in addition, after the Cloudstrike fiasco, Microsoft made clear commitments to improve its security practices, which further adds to the confidence we should all have these new AI! tools are safe, secure, and private. But wait, whats this? Additionally, agentic AI applications introduce novel security risks, such as cross-prompt injection (XPIA), where malicious content embedded in UI elements or documents can override agent instructions, leading to unintended actions like data exfiltration or malware installation. ↫ Microsoft support document about the new AI! features Microsofts new AI! features can go out and install malware without your consent, because these features possess the access and privileges to do so. The mere idea that some application  which is essentially what these AI! features really are  can go out onto the web and download and install whatever it wants, including malware, on your behalf!, in the background, is so utterly dystopian to me I just cant imagine any serious developer looking at this and thinking yeah, ship it!. Im living in an insane asylum.


  • Run old versions of UNIX for PDP-11 and x86 on modern hardware
    The contents of this repository allow older versions of UNIX (ancient UNIX) to run easily on modern Unix-like systems (Linux, FreeBSD, macOS, among others). ↫ Run ancient UNIX GitHub page With the guides in this repository, you can easily run Versions 1/5/7 UNIX and 2.11BSD UNIX for the PDP-11 and Version 7 UNIX for x86 (ported to x86 by Robert Nordier in 1999, with patches in 2006-2007). Thats it.


  • Living my best Sun Microsystems ecosystem life in 2025
    In my lifetime, theres been one ecosystem I deeply regret having missed out on: the Sun Microsystems ecosystem of the late 2000s. At that time, the company offered a variety of products that, when used together, formed a comprehensive ecosystem that was a fascinating, albeit expensive alternative to Microsoft and Apple. While not really intended for home use, Ive always believed that Suns approach to computing wouldve made for an excellent computing environment in the home. Since I was but a wee university student in the late 2000s living in a small apartment, I did not have the financial means nor the space to really test this hypothesis. Now, though, Suns products from that era are decidedly retro, and a lot more approachable  especially if you have incredibly generous readers. So sit down and buckle up, because weve got a long one today. If you wish to support OSNews and longform content like this, consider becoming a Patreon or donating to our Ko-Fi. Note that absolutely zero generative AI! was used in the writing of this article. No AI! writing aids, no AI! summaries, no ChatGPT, no Gemini search nonsense, nothing. I take pride in doing research and writing properly, without the aid! of digital parrots with brain damage, and if theres any errors, theyre mine and mine alone. Take pride in your work and reject AI!. The Ultra 45: the central hub In the early 2000s, it had already become obvious that the future of workstations lied not with custom architectures, bespoke processors, and commercial UNIX variants, but with standard x86, off-the-shelf Intel and AMD processors, and Windows and Linux. The writing was on the wall, everyone knew it, and the ensuing consolidation on x86 turned into a veritable bloodbath. In the 80s and 90s, many of these ISAs were touted as vastly superior x86 killers, but fast-forward a decade or two, and x86 had bested them all in both price and performance, leaving behind a trail of dead ISAs. Never bet against x86. Virtually none of the commercial UNIX variants survived the one-two punch of losing the ISA they were married to and the rising popularity of Linux in the workstation space. HP-UX was tied to HPs PA-RISC, and both died. SGIs IRIX was tied to MIPS, and both died. Tru64 was tied to Alpha, and both died. The two exceptions are IBMs AIX and Suns Solaris. AIX workstations were phased out, but AIX is still nominally in development for POWER servers, but wholly inaccessible to anyone who doesnt wear a suit and has a massive corporate spending budget. Solaris, meanwhile, which had long been available on x86, saw its own! ISA SPARC live on in the server space until roughly 2017 or so, and was even briefly available as open source until Oracle did its thing. As a result, Solaris and its derivative Illumos are still nominally in active development, but in the grand scheme of things theyre barely even a blip on the radar in 2025. Never bet against Linux. During these tumultuous times, the various commercial UNIX vendors all pushed out systems that would become the final hurrahs of their respective UNIX workstation lines. DEC, then owned by HP, released its AlphaStation ES47 in 2003, marking the end of the road for Alpha and Tru64 UNIX. HPs own PA-RISC architecture and HP-UX met their end with the HP c8000 (which I own), an all-out PA-RISC monster with two dual-core processors running at 1.1GHz. SGI gave its MIPS line of machines running IRIX a massive send-off with the enigmatic and rare Tezro in 2003. In 2005, IBM tried one last time with the IntelliStation POWER 285, followed a few months later by the heavily cut-down 185, the final AIX workstation. And Sun unveiled the Ultra 45, its final SPARC workstation, in 2006. Sun was already in the middle of its transition to x86 with machines like the Sun Java Desktop System and its successors, the Ultra 20 and 40, and then surprised everyone by reviving their UltraSPARC workstation line with the Ultra 25 and 45, which shared most  all?  of their enclosures with their x86 brethren. They were beautiful, all-aluminium machines with gorgeous interior layouts, and a striking full-grill front, somewhat inspired by the PowerMac G5 of that era. And ever since the Ultra 45 was rumoured in late 2005 and then became available in early 2006, Ive been utterly obsessed with it. Its taken almost two decades, but thanks to an unfathomably generous donation from KDE e.V. board member and FreeBSD contributor Adriaan de Groot, a very unique and storied Sun Ultra 45 and a whole slew of accessories showed up at my doorstep only a few weeks ago. Lets look back upon this piece of history that is but a footnote to most, but a whole book to me  and experience Suns ecosystem from around 2006, today. First and foremost, I want to express my deep gratitude to Adriaan de Groot. Without him, none of this would have been possible, and I cant put into words how grateful I am. He donated this Ultra 45 to me at no cost  not even the cost of shipping  and he also shipped another box to me containing a few Sun Ray thin clients, completing the late 2000s Sun ecosystem I now own. Since the Ultra 45 was technically owned by KDE e.V.  more on that below  Id also like to thank the KDE e.V. Board for giving Adriaan permission for the donation. Id also like to thank Volker A. Brandt, who sent me a Sun Ray 3, a few Ultra 45 hard drive brackets, and some other Sun goodies. The Sun Ultra 45 De Groot sent me was a base model with an upgraded GPU. It had a single UltraSPARC IIIi 1.6Ghz processor, 1GB of RAM, and the most powerful GPU Sun ever released for its SPARC workstation line, the Sun XVR-2500, a rebadged 3Dlabs Wildcat Realizm with


