'Something Has Gone Seriously Wrong,' Dual-Boot Systems Warn After Microsoft Update

Posted: 2024-08-21 00:40:00
Source: https://tech.slashdot.org/story/24/08/21/0031243/something-has-gone-seriously-wrong-dual-boot-systems-warn-after-microsoft-update?utm_source=atom1.0mainlinkanon&utm_medium=feed

Ars Technica's Dan Goodwin writes: Last Tuesday, loads of Linux users -- many running packages released as early as this year -- started reporting their devices were failing to boot. Instead, they received a cryptic error message that included the phrase: "Something has gone seriously wrong." The cause: an update Microsoft issued as part of its monthly patch release. It was intended to close a 2-year-old vulnerability in GRUB, an open source boot loader used to start up many Linux devices. The vulnerability, with a severity rating of 8.6 out of 10, made it possible for hackers to bypass secure boot, the industry standard for ensuring that devices running Windows or other operating systems don't load malicious firmware or software during the bootup process. CVE-2022-2601 was discovered in 2022, but for unclear reasons, Microsoft patched it only last Tuesday. [...] With Microsoft maintaining radio silence, those affected by the glitch have been forced to find their own remedies. One option is to access their EFI panel and turn off secure boot. Depending on the security needs of the user, that option may not be acceptable. A better short-term option is to delete the SBAT Microsoft pushed out last Tuesday. This means users will still receive some of the benefits of Secure Boot even if they remain vulnerable to attacks that exploit CVE-2022-2601. The steps for this remedy are outlined here (thanks to manutheeng for the reference).

Read more of this story at Slashdot.

How to use the kill command in Linux (Linux Crash Course Series)

Posted: 2024-08-20 21:56:29
Source: https://www.youtube.com/watch?v=5ER65GtElmo

Navigating Visualization Trends with Plotly and Ubuntu

Posted: 2024-08-20 16:00:00
Source: https://www.linuxjournal.com/content/navigating-visualization-trends-plotly-and-ubuntu

Navigating Visualization Trends with Plotly and Ubuntu

Introduction

In the ever-evolving world of data science, data visualization has emerged as a crucial tool for transforming raw data into actionable insights. As we navigate through 2024, the landscape of data visualization continues to shift, driven by advancements in technology and changes in user expectations. Among the tools leading this transformation are Plotly and Ubuntu, both of which are redefining how we interact with and analyze data. This article delves into the trends in data visualization, explores the capabilities of Plotly, and demonstrates how to leverage Ubuntu as a powerful platform for creating sophisticated visualizations.

Understanding Data Visualization Trends

Data visualization has come a long way from static charts and graphs. Today, the field is characterized by several key trends:

  1. Interactive Visualizations: Modern data visualization emphasizes interactivity, allowing users to engage with data dynamically. Interactive dashboards and plots enable users to drill down into data, explore different views, and uncover insights that static charts might obscure.

  2. Real-Time Data Visualization: With the rise of IoT and streaming data, real-time visualization has become increasingly important. Businesses and organizations need to monitor and respond to live data, making real-time dashboards and alerts essential tools for decision-making.

  3. AI and Machine Learning Integration: AI and machine learning are transforming data visualization by automating insights and enhancing predictive analytics. Advanced algorithms can identify patterns and trends that would be difficult to discern manually, providing deeper and more accurate insights.

  4. Customization and Personalization: Users expect data visualizations to be tailored to their specific needs and preferences. Customizable charts and personalized dashboards allow users to view data in the most relevant way, improving the overall user experience.

Introduction to Plotly

Plotly is a robust and versatile data visualization library that has gained popularity for its ability to create interactive and visually appealing charts.

  1. What is Plotly?

next-20240820: linux-next

Posted: 2024-08-20 03:54:05
Source: https://www.kernel.org/

Version:next-20240820 (linux-next)
Released:2024-08-20

CachyOS Adds Support for System76's COSMIC Desktop

Posted: 2024-08-19 18:44:12
Source: http://www.linux-magazine.com/Online/News/CachyOS-Adds-Support-for-System76-s-COSMIC-Desktop

The August 2024 release of CachyOS includes support for the COSMIC desktop as well as some important bits for video.

How to install GhostBSD 24.04.2

Posted: 2024-08-19 16:13:36
Source: https://www.youtube.com/watch?v=zeZ0JqKB7uE

next-20240819: linux-next

Posted: 2024-08-19 05:09:28
Source: https://www.kernel.org/

Version:next-20240819 (linux-next)
Released:2024-08-19

6.10.6: stable

Posted: 2024-08-19 04:06:03
Source: https://www.kernel.org/

Version:6.10.6 (stable)
Released:2024-08-19
Source:linux-6.10.6.tar.xz
PGP Signature:linux-6.10.6.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-6.10.6

6.6.47: longterm

Posted: 2024-08-19 04:04:39
Source: https://www.kernel.org/

Version:6.6.47 (longterm)
Released:2024-08-19
Source:linux-6.6.47.tar.xz
PGP Signature:linux-6.6.47.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-6.6.47

