5.12.10: stable

Posted: 2021-06-10 11:41:58
Source: http://www.kernel.org/

Version:5.12.10 (stable)
Released:2021-06-10
Source:linux-5.12.10.tar.xz
PGP Signature:linux-5.12.10.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.12.10

5.10.43: longterm

Posted: 2021-06-10 11:40:21
Source: http://www.kernel.org/

Version:5.10.43 (longterm)
Released:2021-06-10
Source:linux-5.10.43.tar.xz
PGP Signature:linux-5.10.43.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.10.43

5.4.125: longterm

Posted: 2021-06-10 11:38:07
Source: http://www.kernel.org/

Version:5.4.125 (longterm)
Released:2021-06-10
Source:linux-5.4.125.tar.xz
PGP Signature:linux-5.4.125.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-5.4.125

4.19.194: longterm

Posted: 2021-06-10 11:24:31
Source: http://www.kernel.org/

Version:4.19.194 (longterm)
Released:2021-06-10
Source:linux-4.19.194.tar.xz
PGP Signature:linux-4.19.194.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.19.194

4.14.236: longterm

Posted: 2021-06-10 10:44:06
Source: http://www.kernel.org/

Version:4.14.236 (longterm)
Released:2021-06-10
Source:linux-4.14.236.tar.xz
PGP Signature:linux-4.14.236.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.14.236

4.9.272: longterm

Posted: 2021-06-10 10:42:44
Source: http://www.kernel.org/

Version:4.9.272 (longterm)
Released:2021-06-10
Source:linux-4.9.272.tar.xz
PGP Signature:linux-4.9.272.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.9.272

4.4.272: longterm

Posted: 2021-06-10 10:41:46
Source: http://www.kernel.org/

Version:4.4.272 (longterm)
Released:2021-06-10
Source:linux-4.4.272.tar.xz
PGP Signature:linux-4.4.272.tar.sign
Patch:full (incremental)
ChangeLog:ChangeLog-4.4.272

next-20210610: linux-next

Posted: 2021-06-10 09:46:29
Source: http://www.kernel.org/

Version:next-20210610 (linux-next)
Released:2021-06-10

Apt-cache - Search for Software Packages

Posted: 2021-06-10 02:51:45
Source: https://linoxide.com/apt-cache-search-for-software-packages/

Linux X86/x86_64 Will Now Always Reserve the First 1MB of RAM

Posted: 2021-06-09 23:20:00
Source: http://rss.slashdot.org/~r/Slashdot/slashdotLinuxatom/~3/LBbM3sNw5aY/linux-x86x8664-will-now-always-reserve-the-first-1mb-of-ram

AmiMoJo shares a report from Phoronix: The Linux x86/x86_64 kernel code already had logic in place for reserving portions of the first 1MB of RAM to avoid the BIOS or kernel potentially clobbering that space among other reasons while now Linux 5.13 is doing away with that 'wankery' and will just unconditionally always reserve the first 1MB of RAM. The Linux kernel was already catering to Intel Sandy Bridge graphics accessing memory below the 1MB mark, the first 64K of memory are known to be corrupted by some BIOSes, and similar problems coming up in that low area of memory. But rather than dealing with all that logic and other possible niche cases besides the EGA/VGA frame-buffer and BIOS, the kernel is playing it safe and just always reserving the first 1MB of RAM so it will not get clobbered by the kernel.

Read more of this story at Slashdot.

Spear Phishing Explained

Posted: 2021-06-09 17:03:26
Source: https://linuxhint.com/spear-phishing-explained/

Spear Phishing is not our commonly known phishing attack that targets massive random victims. It’s an attack that is targeted at a certain individual. Continue to read this article and learn what are its other characteristics, the damage it can cause, as well as some of the possible preventive measures.

Interview with a Site Reliability Engineer

Posted: 2021-06-09 17:01:17
Source: https://www.youtube.com/watch?v=eMjbp-srV7g

How to Use the Counter Module in Python

Posted: 2021-06-09 16:47:44
Source: https://linuxhint.com/counter-module-python/

Counter module is a built-in within Python and used to count elements in fast and efficient way. The article will guide you on how to properly used the Counter Module in Python.