  • Using Rust in Android speeds up development considerably
    Google has been using Rust in Android more and more for its memory safety characteristics, and the results on that front were quite positive. It turns out, however, that not only does using Rust reduce the number memory safety issues, its also apparently a lot faster to code in Rust than C or C++. We adopted Rust for its security and are seeing a 1000x reduction in memory safety vulnerability density compared to Android’s C and C++ code. But the biggest surprise was Rusts impact on software delivery. With Rust changes having a 4x lower rollback rate and spending 25% less time in code review, the safer path is now also the faster one. ↫ Jeff Vander Stoep at the Google Security Blog When you think about it, it actually makes sense. If you have fewer errors of a certain type, youll spend less time fixing those issues, time which you can then spend developing new code. Of course, its not that simple and theres a ton more factors to consider, but on a base level, it definitely makes sense. Spellcheck in word processors means you have to spend less time detecting and fixing spelling errors, so you have more time to spend on actually writing. Im sure well all be very civil about this, and nobody will be weird about Rust at all.


  • Haiku gets new guarded heap for the kernel
    Another month, another Haiku activity report, and this time weve got a major change under the hood: a brand new guarded heap. The old guarded heap was suboptimal and had started to lag behind, so the new one attempts to rectify some of these shortcomings. So, to rectify these limitations, I rewrote the kernel guarded heap more or less from scratch, taking the old code into account where it made sense but otherwise creating entirely new bookkeeping structures, interacting directly with the page table and virtual memory systems, and more. This new guarded heap implementation frees physical pages when not in use, meaning that the “virtual memory reuse disabled” mode now runs for quite long periods of time (indeed, I could successfully boot to the desktop and run compile jobs.) It also prints more diagnostics when kernel panics due to memory faults inside the heap happen, which the old kernel guarded heap didn’t (but the userland one has always done). ↫ Haikus activity report for October The new guarded heap is optional for now, but Haiku is planning on releasing some pre-built test builds so users can start testing it out. Of course, this isnt the only change or improvement from this past month  the list of changes is long, but theres no real tentpole features here. Haikus development pace is still very much on track.


  • Google cancels plans to require Android application certification outside of the Play Store
    Only a few months ago, Google announced it was going to require that all Android applications  even those installed outside of the Play Store  had to be verified. This led to a massive backlash, and it seems our protests and complaints have had effect: the company announced a change in plans today, and will, in fact, not require certification for installing applications outside of the Play Store. Based on this feedback and our ongoing conversations with the community, we are building a new advanced flow that allows experienced users to accept the risks of installing software that isnt verified. We are designing this flow specifically to resist coercion, ensuring that users arent tricked into bypassing these safety checks while under pressure from a scammer. It will also include clear warnings to ensure users fully understand the risks involved, but ultimately, it puts the choice in their hands. We are gathering early feedback on the design of this feature now and will share more details in the coming months. ↫ Matthew Forsythe Director at the Android Developers Blog While this is great news, Im still concerned this is only temporary. Companies like Google have a tendency to announce some draconian measure to test the waters, walk it back in response to backlash, only to then reintroduce it through some sneaky backdoor a year later when nobodys looking. Installing whatever we want on the devices we own should be a protected right, not something graciously afforded to us by our corporate overlords. If you think this is the end of this story, youre a fool.


