Posted: 2021-06-10 11:41:58 Source: http://www.kernel.org/
Version: | 5.12.10 (stable) |
---|---|
Released: | 2021-06-10 |
Source: | linux-5.12.10.tar.xz |
PGP Signature: | linux-5.12.10.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-5.12.10 |
Posted: 2021-06-10 11:40:21 Source: http://www.kernel.org/
Version: | 5.10.43 (longterm) |
---|---|
Released: | 2021-06-10 |
Source: | linux-5.10.43.tar.xz |
PGP Signature: | linux-5.10.43.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-5.10.43 |
Posted: 2021-06-10 11:38:07 Source: http://www.kernel.org/
Version: | 5.4.125 (longterm) |
---|---|
Released: | 2021-06-10 |
Source: | linux-5.4.125.tar.xz |
PGP Signature: | linux-5.4.125.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-5.4.125 |
Posted: 2021-06-10 11:24:31 Source: http://www.kernel.org/
Version: | 4.19.194 (longterm) |
---|---|
Released: | 2021-06-10 |
Source: | linux-4.19.194.tar.xz |
PGP Signature: | linux-4.19.194.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.19.194 |
Posted: 2021-06-10 10:44:06 Source: http://www.kernel.org/
Version: | 4.14.236 (longterm) |
---|---|
Released: | 2021-06-10 |
Source: | linux-4.14.236.tar.xz |
PGP Signature: | linux-4.14.236.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.14.236 |
Posted: 2021-06-10 10:42:44 Source: http://www.kernel.org/
Version: | 4.9.272 (longterm) |
---|---|
Released: | 2021-06-10 |
Source: | linux-4.9.272.tar.xz |
PGP Signature: | linux-4.9.272.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.9.272 |
Posted: 2021-06-10 10:41:46 Source: http://www.kernel.org/
Version: | 4.4.272 (longterm) |
---|---|
Released: | 2021-06-10 |
Source: | linux-4.4.272.tar.xz |
PGP Signature: | linux-4.4.272.tar.sign |
Patch: | full (incremental) |
ChangeLog: | ChangeLog-4.4.272 |
Posted: 2021-06-10 09:46:29 Source: http://www.kernel.org/
Version: | next-20210610 (linux-next) |
---|---|
Released: | 2021-06-10 |
Posted: 2021-06-10 02:51:45 Source: https://linoxide.com/apt-cache-search-for-software-packages/
Posted: 2021-06-09 23:20:00 Source: http://rss.slashdot.org/~r/Slashdot/slashdotLinuxatom/~3/LBbM3sNw5aY/linux-x86x8664-will-now-always-reserve-the-first-1mb-of-ram
AmiMoJo shares a report from Phoronix: The Linux x86/x86_64 kernel code already had logic in place for reserving portions of the first 1MB of RAM to avoid the BIOS or kernel potentially clobbering that space among other reasons while now Linux 5.13 is doing away with that 'wankery' and will just unconditionally always reserve the first 1MB of RAM. The Linux kernel was already catering to Intel Sandy Bridge graphics accessing memory below the 1MB mark, the first 64K of memory are known to be corrupted by some BIOSes, and similar problems coming up in that low area of memory. But rather than dealing with all that logic and other possible niche cases besides the EGA/VGA frame-buffer and BIOS, the kernel is playing it safe and just always reserving the first 1MB of RAM so it will not get clobbered by the kernel.
Read more of this story at Slashdot.
Posted: 2021-06-09 17:03:26 Source: https://linuxhint.com/spear-phishing-explained/
Spear Phishing is not our commonly known phishing attack that targets massive random victims. It’s an attack that is targeted at a certain individual. Continue to read this article and learn what are its other characteristics, the damage it can cause, as well as some of the possible preventive measures.
Posted: 2021-06-09 17:01:17 Source: https://www.youtube.com/watch?v=eMjbp-srV7g
Posted: 2021-06-09 16:47:44 Source: https://linuxhint.com/counter-module-python/
Counter module is a built-in within Python and used to count elements in fast and efficient way. The article will guide you on how to properly used the Counter Module in Python.
Posted: 2021-06-09 15:53:55 Source: https://linuxhint.com/select-startup-disk-virtualbox/
A startup disk, also known as a boot disk, is a storage device that contains an operating system; it can be a CD, DVD, USB, or even a hard drive. Startup disks are typically internal hard drives or SSDs of the computer if the operating system is installed on them, and they come into the category of secondary memory. How to select startup disk in VirtualBox is explained in this article.
Posted: 2021-06-09 15:50:15 Source: http://distrowatch.com/11272
Rocky Linux is a community enterprise operating system designed to be 100% compatible with Red Hat Enterprise Linux. The project's latest version is a release candidate for Rocky Linux 8.4. A focus has been placed on kernel improvements, networking, and security. "The Rocky Enterprise Software Foundation (RESF) is....
Posted: 2021-06-09 15:37:52 Source: https://www.youtube.com/watch?v=L1h4RWufp3g
Posted: 2021-06-09 12:32:54 Source: http://www.kernel.org/
Version: | next-20210609 (linux-next) |
---|---|
Released: | 2021-06-09 |
Posted: 2021-06-09 11:56:41 Source: http://distrowatch.com/11271
Ghiunhan Mamut has announced the release of Redcore Linux 2101, the latest stable release of the project's Gentoo-based distribution whose goal is to "bring the power of Gentoo Linux to the masses": "More than a year after our previous stable release, I'm happy to announce that Redcore Linux....
Posted: 2021-06-08 23:41:26 Source: http://distrowatch.com/11270
GeckoLinux is a Linux spin based on the openSUSE distribution, with a focus on polish and out-of-the-box usability on the desktop. The project's latest release is based on openSUSE 15.3 which offers binary compatibility with SUSE Linux Enterprise. "GeckoLinux is pleased to announce the 153.210608 update to....
Posted: 2021-06-08 23:00:00 Source: https://www.linuxjournal.com/content/vulnerability-detection-and-patching-survey-enterprise-environment
Detecting vulnerabilities and managing the associated patching is challenging even in a small-scale Linux environment. Scale things up and the challenge becomes almost unsurmountable. There are approaches that help, but these approaches are unevenly applied.
In our survey, State of Enterprise Vulnerability Detection and Patch Management, we set out to investigate how large organizations handle the dual, linked security concerns of vulnerability detection and patch management.
The results produced interesting insights into the tools that organizations depend on to effectively deal with vulnerability and patch management at scale, how these tools are used, and which restrictions organizations face in their battle against threat actors. Download the copy of the report here.
Before we dive into the results of our survey, let’s take a quick look at why vulnerability management operations matter so much in large organizations.
Vulnerabilities are widespread and a major cybersecurity headache. In fact, vulnerabilities are such a critical problem that laws and regulations are in place to ensure that covered organizations adequately perform vulnerability management tasks – because the failure to do so can hurt a company’s customers.
Each industry has different rules that apply to it – with organizations that handle personal data such as healthcare records and financial service firms operating under the strictest rules. It has an impact on day-to-day vulnerability management operations – some organizations must act much faster and more thoroughly than others.
This is one of the points we explored in the survey, trying to understand how different industry compliance requirements affect vulnerability operations on the ground.
Early in 2021, we kicked off a survey with the intention to study three key factors in vulnerability and patch management operations. We examined patch deployment practices, how maintenance windows are handled, and tried to get a view into the overall level of security awareness of the organizations that responded.
The survey was advertised publicly to IT professionals around the world and it continues to run, even though we have published the initial results.