Posted: 2024-02-11 20:18:13 Source: http://www.kernel.org/
Version: | 6.8-rc4 (mainline) |
---|---|
Released: | 2024-02-11 |
Source: | linux-6.8-rc4.tar.gz |
Patch: | full (incremental) |
Posted: 2024-02-11 13:15:00 Source: https://www.youtube.com/watch?v=2tUck3Y9BEM
Posted: 2024-02-10 13:15:00 Source: https://www.youtube.com/watch?v=NGU9jEreoAo
Posted: 2024-02-09 15:28:43 Source: https://www.youtube.com/watch?v=YvpOTcqq-nQ
Posted: 2024-02-09 05:08:05 Source: http://www.kernel.org/
Version: | next-20240209 (linux-next) |
---|---|
Released: | 2024-02-09 |
Posted: 2024-02-08 17:00:00 Source: https://www.linuxjournal.com/content/achieving-high-availability-and-efficient-load-balancing-haproxy-ubuntu-server
In the dynamic landscape of digital services, ensuring continuous availability and optimal performance of web applications is paramount. Ubuntu Server, known for its robustness and flexibility, serves as a solid foundation for deploying web services that demand high reliability. This article delves into the intricacies of configuring Ubuntu Server with HAProxy—a renowned open-source solution—to achieve high availability and efficient load balancing, ensuring your services remain uninterrupted and responsive under varying loads.
High Availability (HA) refers to the design and implementation of systems that are operational and accessible without significant downtime. HA systems are engineered to overcome failures automatically, minimizing the impact on services. The essence of HA lies in redundancy and failover strategies, ensuring that if one component fails, another can take over seamlessly.
Load Balancing plays a critical role in HA by distributing incoming network traffic across multiple servers. This not only maximizes throughput and reduces response times but also ensures no single server bears too much load, which could potentially lead to failure. Load balancers can employ various algorithms to distribute traffic, including Round Robin, Least Connections, and Source IP hash, each with its own set of advantages for different scenarios.
HAProxy stands out as a powerful tool for enabling HA and load balancing. It can process millions of requests per second, providing users with the speed and reliability needed for their applications.
Before diving into the installation process, it's crucial to outline the hardware and software prerequisites and understand the network architecture. An optimal setup includes at least two Ubuntu Servers to act as the backend servers and one Ubuntu Server to host HAProxy for load balancing. Ensure all servers are updated and secured.
To install HAProxy:
sudo apt update && sudo apt upgrade -y
sudo apt install haproxy -y
sudo systemctl enable haproxy
Posted: 2024-02-08 06:38:51 Source: https://www.youtube.com/watch?v=jNo4GnM84Xc
Posted: 2024-02-08 05:00:23 Source: https://www.youtube.com/watch?v=lkPz4Rq5BTM
Posted: 2024-02-08 03:54:50 Source: http://www.kernel.org/
Version: | next-20240208 (linux-next) |
---|---|
Released: | 2024-02-08 |
Posted: 2024-02-08 02:02:00 Source: https://linux.slashdot.org/story/24/02/07/2326214/linux-foundation-forms-post-quantum-cryptography-alliance?utm_source=atom1.0mainlinkanon&utm_medium=feed
Jakub Lewkowicz reports via SD Times: The Linux Foundation has recently launched the Post-Quantum Cryptography Alliance (PQCA), a collaborative effort aimed at advancing and facilitating the adoption of post-quantum cryptography in response to the emerging threats of quantum computing. This alliance assembles diverse stakeholders, including industry leaders, researchers, and developers, focusing on creating high-assurance software implementations of standardized algorithms. The initiative is also dedicated to supporting the development and standardization of new post-quantum cryptographic methods, aligning with U.S. National Security Agency's guidelines to ensure cryptographic security against quantum computing threats. The PQCA endeavors to serve as a pivotal resource for organizations and open-source projects in search of production-ready libraries and packages, fostering cryptographic agility in anticipation of future quantum computing capabilities. Founding members include AWS, Cisco, Google, IBM, IntellectEU, Keyfactor, Kudelski IoT, NVIDIA, QuSecure, SandboxAQ, and the University of Waterloo. [...] [T]he PQCA plans to launch the PQ Code Package Project aimed at creating high-assurance, production-ready software implementations of upcoming post-quantum cryptography standards, beginning with the ML-KEM algorithm. By inviting organizations and individuals to participate, the PQCA is poised to play a critical role in the transition to and standardization of post-quantum cryptography, ensuring enhanced security measures in the face of advancing quantum computing technology. You can learn more about the PQCA on its website or GitHub.
Read more of this story at Slashdot.
Posted: 2024-02-07 19:43:40 Source: http://www.linux-magazine.com/Online/News/Microsoft-Says-VS-Code-Will-Work-with-Ubuntu-18.04
If you're a user of Microsoft's VS Code and you're still using Ubuntu 18.04, you can breathe a sigh of release that the IDE will continue working… for a while.