  • Big news for small OpenBSD /usr partitions
    Ever ran into issues using sysupgrade on OpenBSD because /usr ran out of space? OpenBSD developers are trying to address this issue. Firstly, Stuart Henderson (sthen@) modified the installer to increase free space prior to installing. Theo de Raadt (deraadt@) modified sysupgrade(8) so that, if space is too tight, it will fail gracefully rather than risk leaving the administrator with a broken system. ↫ OpenBSD Journal These are very welcome additions.


  • Valve brings x86 gaming to ARM Linux with FEX
    Valve announced a few new devices yesterday. Theres a new Steam console, which is essentially just a tiny PC with SteamOS installed  think of it as a Steam Deck without a display. Second, Valve finally released a new Steam Controller to go with the Steam console, which has taken them long enough. Lastly, theres a brand new Steam VR headset, the Steam Frame. Other websites with actual access to these new devices will do a better job of covering them than I ever could, but I do want to highlight something crucially important about the Steam Frame: it contains a Snapdragon ARM processor, but can still run Steam and all of its games. How does this work? Well, after developing Proton to allow Windows games to run on Linux, Valve introduced! FEX, which will allow you to run x86 Windows games on ARM Linux. I put the quotation marks there because FEX was an existing project Valve invested heavily into in recent times, and its now at the point where Valve seems confident enough it will be capable of running enough x86 games on ARM Linux. As such, the Steam Frame runs full SteamOS with KDE Plasma, you can run x86 Steam games, and as an additional bonus, you can install Android APKs as well. Ive yet to even try VR, because Im not particularly interested in buying into any locked-down platform. The Steam Frame may be the first VR device Ill buy  depending on price, of course  and the Steam console definitely looks like a great addition to the living room, too. My wife and I have little to no interesting in buying an Xbox or PS5, but having easy, no-hassle access to our massive Steam libraries on our TV will be awesome.


  • VMS/XDE: an OpenVMS x86 development environment for Linux and Windows/WSL
    VMS/XDE is an OpenVMS x86 development environment for Linux and WIndows (via WSL). It provides a familiar user experience for OpenVMS developers working in Linux and Windows yet offers 100% binary and file system compatilibilty with OpenVMS. VMS/XDE includes OpenVMS V9.2-3 user, supervisor and executive mode operating system environments and a set of x86 native compilers and layered products geared towards OpenVMS software development and testing. ↫ VMS/XDE website VMS/XDE is a beta version, and comes with the usual annoying OpenVMS x86 time bombs, this time exploding on 3 January 2026. If you intend to use the finalised commercial version after the beta period ends, youll have to employ the same licenses as regular OpenVMS. Its a bit of a mess, but thats the OpenVMS way, sadly  and I dont blame them, either, as Im sure theyre hamstrung by a ton of agreements and restrictions imposed upon them by HP. Regardless, VMS/XDE brings a zero setup OpenVMS environment to the operating system youre already using, making it easier to develop and cross-compile for the platform. I still have absolutely no clue just how many people OpenVMS is still relevant for, but I absolutely adore the fact VMS Software Inc. is working on this. In a world where so many of its former competitors are being held hostage by corporate indifference, its refreshing to see VMS still moving forward.


  • Plasma Mobile 6.5 keeps improving
    As part of the KDE Plasma 6.5 release, we also got a new release of Plasma Mobile. As theres a lot of changes, improvements, and new features in Plasma Mobile 6.5, the Plasma Mobile Team published a blog post to highlight them all. The biggest improvement is probably the further integration of Waydroid, a necessary evil to run Android applications until the Plasma Mobile ecosystem manages to become a bit more well-rounded. Waydroid can now be managed straight from the settings application and the quick settings dropdown. Furthermore, the lockscreen has been improved considerably, theres been a ton of polish for the home screen and the user interface in general, the quick settings panel can now be customised to make it fit better on different form factors, the first early test version of the new Plasma mobile keyboard is included, and so much more. This is definitely a release I would want to try out, but since I dont have any of the supported devices, Im a bit stuck. This is, of course, one of the two major problems facing proper mobile Linux: the lack of device support. Its improving due to the tireless work of countless volunteers, but theyre always going to be swimming upstream. The other major problem is, of course, application availability, but at least Waydroid can bridge the gap for the adventurous among us.


  • Tribblix m38 released
    Tribblix, the Illumos distribution focused on giving you a classic UNIX-style experience, has released a new version. Milestone 38 isnt the most consequential release of all time, but it does bring a few small changes accompanied by the usual long list of updated open source packages. The zap install command now installs dependencies by default, while zap create-user will now restrict new home directories to mode 0700 by default. Meanwhile, int16h at Cryogenix published an article about using a Bhyve VM running FreeBSD to act as a Wi-Fi bridge for laptops with 802.11xx chips that Tribblix doesnt support. This is a great, albeit somewhat convoluted option if your hardware uses any Wi-Fi chips Tribblix doesnt support. Theres honestly a solution for everything, isnt there?


