Home Blog Page 2

Looking for an open-source VPN? We’ve got the answer

After undergoing a successful independent security audit earlier this year, IVPN has announced that it will open source all of its VPN clients. The VPN provider’s Android, macOS, iOS and Windows apps are now open source under the GPLv3 license.

However, this is just the first step in IVPN’s multi-year plan to open source many other parts of its service. The company’s next step is to release key parts of its infrastructure to the public with end goal of enabling anyone to set up and verify its VPN server configuration.

[Source: Techradar]

How security keeps up when developers drive open source

Technological transformation is increasingly becoming a competitive differentiator, with businesses across all sectors investing heavily in new platforms, tools and frameworks. In response, open source has emerged as the most viable, cost-effective and leading-edge solution in enabling organisations to gain the edge in innovation.

No longer do individual businesses need to purchase or build all the software they need in-house. Instead, developers can now benefit from and build on the work of entire development communities, harnessing their collective power instead of starting from scratch. This is enabling countless new strands of innovation and increasing the speed to market for new products. According to research, 69 per cent of IT leaders deem open source as very important to an organisation’s overall enterprise infrastructure software plans. But software development wasn’t always done this way.

[Source: ITProPortal]

How to clone a drive from the Linux command line

Cloning a drive in Linux actually isn’t too terribly difficult–especially if you’re comfortable with the Linux command line interface. But how do you do it? First you’ll need a bootable ISO image, of just about any Linux distribution, on a flash drive. You’ll also need a new drive to clone to. That target drive must be as big or bjgger than the drive you’re cloning. I prefer to go with bigger, just to be safe.

Once you have all of that ready, boot the machine with the source drive, using the bootable Linux distribution. Once you’ve logged in, make sure to attach the target drive to the system and find out where the target drive is located with the command:
cat /proc/partitions

You should see a listing of all available drives, but they shouldn’t be mounted. You’ll need the name of the source and target drives.

[Source: TechRepublic]

Meet The Linux OS AMD Recommends For Superior Ryzen Threadripper 3990X Performance

AMD and Intel may be fierce competitors in the CPU space, but the two companies aren’t always trying to cut each other down. In fact, during the press briefing for AMD’s 64-core Ryzen Threadripper 3990X, it actually recommended using Intel’s in-house Linux distribution for best performance.

That revelation comes from Michael Larabel, otherwise known as the benchmarking guru behind the cross-platform Phoronix Test Suite. Larabel has pages and pages of statistical proof that Intel’s Clear Linux is the idea Linux distribution to run on Intel CPUs when taking pure performance into account.

[Source: Forbes]

Firefox 73 + Firefox 74 Beta Benchmarks On Ubuntu Linux

Given this week’s release of Firefox 73 stable that also puts Firefox 74 into beta state, here are fresh Firefox browser benchmarks of Firefox 72/73/74 on Ubuntu Linux with and without WebRender as well as how it compares to the current state of Google Chrome. These benchmarks today are looking at the performance of Firefox 73 and looking ahead at how the performance is shaping up for Firefox 74 with the initial beta release. Secondary runs were also performed when force-enabling WebRender.

[Source: Phoronix]

7 Open Source Projects We Love

This Valentine’s Day, we are sharing a different kind of love, one only developers can truly appreciate: love of open source projects. If you’re a developer, open source probably plays a major role in your work. Perhaps you love it just as much as we do, and for that reason, we’ve created this post to share the seven open source projects we admire the most.

1. Apache Cassandra

Apache Cassandra is a distributed and decentralized database designed to manage massive amounts of structured and unstructured data across the world. It was developed at Facebook for inbox search and open sourced in July 2008. One of Cassandra’s most essential features is its elastic and linear scalability, which enables a consistently fast response time. Data is automatically replicated to multiple nodes for fault tolerance and easy distribution.

[Source: Security Boulevard]

OpenShot Video Editor Gets a Major Update With Version 2.5 Release

OpenShot is one of the best open-source video editors out there. With all the features that it offered – it was already a good video editor on Linux. Now, with a major update to it (v.2.5.0), OpenShot has added a lot of new improvements and features. And, trust me, it’s not just any regular release – it is a huge release packed with features that you probably wanted for a very long time.

The hardware acceleration support is still an experimental addition – however, it is a useful feature to have. Instead of relying on your CPU to do all the hard work, you can utilize your GPU to encode/decode video data when working with MP4/H.264 video files.

[Source: It’s FOSS]

What to know about open source security

Like any area of tech, open source needs its own security measures to thrive without a hitch. A major benefit that organisations gain from using open source tech is that it’s freely available and not distributed from a particular proprietor.

The ‘open source’ aspect refers to the code, and can be found within databases, applications and operating systems, among other software. This code can be changed to suit the needs of the business. However, being available from the public domain, this realm will have its own potential vulnerabilities that hackers could exploit.

Open source applications, for all their arrays of use cases, can be compromised if those responsible for their security aren’t on top of any possible vulnerabilities.

[Source: Information Age]

Linux Kernel Continues Prepping For RISC-V’s Updated Supervisor Binary Interface

RISC-V’s Supervisor Binary Interface “SBI” is the interface between the platform-specific firmware and the running operating system or hypervisor for interacting with the supervisor execution environment in the higher privileged mode. The Linux kernel has been working to support a newer version of the SBI that is more extensible moving forward.

The RISC-V Supervisor Binary Interface v0.2 now has extendability in mind with the ability to add extensions in the future while maintaining backwards compatibility. Linux kernel patches continue to be worked on in supporting this updated SBI interface for the Linux kernel.

[Source: Phoronix]

Kubernetes administration policy made easy with brewOPA

Cloud-native computing — with such technologies as Kubernetes, service-mesh, and continuous integration and continuous delivery (CI/CD) — is revolutionizing IT. But managing can still be a major pain in the server. That’s where Open Policy Agent (OPA), an open-source Cloud Native Computing Foundation (CNCF) project, comes in. But it has its own steep learning curve. Cyral with brewOPA wants to ease their climb and make managing policies across cloud-native platforms much easier.

OPA’s very popular because it allows policy evaluation to be decoupled from an application’s core business logic. This means your policy engine internals are abstracted out, so you can easily reuse them across multiple components.

[Source: ZDNet]