How do I select my startup disk in VirtualBox?

Posted: 2021-06-09 15:53:55
Source: https://linuxhint.com/select-startup-disk-virtualbox/

A startup disk, also known as a boot disk, is a storage device that contains an operating system; it can be a CD, DVD, USB, or even a hard drive. Startup disks are typically internal hard drives or SSDs of the computer if the operating system is installed on them, and they come into the category of secondary memory. How to select startup disk in VirtualBox is explained in this article.

Development Release: Rocky Linux 8.4 RC1

Posted: 2021-06-09 15:50:15
Source: http://distrowatch.com/11272

Rocky Linux is a community enterprise operating system designed to be 100% compatible with Red Hat Enterprise Linux. The project's latest version is a release candidate for Rocky Linux 8.4. A focus has been placed on kernel improvements, networking, and security. "The Rocky Enterprise Software Foundation (RESF) is....

How to install Kali Linux 2021.2

Posted: 2021-06-09 15:37:52
Source: https://www.youtube.com/watch?v=L1h4RWufp3g

next-20210609: linux-next

Posted: 2021-06-09 12:32:54
Source: http://www.kernel.org/

Version:next-20210609 (linux-next)
Released:2021-06-09

Distribution Release: Redcore Linux 2101

Posted: 2021-06-09 11:56:41
Source: http://distrowatch.com/11271

Ghiunhan Mamut has announced the release of Redcore Linux 2101, the latest stable release of the project's Gentoo-based distribution whose goal is to "bring the power of Gentoo Linux to the masses": "More than a year after our previous stable release, I'm happy to announce that Redcore Linux....

Distribution Release: GeckoLinux 153.210608

Posted: 2021-06-08 23:41:26
Source: http://distrowatch.com/11270

GeckoLinux is a Linux spin based on the openSUSE distribution, with a focus on polish and out-of-the-box usability on the desktop. The project's latest release is based on openSUSE 15.3 which offers binary compatibility with SUSE Linux Enterprise. "GeckoLinux is pleased to announce the 153.210608 update to....

Vulnerability Detection and Patching: A Survey Of The Enterprise Environment

Posted: 2021-06-08 23:00:00
Source: https://www.linuxjournal.com/content/vulnerability-detection-and-patching-survey-enterprise-environment

Vulnerability Detection and Patching Linux

Detecting vulnerabilities and managing the associated patching is challenging even in a small-scale Linux environment. Scale things up and the challenge becomes almost unsurmountable. There are approaches that help, but these approaches are unevenly applied.

In our survey, State of Enterprise Vulnerability Detection and Patch Management, we set out to investigate how large organizations handle the dual, linked security concerns of vulnerability detection and patch management.

The results produced interesting insights into the tools that organizations depend on to effectively deal with vulnerability and patch management at scale, how these tools are used, and which restrictions organizations face in their battle against threat actors. Download the copy of the report here.

Vulnerability management is an enterprise responsibility

Before we dive into the results of our survey, let’s take a quick look at why vulnerability management operations matter so much in large organizations.

Vulnerabilities are widespread and a major cybersecurity headache. In fact, vulnerabilities are such a critical problem that laws and regulations are in place to ensure that covered organizations adequately perform vulnerability management tasks – because the failure to do so can hurt a company’s customers.

Each industry has different rules that apply to it – with organizations that handle personal data such as healthcare records and financial service firms operating under the strictest rules. It has an impact on day-to-day vulnerability management operations – some organizations must act much faster and more thoroughly than others.

This is one of the points we explored in the survey, trying to understand how different industry compliance requirements affect vulnerability operations on the ground.

The survey

Early in 2021, we kicked off a survey with the intention to study three key factors in vulnerability and patch management operations. We examined patch deployment practices, how maintenance windows are handled, and tried to get a view into the overall level of security awareness of the organizations that responded.

The survey was advertised publicly to IT professionals around the world and it continues to run, even though we have published the initial results.

1 ... 672 673 674 675 ... 726