  • Setting up a combined 68k/PA-RISC HP-UX 9 cluster
    Jonathan Pallant got lucky and managed to score a massive haul of 90s UNIX workstations, one of which was an HP 9000 Model 340, a HP-UX workstation built around a Motorola 68030 processor at 16.7 MHz. It doesnt come with a hard drive or even a floppy controller, though, so he decided to borrow a PA-RISC-based HP 9000 Model 705 to set up an HP-UX 9 cluster. But wait, how does that work, when were dealing with two entirely different architectures? Whats more fun though, is putting it into a cluster with the Model 705 and network booting it. Yes, that a 68030 machine network booting from a PA-RISC machine 0 and`sharing the same root filesystem. But arent PA-RISC binaries and 68K binaries quite different? Oh yes, they really are. So, how does that work? ↫ Jonathan Pallant HP-UX is far more interesting and fascinating than a lot of people give it credit for, and while my interest lies with HP-UX 11i, I find what Pallant is doing here with HP-UX 9 just as fascinating. You first need to install HP-UX 9 for PA-RISC on the 700 series machine, convert it to a cluster server, and then install HP-UX 9 for 68k on top of that PA-RISC installation. After this is done, you effectively end up with a single root file system that contains both PA-RISC and 68k binaries, and you can network boot the 68k-based Model 340 right from it  using the same root filesystem on both machines. Absolutely wild. No, these are not universal binaries or some other trick you might know of from more modern system. In fact, installing the 68k version of HP-UX 9 into! the PA-RISC HP-UX 9 cluster server, you end up with something called a Context Dependent Filesystem. To get a better idea of what this means and how this works, you should really head on over to Pallants excellent article for all the details.


Linux Journal - The Original Magazine of the Linux Community

  • Wine 10.19 Released: Game Changing Support for Windows Reparse Points on Linux
    by George Whittaker Introduction
    If you use Linux and occasionally run Windows applications, whether via native Wine or through gaming layers like Proton, you’ll appreciate what just dropped in Wine 10.19. Released November 14 2025, this version brings a major enhancement: official support for Windows reparse points, a filesystem feature many Windows apps rely on, and a host of other compatibility upgrades.

    In simpler terms: Wine now understands more of the Windows filesystem semantics, which means fewer workarounds, better application compatibility, and smoother experiences for many games and tools previously finicky under Linux.
    What Are Reparse Points & Why They MatterUnderstanding Reparse Points
    On Windows, a reparse point is a filesystem object (file or directory) that carries additional data, often used for symbolic links, junctions, mount points, or other redirection features. When an application opens or queries a file, the OS may check the reparse tag to determine special behavior (for example “redirect this file open to this other path”).

    Because many Windows apps, installers, games, DRM systems, file-managers, use reparse points for features like directory redirection, path abstractions, or filesystem overlays, lacking full support for them in Wine means those apps often misbehave.
    What Wine 10.19 Adds
    With Wine 10.19, support for these reparse point mechanisms has been implemented in key filesystem APIs: for example NtQueryDirectoryFile, GetFileInfo, file attribute tags, and DeleteFile/RemoveDirectory for reparse objects.

    This means that in Wine 10.19:

    Windows apps that create or manage symbolic links, directory junctions or mount-point style re-parsing will now function correctly in many more cases.

    Installers or frameworks that rely on “when opening path X, redirect to path Y” will work with less tinkering.

    Games or utilities that check for reparse tags or use directory redirections will have fewer “stuck” behaviors or missing files.

    In effect, this is a step toward closer to native behavior for Windows file-system semantics under Linux.
    Other Key Highlights in Wine 10.19
    Beyond reparse points, the release brings several notable improvements:

    Expanded support for WinRT exceptions (Windows Runtime error handling) meaning better compatibility for Universal Windows Platform (UWP) apps and newer Windows-based frameworks.

    Refactoring of “Common Controls” (COMCTL32) following the version 5 vs version 6 split, which helps GUI applications that rely on older controls or expect mixed versions.
    Go to Full Article


  • Firefox 145: A Major Release with 32-Bit Linux Support Dropped
    by George Whittaker Introduction
    Mozilla has rolled out Firefox 145, a significant update that brings a range of usability, security and privacy enhancements, while marking a clear turning point by discontinuing official support for 32-bit Linux systems. For users on older hardware or legacy distros, this change means it’s time to consider moving to a 64-bit environment or opting for a supported version.

    Here’s a detailed look at what’s new, what’s changed, and what you need to know.
    Major Changes in Firefox 145End of 32-Bit Linux Builds
    One of the headline items in this release is Mozilla’s decision to stop building and distributing Firefox for 32-bit x86 Linux. As per their announcement:

    “32-bit Linux (on x86) is no longer widely supported by the vast majority of Linux distributions, and maintaining Firefox on this platform has become increasingly difficult and unreliable.”