Posted: 2024-02-07 19:21:00 Source: https://linux.slashdot.org/story/24/02/07/1749248/critical-vulnerability-affecting-most-linux-distros-allows-for-bootkits?utm_source=atom1.0mainlinkanon&utm_medium=feed
Linux developers are in the process of patching a high-severity vulnerability that, in certain cases, allows the installation of malware that runs at the firmware level, giving infections access to the deepest parts of a device where they're hard to detect or remove. ArsTechnica: The vulnerability resides in shim, which in the context of Linux is a small component that runs in the firmware early in the boot process before the operating system has started. More specifically, the shim accompanying virtually all Linux distributions plays a crucial role in secure boot, a protection built into most modern computing devices to ensure every link in the boot process comes from a verified, trusted supplier. Successful exploitation of the vulnerability allows attackers to neutralize this mechanism by executing malicious firmware at the earliest stages of the boot process before the Unified Extensible Firmware Interface firmware has loaded and handed off control to the operating system. The vulnerability, tracked as CVE-2023-40547, is what's known as a buffer overflow, a coding bug that allows attackers to execute code of their choice. It resides in a part of the shim that processes booting up from a central server on a network using the same HTTP that the the web is based on. Attackers can exploit the code-execution vulnerability in various scenarios, virtually all following some form of successful compromise of either the targeted device or the server or network the device boots from. "An attacker would need to be able to coerce a system into booting from HTTP if it's not already doing so, and either be in a position to run the HTTP server in question or MITM traffic to it," Matthew Garrett, a security developer and one of the original shim authors, wrote in an online interview. "An attacker (physically present or who has already compromised root on the system) could use this to subvert secure boot (add a new boot entry to a server they control, compromise shim, execute arbitrary code)."
Read more of this story at Slashdot.
Posted: 2024-02-07 18:00:20 Source: https://www.youtube.com/watch?v=fplSkkzS_9U
Posted: 2024-02-07 06:39:19 Source: http://www.kernel.org/
Version: | next-20240207 (linux-next) |
---|---|
Released: | 2024-02-07 |
Posted: 2024-02-07 01:26:48 Source: https://linuxhint.com/map-keys-vim/
To map keys in the Vim editor, the :map command is used followed by a set of keys and commands. However, :unmap command is used to remove the mapping.
Posted: 2024-02-06 17:30:07 Source: https://www.youtube.com/watch?v=l9s6_19PJs8
Posted: 2024-02-06 17:16:24 Source: https://linuxhint.com/install-debian-bookworm-raspberry-pi/
You can install Debian 12 on Raspberry Pi by downloading the image file and loading the image onto the Raspberry Pi’s SD Card through BalenaEtcher.
Posted: 2024-02-06 17:00:00 Source: https://www.linuxjournal.com/content/essential-keyboard-shortcuts-and-time-saving-tips-linux-productivity
Linux stands as a beacon of efficiency and flexibility in the world of operating systems, especially favored by developers, system administrators, and power users for its robustness and open-source nature. One of the keys to unlocking the full potential of Linux lies in mastering its keyboard shortcuts and employing time-saving tips that significantly enhance productivity. This guide will navigate through the essential shortcuts and tips across various Linux desktop environments (DEs), delve into the command line's power, and share advanced techniques for power users.
Linux offers a variety of desktop environments (DEs), each with its unique design, functionality, and set of keyboard shortcuts. Popular DEs include GNOME, KDE Plasma, and XFCE, among others. These environments allow users to interact with the system and applications more efficiently. However, the diversity in DEs means that shortcuts may vary, emphasizing the importance of customizability and adaptation to one's workflow.
Switching between virtual desktops: Most DEs support multiple workspaces, enabling users to organize their applications and windows. Switching between these can usually be done with shortcuts like Ctrl + Alt + Arrow keys
or Ctrl + Alt + [Number]
, offering a swift navigation method.
Opening a terminal: The terminal is the gateway to Linux's power. Quickly opening a terminal can be achieved with Ctrl + Alt + T
in many DEs, providing instant access to the command line.
System search: Initiating a system-wide search for files, applications, and settings is often possible with Super (Windows key) + S
or Super + Space
, enabling users to quickly locate and launch what they need.
Posted: 2024-02-06 12:19:38 Source: https://distrowatch.com/12056
The DistroWatch news feed is brought to you by TUXEDO COMPUTERS. Grml is a bootable CD (live CD) based on Debian GNU/Linux. It includes a collection of GNU/Linux software especially for users of text tools and system administrators. The project has published a release candidate which introduces a number of improvements and is based on Debian's Testing "Trixie" branch.....
Posted: 2024-02-06 07:39:52 Source: https://linuxhint.com/error-undefined-reference-to-pow-cpp/
Guide on the “undefined reference to pow” error in C++ programming when we don’t add the header file in our C++ code or we may not compile the code correctly.