Pat Riehecky has announced the release of Scientific Linux 6.7, the latest update of the distribution’s legacy branch, built from source package for the recently-released Red Hat Enterprise Linux (RHEL) 6.7: “Scientific Linux 6.7 i386/x86_64. Existing 6x systems should run ‘yum clean expire-cache’. Major differences from Scientific Linux…
All Aboard Van Beethoven, Where Oculus Rift Meets The 19th Century
The LA Phil will soon take Beethoven to the streets, in a truck fitted with a virtual-reality headset that immerses listeners in 360-degree, 3D Beethoven. The Oculus Rift, a VR headset generally associated with action-filled video games and fantastical computerized worlds, will soon bring symphonic strains to the streets of Los Angeles. The LA Phil will employ the Oculus Rift as part of Van Beethoven, a mobile virtual-reality experience…
Read more at CNET News
Intel Invests in BlueData for Spinning Up Spark Clusters on the Fly

Today Intel Corporation and BlueData announced a broad strategic technology and business collaboration, as well as an additional equity investment in BlueData from Intel Capital. BlueData is a Silicon Valley startup that makes it easier for companies to install Big Data infrastructure, such as Apache Hadoop and Spark, in their own data centers or in the cloud.
Linux Foundation Certification Anniversary Sale – Get Trained And Certified for $149
A year ago this week, we launched our Linux Foundation Certification Program. Since then, we’ve had thousands of people sign up to take these performance-based exams, and more and more employers are asking for these distribution-neutral performance-based certifications.
To celebrate this milestone, we’re selling our Linux Foundation Certified System Administrator exam and English version of LFS201 Essentials of System Administration bundle for an unprecedented $149…
Why Many Companies Aren’t Securing OS Permissions Adequately
When it comes to ensuring that the operating systems in your IT infrastructure are adequately secured, access-permission-wise, some companies and organizations are more up to date — secure, and compliant — than others, according to David Dingwall, architect, and business development manager, Fox Technologies (which has recently conducted an in-depth survey of over 500 IT security professionals concerning their server environment security practices).
More on Security
from Fox Technologies
Based on his nearly three decades of experience at Fox Technologies, Dingwall sees several main reasons that companies revisit — and update/upgrade — these aspects of their IT security solutions.
The Auditor Cometh
“A lot of our sales are the result of auditors identifying compliance failures that must be addressed — and telling the organization they need to solve the problem, select a vendor, and show a visible project plan complete with schedule,” says Dingwall. “This is probably also how our direct competitors similarly get many sales.”
Aging Infrastructures in Need of a Security Refresh
Another category, according to consists of companies with very mature Unix/Linux infrastructures, whose architectural decisions were made years, even decades ago.
“Now they are depending on infrastructures behind their DMZ that are not secure,” says Dingwall. “A common reason we see is that they are using very old directory services, and hasn’t been an IT priority to upgrade them… but some directory services have been end-of-life’d. These are organizations that are successful, and have large infrastructures, but whose IT departments haven’t been given the time and resources to address this. For example, in the survey we had done recently, about 10% of the responding organizations are still using NIS or NIS+… which have been EOL’d a few years ago.”
(This particular issue isn’t recent, either — here’s an Oracle blog post from 2005 about migrating from NIS/NIS+ to LDAP.)
And when auditors come in with a checklist including a box for ‘do you depend on any software that’s been End-of-Life’d,’ that box gets checked. “So now these organizations now have to have a replacement program and hopefully IT now has the clout to get the resources to make this happen,” says Dingwall.
That 10% outstanding NIS dependent figure came as a surprise, says Dingwall. “We didn’t expect that many, because we hadn’t had the data. It’s a huge market opportunity for all of us who are in this sector.”
In looking for a new access privilege management tool, “Make sure the product and its vendor can integrate and replace in a straightforward way,” cautions Dingwall. “Newer vendors may not know what NIS migration looks like, or integrating it may not be in their core competencies.”
New, Growing Infrastructures, IPOs, and Acquisitions
Another category of companies needing better OS security tools, according to Dingwall, is “the companies building brand-new infrastructures — particularly startups.”
“Startups can easily go from ten to a hundred servers in their first year, and have 10,000 — probably as cloud instances — by year 3,” says Dingwall. And, he adds, “People building new IT infrastructures understand databases, fulfillment, and other interfacing and API issues– but they may not understand system security well.”
And even if IT isn’t breached, “When they are looking at an IPO, or being acquired, in come the acquisition team,” says Dingwall. “In the process of full disclosure, security holes may come up, because managing those concerns wasn’t part of the original system design.”