    From Firefox 145 onward, only 64-bit (x86_64) and relevant 64-bit architectures (such as ARM64) will be officially supported. For those still running 32-bit Linux builds, Mozilla recommends migrating to 64-bit or switching to the Extended Support Release (ESR) branch (Firefox 140 ESR) which still supports 32-bit for a limited period.
    Usability & Interface Enhancements
    Firefox 145 brings several improvements designed to make everyday web browsing smoother and more flexible:

    PDF viewer enhancements: You can now add, edit, and delete comments in PDFs, and a comments sidebar helps you easily navigate your annotations.

    Tab-group preview: When you hover over the name of a collapsed tab group, a thumbnail preview of the tabs inside appears, helpful for reorganizing or returning to work.

    Access saved passwords from the sidebar, without needing to open a new tab or window.

    “Open links from apps next to your active tab” setting: When enabled, links opened from external applications insert next to your current tab instead of at the end of the tab bar.

    Slight UI refinements: Buttons, input fields, tabs and other elements get more rounded edges, horizontal tabs are redesigned to align with vertical-tab aesthetics.
    Privacy, Security & Under-the-Hood Upgrades
    Mozilla has also doubled down on privacy and risk reduction:

    Fingerprinting defenses: Firefox 145 introduces new anti-fingerprinting techniques that Mozilla estimates reduce the number of users identified as unique by nearly half when Private Browsing mode or Enhanced Tracking Protection (strict) is used.
    Go to Full Article


  • MX Linux 25 ‘Infinity’ Arrives: Debian 13 ‘Trixie’ Base, Modern Tools & A Fresh Installer
    by George Whittaker Introduction
    The team behind MX Linux has just released version 25, carrying the codename “Infinity”, and it brings a significant upgrade by building upon the stable base of Debian 13 “Trixie”. Released on November 9, 2025, this edition doesn’t just refresh the desktop, it introduces modernized tooling, updated kernels, dual init-options, and installer enhancements aimed at both newcomers and long-time users.

    In the sections that follow, we’ll walk through the key new features of MX Linux 25, what’s changed for each desktop edition, recommended upgrade or fresh-install paths, and why this release matters in the wider Linux-distribution ecosystem.
    What’s New in MX Linux 25 “Infinity”
    Here are the headline changes and improvements that define this release:
    Debian 13 “Trixie” Base
    By moving to Debian 13, Infinity inherits all the stability, security updates, and broader hardware support of the latest Debian stable release. The base system now aligns with Trixie’s libraries, kernels, and architecture support.
    Kernel Choices & Hardware Support
    The standard editions ship with the Linux 6.12 LTS kernel series, offering a solid baseline for most hardware.

    For newer hardware or advanced users, the “AHS” (Advanced Hardware Support) variants and the KDE Plasma edition adopt a Liquorix-flavored Linux 6.16 (or 6.15 in some variants) kernel, maximizing performance and compatibility with cutting-edge setups.
    Dual Init Option: systemd and SysVinit
    Traditionally associated with lighter-weight init options, MX Linux now offers both systemd by default and SysVinit editions (particularly for Xfce and Fluxbox variants). This gives users the freedom to choose their init system preference without losing new features.
    Updated Desktop Environments
    Xfce edition: Ships with Xfce 4.20. Improvements include a revamped Whisker Menu, updated archive management tools (Engrampa replacing File Roller in some editions).

    KDE Plasma edition: Uses KDE Plasma 6.3.6, defaults to Wayland for a modern session experience (with X11 still optionally available), adds root-actions and service menus to Dolphin, and switches TLP out for power-profiles-daemon to resolve power widget issues.

    Fluxbox edition: Offers a more minimal, highly customizable environment: new panel layouts, updated “appfinder” configs for Rofi, toolbar changes and themes refined. Defaults the audio player to Audacious (instead of the older DeaDBeeF).
    Go to Full Article


  • Arch Linux November 2025 ISO: Fresh Snapshot, Smarter Installer (Archinstall 3.0.12) & Pacman 7.1
    by George Whittaker
    Arch Linux has shipped its November 2025 ISO snapshot (2025.11.01), and while Arch remains a rolling distribution, these monthly images are a big deal, especially for new installs, labs, and homelab deployments. This time, the ISO lands alongside two important pieces:

    Archinstall 3.0.12 – a more polished, smarter TUI installer

    Pacman 7.1 – a package manager update with stricter security and better tooling

    If you’ve been thinking about spinning up a fresh Arch box, or you’re curious what changed under the hood, this release is a very nice jumping-on point.
    Why Arch Still Ships Monthly ISOs in a Rolling World
    Arch is famous for its “install once, update forever” model. Technically, you could install from a two-year-old image and just run:

    sudo pacman -Syu

    …but in practice, that’s painful:

    Huge initial update downloads

    Possible breakage jumping across many months of changes

    Outdated installer tooling

    That’s why the project publishes a monthly snapshot ISO: it rolls all current packages into a fresh image so you:

    Start with a current kernel and userland

    Spend less time updating right after install

    Get the latest Archinstall baked in (or just a pacman -Sy archinstall away)

    The 2025.11.01 ISO is exactly that: Arch as of early November 2025, ready to go.
    What’s Inside the November 2025 ISO (2025.11.01)
    The November snapshot doesn’t introduce new features by itself, it’s a frozen image of current Arch, but a few details are worth calling out:

    Ships with a Linux 6.17.x kernel, including improved AMD/Intel GPU support and updated Btrfs bits.

