TuxMachines

Subscribe to TuxMachines feed
Your source for Linux and Open Source news, reviews, and howtos.
Updated: 8 min 6 sec ago

Emmabuntus 3 1.04 Linux Distro Officially Released, Based on Xubuntu 14.04.1 LTS

Wed, 2017-05-17 18:06

Patrick Emmabuntus is pleased to inform us today about the release and immediate availability of the Emmabuntus 3 1.04 update of the educational-oriented GNU/Linux distribution based on Xubuntu and the Xfce desktop environment.

read more

MATE 1.16.2 Desktop Environment Is Now Available for Ubuntu MATE 16.04.2 LTS

Wed, 2017-05-17 18:03

Ubuntu MATE project leader Martin Wimpress announced today the availability of the MATE 1.16.2 desktop environment in the special PPA (Personal Package Archive) created for users of the Ubuntu MATE 16.04.2 LTS (Xenial Xerus) operating system.

read more

Building Linux-powered devices, part 1: Making my Linux-only world a reality - Network World

Wed, 2017-05-17 17:55

Sometimes, if you want something badly enough, you need to get off your lazy tuchus and make it happen yourself.

For years now, I've been hoping and pining (and often complaining and whining) about how much I want Linux-powered... everything. Not Android. Not ChromeOS. Real Linux. The kind of Linux you have full control over—the sort you'd install on your desktop PC.

read more

Possible Protections To Take Against WannaCry Ransomware Attack

Wed, 2017-05-17 12:40

​Last week Windows users suffered a ransomware attack at a global scale and had their files encrypted. The attackers demanded a payment of $600 worth in bitcoins decrypt all the users' files. This is one of the biggest ransomware attacks recorded and still growing. Read the complete article published yesterday on LinuxAndUbuntu. In this article, we will talk about some of the possible actions one can take against this ransomware.

more" title="Read the rest of this article" />

read more

Security Leftovers

Wed, 2017-05-17 10:34

read more

BSD Leftovers

Wed, 2017-05-17 10:34

read more

Plasma 5.10 Beta, Slicker Desktop

Tue, 2017-05-16 21:22

Monday, 15 May 2017. Today KDE has made a testing release of our desktop Plasma 5.10 with new features across the suite to give users an experience which lives up to our tagline: simple by default, powerful when needed.

read more

Here Is What You Need To Know About WannCry Ransomware That's Infecting Windows Systems Globally

Tue, 2017-05-16 14:23

​The internet has its good and bad and we have to be extra careful to not fall on the claws of the hackers or attackers. This can happen from buying online, getting your account hacked or getting your files “kidnapped”, on this last one is when your files get encrypted and the attacker wants you to pay him a certain amount to get the files decrypted. In this article, we will talk about this ransomware that until today has infected more than 230,000+ computers in 150 countries and has raised more than $50,000,00.

more" title="Read the rest of this article" />

read more

Security Leftovers

Mon, 2017-05-15 23:24
  • Out-of-Control CIA Continues to be Exposed in WikiLeaks’ Vault 7

    After installing a small file, the operators would then be able to instruct the computer to kill any use of a web browser on a set schedule. For instance, the software could be instructed to shut down Firefox every 25-35 seconds. Similarly, the example included a measure to “lock up” PowerPoint files 10 minutes after they were loaded. It would also allow operators to create a delay when PowerPoint files were attempting to load.

    While the examples they used are simple and relatively harmless, the software could perform virtually any assigned task. Because the data is encrypted with a key stored outside of the machine, the code would be extremely difficult to detect and/or decipher.

    After installing the software, the documentation instructs users to “kick back” and “Relax – After Midnight will take care of the rest.”

    The second piece of software detailed is similar to “AfterMidnight” and is called “Assassin.” That piece of software is a relatively simple way of collecting data remotely and then delivering results to a listening post on a schedule.

    Through screenshots in the documents, it can be seen that the author is named “Justin,” is working from a Dell computer, and desktop shortcuts to an encrypted chat program called ‘Pidgin,’ as well as a folder entitled “drone.”

  • Global ‘Wana’ Ransomware Outbreak Earned Perpetrators $26,000 So Far

    However, I find it depressing to think of the massive financial damage likely wrought by this ransom campaign in exchange for such a comparatively small reward. It’s particularly galling because this attack potentially endangered the lives of many.

  • Ransomware: Microsoft can no longer claim to be 'proactive'

    Microsoft's reaction to the Windows ransomware crisis that occurred on Friday and Saturday has shown one thing: no longer can the company continue to use the business buzzword "proactive" when it talks about itself. It was caught unawares and left looking very old and tired in the way it responded to the situation.

  • Cyber attack: Hackers {sic} in China try to seize control of WannaCry ransomware's 'kill switch'

    “What you can follow is the money,” Mr Raiu said. “You can follow the Bitcoins [although] following the Bitcoins is kind of an art in itself.”

  • [Old] The Software Industry IS the Problem

    The question is how to introduce product liability, because just imposing it would instantly shut down any and all software houses with just a hint of a risk management function on their organizational charts.

  • [Old] Why Not Use Port Knocking?

    The robots currently at work knocking around for your guessable password could easily be repurposed to guess your Unicode password currently known as your port knocking sequence, and quite likely have been already.

read more

Pages