6.1.106: longterm

Posted: 2024-08-19 04:00:15
Source: https://www.kernel.org/

Version:6.1.106 (longterm)
Released:2024-08-19
Source:linux-6.1.106.tar.xz
PGP Signature:linux-6.1.106.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-6.1.106

5.15.165: longterm

Posted: 2024-08-19 03:58:28
Source: https://www.kernel.org/

Version:5.15.165 (longterm)
Released:2024-08-19
Source:linux-5.15.165.tar.xz
PGP Signature:linux-5.15.165.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.15.165

5.10.224: longterm

Posted: 2024-08-19 03:43:42
Source: https://www.kernel.org/

Version:5.10.224 (longterm)
Released:2024-08-19
Source:linux-5.10.224.tar.xz
PGP Signature:linux-5.10.224.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.10.224

5.4.282: longterm

Posted: 2024-08-19 03:39:39
Source: https://www.kernel.org/

Version:5.4.282 (longterm)
Released:2024-08-19
Source:linux-5.4.282.tar.xz
PGP Signature:linux-5.4.282.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.4.282

4.19.320: longterm

Posted: 2024-08-19 03:32:31
Source: https://www.kernel.org/

Version:4.19.320 (longterm)
Released:2024-08-19
Source:linux-4.19.320.tar.xz
PGP Signature:linux-4.19.320.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.19.320

DistroWatch Weekly, Issue 1084

Posted: 2024-08-19 00:03:40
Source: https://distrowatch.com/12218

The DistroWatch news feed is brought to you by TUXEDO COMPUTERS. This week in DistroWatch Weekly:
Review: Liya 2.0
News: Haiku introduces performance improvements, Redcore merges major upgrade, Gentoo dropping IA-64 support
Questions and answers: Dual boot with encryption
Released last week: Tails 6.6, RebeccaBlackOS 2024-08-12, deepin 23
Torrent corner: deepin, Endless OS, SparkyLinux, Tails
Upcoming releases: FreeBSD 13.4-RC1
Opinion poll: Do you encrypt your....

6.11-rc4: mainline

Posted: 2024-08-18 20:17:27
Source: https://www.kernel.org/

Version:6.11-rc4 (mainline)
Released:2024-08-18
Source:linux-6.11-rc4.tar.gz
Patch:full (incremental)

Distribution Release: ExTiX 24.8

Posted: 2024-08-16 21:21:57
Source: https://distrowatch.com/12217

The DistroWatch news feed is brought to you by TUXEDO COMPUTERS. ExTiX is a distribution in the Debian family which offers alterative desktop environments. The project's latest release, ExTiX 24.8, is based on deepin 23. "New functions etc. in ExTiX 24.8 'Deepin': 1. VirtualBox Guest Additions are not pre-installed. No real need for them since you can run ExTiX....

GhostBSD 24.04.2 overview | A simple, elegant desktop BSD Operating System

Posted: 2024-08-16 16:12:01
Source: https://www.youtube.com/watch?v=y64zAdk7vXw

next-20240816: linux-next

Posted: 2024-08-16 03:46:32
Source: https://www.kernel.org/

Version:next-20240816 (linux-next)
Released:2024-08-16

Fortifying Web Applications on Debian Servers

Posted: 2024-08-15 16:00:00
Source: https://www.linuxjournal.com/content/fortifying-web-applications-debian-servers

Fortifying Web Applications on Debian Servers

In the rapidly evolving digital age, web application security has become a cornerstone of IT strategies across industries. As cyber threats grow more sophisticated, the necessity of robust security measures has intensified, particularly for web applications running on Linux-based servers like Debian. This guide aims to explore the depths of web application security, focusing particularly on how to fortify applications hosted on Debian servers.

Understanding the Risks

Web applications are frequently targeted by cybercriminals due to their accessibility and the valuable data they often process. Recognizing common vulnerabilities is the first step in defense:

Common Web Application Vulnerabilities
  1. SQL Injection: Malicious SQL statements are inserted into an entry field, allowing attackers to manipulate databases.
  2. Cross-site Scripting (XSS): Malicious scripts are injected into websites viewed by other users, hijacking user sessions or defacing websites.
  3. Cross-site Request Forgery (CSRF): Users are tricked into performing actions they did not intend, typically in web applications where they are authenticated.
  4. Security Misconfiguration: Poorly configured permissions, outdated software, and default settings can leave applications vulnerable.
  5. Sensitive Data Exposure: Inadequate protection of sensitive data like passwords, credit card numbers, and personal information can lead to breaches.
Specific Challenges on Debian Servers

Debian's popularity and extensive use in server environments make it a prime target for attacks. Specific challenges include managing the complex dependencies of package management and maintaining security with frequent updates.

Debian Server Configuration for Security

Securing a Debian server involves multiple layers of defense, from initial setup to ongoing management.

1 ... 30 31 32 33 ... 41 Older News