    Includes all the usual base packages plus current toolchains, drivers, and desktop stacks from the rolling repos.

    The image is intended only for new installs; existing Arch systems should keep using pacman -Syu for upgrades.

    You can download it from the official Arch Linux download page or via BitTorrent mirrors.

    One small twist: the ISO itself still ships with Archinstall 3.0.11, but 3.0.12 was released the same day – so we’ll grab the newer version from the repos before running the installer.
    Archinstall 3.0.12: What’s Actually New?
    Archinstall has evolved from “nice experiment” to “pretty solid way to install Arch” if you don’t want to script everything yourself. Version 3.0.12 is a refinement release focused on stability, storage, and bootloader logic.
    Go to Full Article


  • AMD Confirms Zen 5 RNG Flaw: When ‘Random’ Isn’t Random Enough
    by George Whittaker
    AMD has officially confirmed a high-severity security vulnerability in its new Zen 5–based CPUs, and it’s a nasty one because it hits cryptography right at the source: the hardware random number generator.

    Here’s a clear breakdown of what’s going on, how bad it really is, and what you should do if you’re running Zen 5.
    What AMD Just Confirmed
    AMD’s security bulletin AMD-SB-7055, now tracked as CVE-2025-62626, describes a bug in the RDSEED instruction on Zen 5 processors. Under certain conditions, the CPU can:

    Return the value 0 from RDSEED far more often than true randomness would allow

    Still signal “success” (carry flag CF=1), so software thinks it got a good random value

    The issue affects the 16-bit and 32-bit forms of RDSEED on Zen 5; the 64-bit form is not affected.

    Because RDSEED is used to feed cryptographically secure random number generators (CSPRNGs), a broken RDSEED can poison keys, tokens, and other security-critical values.

    AMD classifies the impact as:

    Loss of confidentiality and integrity (High severity).
    How the Vulnerability Works (In Plain English)What RDSEED Is Supposed to Do
    Modern CPUs expose hardware instructions like RDRAND and RDSEED:

    RDRAND: Gives you pseudo-random values from a DRBG that’s already been seeded.

    RDSEED: Gives you raw entropy samples suitable for seeding cryptographic PRNGs (it should be very close to truly random).

    Software like TLS libraries, key generators, HSM emulators, and OS RNGs may rely directly or indirectly on RDSEED to bootstrap secure randomness.
    What’s Going Wrong on Zen 5
    On affected Zen 5 CPUs:

    The 16-bit and 32-bit RDSEED variants sometimes return 0 much more often than a true random source should.

    Even worse, they simultaneously report success (CF=1), so software assumes the value is fine rather than retrying.

    In cryptographic terms, this means:

    Entropy can be dramatically reduced (many key bits become predictable or even fixed).

    Keys or nonces derived from those values can become partially or fully guessable.
    Go to Full Article


  • The Most Critical Linux Kernel Breaches of 2025 So Far
    by George Whittaker
    The Linux kernel, foundational for servers, desktops, embedded systems, and cloud infrastructure, has been under heightened scrutiny. Several vulnerabilities have been exploited in real-world attacks, targeting critical subsystems and isolation layers. In this article, we’ll walk through major examples, explain their significance, and offer actionable guidance for defenders.
    CVE-2025-21756 – Use-After-Free in the vsock Subsystem
    One of the most alarming flaws this year involves a use-after-free vulnerability in the Linux kernel’s vsock implementation (Virtual Socket), which enables communication between virtual machines and their hosts.

    How the exploit works:A malicious actor inside a VM (or other privileged context) manipulates reference counters when a vsock transport is reassigned. The code ends up freeing a socket object while it’s still in use, enabling memory corruption and potentially root-level access.

    Why it matters:Since vsock is used for VM-to-host and inter-VM communication, this flaw breaks a key isolation barrier. In multi-tenant cloud environments or container hosts that expose vsock endpoints, the impact can be severe.

    Mitigation:Kernel maintainers have released patches. If your systems run hosts, hypervisors, or other environments where vsock is present, make sure the kernel is updated and virtualization subsystems are patched.
    CVE-2025-38236 – Out-of-Bounds / Sandbox Escape via UNIX Domain Sockets
    Another high-impact vulnerability involves the UNIX domain socket interface and the MSG_OOB flag. The bug was publicly detailed in August 2025 and is already in active discussion.

    Attack scenario:A process running inside a sandbox (for example a browser renderer) can exploit MSG_OOB operations on a UNIX domain socket to trigger a use-after-free or out-of-bounds read/write. That allows leaking kernel pointers or memory and then chaining to full kernel privilege escalation.

