Home Blog Page 368

People Are Freaking Out That PGP Is ‘Broken’—But You Shouldn’t Be Using It Anyway

Hackers that can intercept your encrypted emails, or steal your emails from your computer or a server, may be able to decrypt them taking advantage of new vulnerabilities found in the way some email clients treat HTML.

On Monday, the world was reminded once again that the almost 30-year-old encryption protocol PGP does still exist, and, yes, it still kinda sucks.

Mind you, the protocol itself is not really the problem. The crypto is solid. The problem is the way it’s implemented, and the ecosystem around it. What’s new is that a group of researchers has found a clever way for hackers to decrypt some PGP-encrypted emails….

Read more at Motherboard

Using the Command Line to Decrypt a Message on Linux

If you have disabled the PGP plugin from your mail client and saved a copy of an encrypted email to your desktop, this guide will help you read that message in as safe a way as possible given what we know about the vulnerability described by EFAIL.

Note that the first three steps (opening the terminal) will vary between desktop environments.

  1. Open the Activities view by clicking all the way in the top left corner of your screen.

2. Type “terminal” into the search bar, and press Enter. This will open the command prompt.

Read more at EFF

The First 10 Years of Software Defined Networking

In 2008, if you wanted to build a network, you had to build it from the same switch and router equipment that everyone else had, according to Nick McKeown, co-founder of Barefoot Networks, speaking as part of a panel of networking experts at Open Networking Summit North America

Equipment was closed, proprietary, and vertically integrated with features already baked in, McKeown noted. And, “network management was a dirty word. If you wanted to manage a network of switches, you had to write your own scripts over a lousy, cruddy CLI, and everybody had their own way of doing it in order to try to make their network different from everybody else’s.”

All this changed when Stanford University Ph.D. student Martin Casado had the bold idea to rebuild the Stanford network out of custom-built switches and access points, he said.

Read more at The Linux Foundation

Batch Editing Files with ed

The other day at work I needed to edit 200 files at once. I wanted to do something pretty simple: basically, I had files that looked like this:

foo:
  - bar
  - baz
  - bananas

and I wanted to insert an extra line after the baz line that said elephant

foo:
  - bar
  - baz
  - elephant
  - bananas

I had one extra weird requirement which was that some of the lines were indented with 2 spaces, and some with 4 spaces. The - elephant line needed to have the same indentation as the previous line.

Read more at Julia Evans

Develop your Linux Apps on This RISC-V Board

The “news” is that Microsemi and SiFive have collaborated on an expansion board that’s based on Microsemi’s RISC-V-based Polarfire FPGAs. The expansion board makes it easier for developers to write Linux-based applications targeting RISC-V using the Mi-V RISC-V ecosystem.

RISC-V is a free and open instruction-set architecture (ISA) that processor vendors are beginning to rally around. For the architecture to really take off, it’s products like these that are required, products that encourage and simply software development.

Read more at Embedded Computing Design.

And, check out more details in Eric Brown’s previous article.

 

3 Useful Things You Can Do with the IP Tool in Linux

It has been more than a decade since the ifconfig command has been deprecated on Linux in favor of the iproute2 project, which contains the magical tool ip. Many online tutorial resources still refer to old command-line tools like ifconfigroute, and netstat. The goal of this tutorial is to share some of the simple networking-related things you can do easily using the ip tool instead.

Find your IP address

[dneary@host]$ ip addr show
[snip]
44: wlp4s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc mq state UP group default qlen 1000
        link/ether 5c:e0:c5:c7:f0:f1 brd ff:ff:ff:ff:ff:ff
        inet 10.16.196.113/23 brd 10.16.197.255 scope global dynamic wlp4s0
        valid_lft 74830sec preferred_lft 74830sec
        inet6 fe80::5ee0:c5ff:fec7:f0f1/64 scope link
        valid_lft forever preferred_lft forever

ip addr show will show you a lot of information about all of your network link devices. In this case, my wireless Ethernet card (wlp4s0) is the IPv4 address (the inet field) 10.16.196.113/23. The /23 means that there are 23 bits of the 32 bits in the IP address, which will be shared by all of the IP addresses in this subnet. IP addresses in the subnet will range from 10.16.196.0 to 10.16.197.254. The broadcast address for the subnet (the brd field after the IP address) 10.16.197.255 is reserved for broadcast traffic to all hosts on the subnet.