Branch and Remote Offices Need Security, Too
Companies’ branch and remote offices have growing security concerns, says Dingwall. “For example, small retail branches, gas stations, retail banking, and surprisingly, mining, and distributed oil and gas operations, where each or location has one or two servers — that have to be on premises in order for operations to work — for each Point-of-Sale device and other gear to talk to. And you can guarantee somebody in the branch or local site will have to do local administration — make sure local backups happen, and make sure the link to the central site is up.”
Typically, says Dingwall, “Those organizations have spent time working on the central infrastructure, but the branches have been left unchanged for the past 25-30 years. They may have changed platforms [[in the branches[[ a few times over the decades, from UNIX to Windows Server to Linux. But they are still discrete machines that need their access security updated.”
Perimeter-Only Defense Isn’t Sufficient Anymore
“If you are only defending your IT perimeter, once an intruder penetrates inside, nothing prevents them from ‘walking around inside’ — gaining access to a root account, or to a sysadmin account that has approval to get to root,” says Dingwall. “And many breaches aren’t detected for a month or more. That’s more than enough time for an intruder to download and crack entries in an encrypted password file, steal data, and more.”
So, stresses Dingwall, “You need internal security as well — and to move through the network or elevate privilege on a server has to require than just a password. Ideally, use something like two-factor identification, some form of real-time identity authentication, and use least-privilege access models.”
Getting from “Uh-Oh” to Ok
The challenge, says Dingwall, is “helping the company understand the nature of the security issues in terms of privilege management, identifying what their current IT environment does and doesn’t do, what today’s requirements are… and that they need a plan, budget and schedule to meet today’s requirements.”
Fox Technologies, Inc. helps companies protect corporate information assets with network security and access management software as well as striving to simplify compliance and streamline administration with an access management and privileged account control solution. Fox Technologies’ access management software centrally enforces granular access entitlements in real time across diverse server environments. To learn more about BoKS ServerControl visit: www.foxt.com/boks.
Experimental Unity Editor Now Available For Linux
Following last month’s state of Unity on Linux, an experimental build of the Unity Editor is now available. This experimental Unity Editor build for Linux is based off Unity 5.1.0f3 and is able to export from Linux to Linux/OSX/Windows binaries, WebGL, WebPlayer, Android, Tizen, and Samsung TV.
GitHub Combats DDoS Cyberattack
The code repository has mitigated a new DDoS attack following a crippling salvo experienced in March.
The code repository, used to host code ranging from security systems to application frameworks as well as data dumps, was made aware of connectivity problems on Tuesday at approximately 10.40 BST. Following an investigation into the issue, the website’s team realized they were under a distributed denial-of-service (DDoS) attack, yet again.
Read more at ZDNet News
Intel’s 5×5 Mini-Motherboard Includes Socket to Allow CPU Upgrades
Unlike its tiny Next Unit of Computing form factor, the company’s slightly bigger new board gives you the ability to swap processors, though you’re still limited to integrated graphics.
While Intel was busy showing off robots and doubling down on the Internet of Things at last week’s Intel Developer Forum (IDF) last week, it was also displaying work on some of its bread-and-butter businesses. In addition to pushing a new method for manufacturing SSDs, the company unveiled a new motherboard form factor…
Read more at ZDNet News
Fedora 23 Alpha Server Released for ARM 64-bit and POWER Hardware Architectures
The Fedora Project, through Peter Robinson, announced the release of the Server edition of the Fedora 23 Alpha operating system for ARM 64-bit (AArch64) and POWER (PPC64 and PPC64le) hardware architectures.
The announcement comes two weeks after the release of the Alpha version of the upcoming Fedora 23 Linux distribution, which was made available for download for the 64-bit (x86_64) and 32-bit (x86) instruction set architectures. Therefore, you will now be able to run Fedora 23 Alpha on devices powered by ARM 64-bit, PPC64, or PPC64 Little Endian processors.
ownCloud Desktop Client 2.0 Arrives with Support for Multiple Accounts, More
ownCloud, a software company known for developing and deploying a the most popular self-hosting cloud server solution on the market, announced today, August 25, the immediate availability for download of ownCloud Desktop Client 2.0.
According to the announcement, ownCloud Desktop Client 2.0 is a major release that brings awesome new features, such as a revamped GUI (Graphical User Interface) that offers support for multiple accounts, and the ability to set a threshold size, which results in a confirmation before syncing a large amount of files.