    Why it matters:This vulnerability is especially dangerous because it bridges from a low-privilege sandboxed process to kernel-level compromise. Many systems assume sandboxed code is safe; this attack undermines that assumption.

    Mitigation:Distributions and vendors (like browser teams) have disabled or restricted MSG_OOB usage for sandboxed contexts. Kernel patches are available. Systems that run browser sandboxes or other sandboxed processes need to apply these updates immediately.
    CVE-2025-38352 – TOCTOU Race Condition in POSIX CPU Timers
    In September 2025, the U.S. Cybersecurity & Infrastructure Security Agency (CISA) added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog.
    Go to Full Article


  • Steam Deck 2 Rumors Ignite a New Era for Linux Gaming
    by George Whittaker
    The speculation around a successor to the Steam Deck has stirred renewed excitement, not just for a new handheld, but for what it signals in Linux-based gaming. With whispers of next-gen specs, deeper integration of SteamOS, and an evolving handheld PC ecosystem, these rumors are fueling broader hopes that Linux gaming is entering a more mature age. In this article we look at the existing rumors, how they tie into the Linux gaming landscape, why this matters, and what to watch.
    What the Rumours Suggest
    Although Valve has kept things quiet, multiple credible outlets report about the Steam Deck 2 being in development and potentially arriving well after 2026. Some of the key tid-bits:

    Editorials note that Valve isn’t planning a mere spec refresh; it wants a “generational leap in compute without sacrificing battery life”.

    A leaked hardware slide pointed to an AMD “Magnus”-class APU built on Zen 6 architecture being tied to next-gen handhelds, including speculation about the Steam Deck 2.

    One hardware leaker (KeplerL2) cited a possible 2028 launch window for the Steam Deck 2, which would make it roughly 6 years after the original.

    Valve’s own design leads have publicly stated that a refresh with only 20-30% more performance is “not meaningful enough”, implying they’re waiting for a more substantial upgrade.

    In short: while nothing is official yet, there’s strong evidence that Valve is working on the next iteration and wants it to be a noteworthy jump, not just a minor update.
    Why This Matters for Linux Gaming
    The rumoured arrival of the Steam Deck 2 isn’t just about hardware, it reflects and could accelerate key inflection points for Linux & gaming:
    Validation of SteamOS & Linux Gaming
    The original Steam Deck, running SteamOS (a Linux-based OS), helped prove that PC gaming doesn’t always require Windows. A well-received successor would further validate Linux as a first-class gaming platform, not a niche alternative but a mainstream choice.
    Handheld PC Ecosystem Momentum
    Since the first Deck, many Windows-based handhelds have entered the market (such as the ROG Ally, Lenovo Legion Go). Rumours of the Deck 2 keep spotlight on the form factor and raise expectations for Linux-native handhelds. This momentum helps encourage driver, compatibility and OS investments from the broader community.
    Go to Full Article


  • Kali Linux 2025.3 Lands: Enhanced Wireless Capabilities, Ten New Tools & Infrastructure Refresh
    by George Whittaker Introduction
    The popular penetration-testing distribution Kali Linux has dropped its latest quarterly snapshot: version 2025.3. This release continues the tradition of the rolling-release model used by the project, offering users and security professionals a refreshed toolkit, broader hardware support (especially wireless), and infrastructure enhancements under the hood. With this update, the distribution aims to streamline lab setups, bolster wireless hacking capabilities (particularly on Raspberry Pi devices), and integrate modern workflows including automated VMs and LLM-based tooling.

    In this article, we’ll walk through the key highlights of Kali Linux 2025.3, how the changes affect users (both old and new), the upgrade path, and what to keep in mind for real-world deployment.
    What’s New in Kali Linux 2025.3
    This snapshot from the Kali team brings several categories of improvements: tooling, wireless/hardware support, architecture changes, virtualization/image workflows, UI and plugin tweaks. Below is a breakdown of the major updates.
    Tooling Additions: Ten Fresh Packages
    One of the headline items is the addition of ten new security tools to the Kali repositories. These tools reflect shifts in the field, toward AI-augmented recon, advanced wireless simulation and pivoting, and updated attack surface coverage. Among the additions are:

    Caido and Caido-cli – a client-server web-security auditing toolkit (graphical client + backend).

    Detect It Easy (DiE) – a utility for identifying file types, a useful tool in reverse engineering workflows.