Read more at OpenSource.com

Bigger than Linux: The Rise of Cloud Native

A trip to KubeCon + CloudNativeCon reveals a community hard at work building an open, agile and scalable cloud platform to fuel the boom in ubiquitous services….

To understand the importance of Kubernetes we need to return to containers briefly. Containers, by design, use less resources than virtual machines (VMs) as they share an OS and run ‘closer to the metal’. For developers, the technology has enabled them to package, ship and run their applications in isolated containers that run virtually anywhere. When continuous integration/continuous delivery software (e.g. Jenkins) and practices are added into the mix, this enables companies to benefit from nimble and responsive automation and it significantly speeds up development. For example, any changes that developers make to the source code will automatically trigger the creation, testing and deployment of a new container to staging and then into production.

The idea of a container allowing one process only to run inside it has also led on to microservices. This is where applications are broken down into their processes and placed inside a container, which makes a lot of sense in the enterprise world where greater efficiencies are constantly being sought.

However, this explosion of containerised apps has created the need for a way to manage or ‘orchestrate’ thousands of containers. 

Read more at TechRadar

Kubernetes as a Service Built on OpenStack

In this video from the 2018 Swiss HPC Conference, Saverio Proto from SWITCH presents: Kubernetes as a Service Built on OpenStack.

“At SWITCH we are looking to provide a container platform as a Service solution. We are working on Kubernetes leveraging the Openstack cloud provider integration. In this talk we show how to re-use the existing keystone credentials to access the K8s cluster, how to obtain PVCs using the Cinder storage class and many other nice integration details.”

Read more at insideHPC

jm-shell – A Highly Informative and Customized Bash Shell

jm-shell is a free open source, small, highly informative and customized Bash shell, that gives you a great wealth of information about your shell activity as well as certain useful system information such as system load average, battery status of laptops/computers and much more.

Importantly, unlike Bash which only stores unique commands in a history file, for searching previously run commands – jm-shell records each and every shell activity in a log file.

Read AlsoThe Power of Linux “History Command” in Bash Shell

In addition, if your current directory is a code repository for any version control systems such as GitSubversion, or Mercurial, it will provide information about your repositories (such as active branch).

Jm-shell Features

  • Has a status line (divider) to separate commands.
  • Displays the number of items in current directory.
  • Shows current location in the filesystem.
  • It maintains a shell log file – full history of your shell activity.
  • Displays current system load average if higher than, in red if critical (higher than 2).
  • Shows the time last command finished.
  • It prints an error code of last command, if any.
  • Displays total time of last command if higher than 4 seconds.

Read more at Tecmint

This Week in Open Source News: Microsoft Proves Linux Love, KubeCon Shows Impressive Growth & Influence & More

This week in our news roundup, Microsoft demonstrates its “open source love” with a Linux-friendly update to the Windows Notepad feature, KubeCon size tripled this year & attendees learned about the direction of Kubernetes & container orchestration & more! Read on!

1) “Microsoft has updated Notepad to be able to handle end of line characters used in Unix, Linux, and macOS environments.”

Windows Notepad Finally Understands Everyone Else’s End of Line Characters– ZDNet

2) “The KubeCon conference offered a peek at where Kubernetes and container orchestration are headed.”

3 Emerging Kubernetes Trends– The Enterprises Project

3) “A virtual machine will run Linux in a forthcoming beta Chrome OS for Pixelbook users.” 

Linux For Developers is Coming to Chrome OS– InfoWorld

4) “Consider that the attendance at KubeCon in Copenhagen last week numbered 4300 registered participants, triple the attendance in Berlin just last year.” 

Kubernetes Stands at an Important Inflection Point– TechCrunch

5) Red Hat Summit 2018 gathered open source+tech world thought leaders such as Red Hat CEO Jim Whitehurst, JewelBots CTO Sara Chipps, and Jennifer Cloer, Executive Producer of a new episodic documentary about the experiences of women in tech.

Pushing the Boundaries of Open Source at Red Hat Summit 2018– SiliconANGLE