    Gemini CLI – an open-source AI agent that integrates Google’s Gemini (or similar LLM) capabilities into the terminal environment.

    krbrelayx – a toolkit focused on Kerberos relaying/unconstrained delegation attacks.

    ligolo-mp – a multiplayer pivoting solution for network-lateral movement.

    llm-tools-nmap – allows large-language-model workflows to drive Nmap scans (automated/discovery).

    mcp-kali-server – configuration tooling to connect an AI agent to Kali infrastructure.

    patchleaks – a tool that detects security-fix patches and provides detailed descriptions (useful both for defenders and auditors).

    vwifi-dkms – enables creation of “dummy” Wi-Fi networks (virtual wireless interfaces) for advanced wireless testing and hacking exercises.
    Go to Full Article


  • VMScape: Cracking VM-Host Isolation in the Speculative Execution Age & How Linux Patches Respond
    by George Whittaker Introduction
    In the world of modern CPUs, speculative execution, where a processor guesses ahead on branches and executes instructions before the actual code path is confirmed, has long been recognized as a performance booster. However, it has also given rise to a class of vulnerabilities collectively known as “Spectre” attacks, where microarchitectural side states (such as the branch target buffer, caches, or predictor state) are mis-exploited to leak sensitive data.

    Now, a new attack variant, dubbed VMScape, exposes a previously under-appreciated weakness: the isolation between a guest virtual machine and its host (or hypervisor) in the branch predictor domain. In simpler terms: a malicious VM can influence the CPU’s branch predictor in such a way that when control returns to the host, secrets in the host or hypervisor can be exposed. This has major implications for cloud security, virtualization environments, and kernel/hypervisor protections.

    In this article we’ll walk through how VMScape works, the CPUs and environments it affects, how the Linux kernel and hypervisors are mitigating it, and what users, cloud operators and admins should know (and do).
    What VMScape Is & Why It MattersThe Basics of Speculative Side-Channels
    Speculative execution vulnerabilities like Spectre exploit the gap between architectural state (what the software sees as completed instructions) and microarchitectural state (what the CPU has done internally, such as cache loads, branch predictor updates, etc). Even when speculative paths are rolled back architecturally, side-effects in the microarchitecture can remain and be probed by attackers.

    One of the original variants, Spectre-BTI (Branch Target Injection, also called Spectre v2) leveraged the Branch Target Buffer (BTB) / predictor to redirect speculative execution along attacker-controlled paths. Over time, hardware and software mitigations (IBRS, eIBRS, IBPB, STIBP) have been introduced. But VMScape shows that when virtualization enters the picture, the isolation assumptions break down.
    VMScape: Guest to Host via Branch Predictor
    VMScape (tracked as CVE‑2025‑40300) is described by researchers from ETH Zürich as “the first Spectre-based end-to-end exploit in which a malicious guest VM can leak arbitrary sensitive information from the host domain/hypervisor, without requiring host code modifications and in default configuration.”

    Here are the key elements making VMScape significant:

    The attack is cross-virtualization: a guest VM influences the host’s branch predictor state (not just within the guest).
    Go to Full Article


  • Self-Tuning Linux Kernels: How LLM-Driven Agents Are Reinventing Scheduler Policies
    by George Whittaker Introduction
    Modern computing systems rely heavily on operating-system schedulers to allocate CPU time fairly and efficiently. Yet many of these schedulers operate blindly with respect to the meaning of workloads: they cannot distinguish, for example, whether a task is latency-sensitive or batch-oriented. This mismatch, between application semantics and scheduler heuristics, is often referred to as the semantic gap.

    A recent research framework called SchedCP aims to close that gap. By using autonomous LLM‐based agents, the system analyzes workload characteristics, selects or synthesizes custom scheduling policies, and safely deploys them into the kernel, without human intervention. This represents a meaningful step toward self-optimizing, application-aware kernels.

    In this article we will explore what SchedCP is, how it works under the hood, the evidence of its effectiveness, real-world implications, and what caveats remain.
    Why the Problem Matters
    At the heart of the issue is that general-purpose schedulers (for example the Linux kernel’s default policy) assume broad fairness, rather than tailoring scheduling to what your application cares about. For instance:

    A video-streaming service may care most about minimal tail latency.

    A CI/CD build system may care most about throughput and job completion time.

    A cloud analytics job may prefer maximum utilisation of cores with less concern for interactive responsiveness.

    Traditional schedulers treat all tasks mostly the same, tuning knobs generically. As a result, systems often sacrifice optimisation opportunities. Some prior efforts have used reinforcement-learning techniques to tune scheduler parameters, but these approaches have limitations: slow convergence, limited generalisation, and weak reasoning about why a workload behaves as it does.

    SchedCP starts from the observation that large language models can reason semantically about workloads (expressed in plain language or structured summaries), propose new scheduling strategies, and generate code via eBPF that is loaded into the kernel via the sched_ext interface. Thus, a custom scheduler (or modified policy) can be developed specifically for a given workload scenario, and in a self-service, automated way.
    Architecture & Key Components
    SchedCP comprises two primary subsystems: a control-plane framework and an agent loop that interacts with it. The framework decouples “what to optimise” (reasoning) from “how to act” (execution) in order to preserve kernel stability while enabling powerful optimisations.

    Here are the major components:
    Go to Full Article


Page last modified on November 02, 2011, at 10:01 PM