Home Blog Page 979

Google Is Merging Chrome OS and Android

Google’s two operating systems could soon be one. It’s said to be in the process of combining Chrome OS and Android, according to The Wall Street Journal, and the combined OS could be revealed as soon as next year. The Journal reports that Chrome is essentially being folded into Android, because Android has emerged as the dominant operating system by quite a long stretch. Combining the two operating systems means setting up Android to run on laptops and desktop computers, which would require big changes, as well as supporting the Google Play Store. Chromebooks will reportedly receive a new name to reflect the new OS.

The new operating system is expected to be ready sometime in 2017…

Read more at The Verge

Skimming Files Before You Grep Them

Grep is a utility to find string patterns in text files. I cannot show you all the magic that grep can perform. Often the stuff you want to find in a file is buried in a lot of crud you don’t want in the file. Web server files? Yeah. Those. Spreadsheets? Unfortunately, they get large too. Image files? Yes, those too! I’m going to focus on those towards the end. So, let’s review a few tricks…(Read the rest at Freedom Penguin)

Winners Announced! Linux Pros Show Off Knowledge in #WorldWithoutLinux Contest But One Clue Stumps Them All

 

If you’ve ever wondered what a World Without Linux would mean to you, you know it’s a ridiculous notion. That’s what the current World Without Linux video series attempts to illustrate in a fun and entertaining way that also gives gratitude to the thousands of developers and companies that support the operating system.

Included in the series are hidden easter eggs that require some level of Linux expertise to identify; though, if you’re a newbie, the clues and easter eggs are done in such a way that you can also surface the answers, putting you in the spotlight among Linux aficionados. It’s also a chance to win fun prizes – t-shirts, tattoos, pins – but perhaps most importantly, street cred among fellow Linux history buffs.

Please join us in congratulating our first two winners:

Linux Foundation Facebook fan Sławek Ariański found easter egg #1 found at :25 of the video. Sam’s license plate gives a nod to our fellow math lovers with a Pi tribute.

 

PiPlate

Andrew Bowers (@bigbadsubaru) correctly identified easter egg #3 found at :32 of the video, a sneak peek at the autobiography of Linus Torvalds, “Professional Burger Flipper.” This foreshadows a story that will be told throughout the episodes with a pay off in the final episode. 

Freeburger

Easter egg #3, though, seems to have stumped even the most Linux savvy among us. Help us surface the final easter egg from episode one and show the rest of the community what time it is. Tell us in the comments or on Twitter using #WorldWithoutLinux if you think you’ve found it!

The clue:

Tick Tock. It’s getting late in the library as Sam searches for the name of that Michael Jackson song. But how late is it?! And what does that signify?

https://www.youtube.com/watch?v=JzsLkbwi1LA?rel=0″ allowfullscreen=”true” frameborder=”0″ width=”425″ height=”350

Stay tuned for episode #3 where we’ve hidden three more easter eggs, as the tales of the zany world without Linux continue.

Linux Foundation Scholarship Recipient: Kiran Padwal

logo lf newThe Linux Foundation regularly awards scholarships as part of its Linux Training Scholarship Program. In the five years that the Linux Foundation has hosted this program, it has awarded a total of 34 scholarships totalling more than $100,000 in free training to students and professionals who may not otherwise have access to these opportunities.

In conjunction with this scholarship program, we are featuring several recent scholarship recipients in the hope that their stories will inspire others. In this latest installment of the series, we talk with Kiran Padwal (age 27), a recipient in the Kernel Guru category.

Kiran, who lives in India, has submitted basic patches to stabilize the kernel, for example, to correct errors for memory-managed resource APIs. He has also tested patches submitted by the community and was part of the DA9055 codec device driver development. He says that the kernel is still overwhelming for him but that, with the help of training, he hopes to understand the kernel modules more deeply and be more useful in development.

How did you become interested in Linux and open source?

KiranPadwalI did my bachelor’s in Electronics Engineering, and embedded systems interested me a lot. Linux runs on millions of embedded devices and is a huge collaborative project — thanks to Linus Torvalds and the Linux community. I started following Linux in my college days.

When I actually started working on the Linux kernel, I saw some memory leaks in kernel code and observed that every contributor has a voice in the open source community. Therefore, I started sending small patches on LKML. I got great support from maintainers and, because of that, my interest was boosted.

What Linux Foundation course will you take with your scholarship?

I have already taken benefit of this scholarship, and I have done the Developing Linux Device Drivers (LFD331) online course. This course was taught by Jerry Cooperstein, and it was a great learning experience for me. I learned lots of new technical concepts, and it also had many hands-on assignments, which helped me understand things clearly. All of this put together will help me to shape my career.

How do you expect to use the knowledge you gain from the course?

With this knowledge, I will be able to explore more modules of the Linux kernel and continue participating in the LKML, along with kernel development. I will learn by doing more and will expand my kernel knowledge to ultimately give back to the community. I would also like to contribute to make Linux better and to make the world a better and smarter place.

What are your career goals? How do you see a Linux Foundation course helping you achieve those goals?

I aspire to be a maintainer of one of the kernel modules. This course has helped me increase my knowledge base and has also given me deeper insight into kernel programming concepts. This will always be a strong factor for my career advancement.

What other hobbies or projects are you involved in? Do you participate in any other open source projects?

I like to play around with embedded boards. I have experimented with my Raspberry Pi board as well as with Freescale’s i.MX53-based board. I was part of the Linux device driver development for Qualcomm IFC6410 open source board and also the DA9055 audio codec chip. Here is a link to my work. Currently, I am working on driver development for the PM8001 SAS host bus adapter.

Open Source Security Process — Part 1: A Cloud Security Introduction

In part one of this four-part series, Xen Project Advisory Board Chairman Lars Kurth takes a look at the theories behind cloud security and how they relate to The Walking Dead — yes, the TV show. Read on to find out more.

With vulnerabilities like last year’s Heartbleed and more recently VENOM, software that runs the modern Internet and cloud systems has never been more at risk and less secure. Many assume that to keep a system as secure as possible, you must eliminate any entry for an attacker. However, this is simply not the case. The key here is that IT teams really need to determine the probability that an attacker knows of an exploitable vulnerability.

Let’s examine this idea a little more closely through understanding the nature of risk as it relates to virtual and cloud environments. Once we have this framework, we’ll dive into putting this philosophy into practice.

What Does Risk Mean and How Does It Relate to Vulnerabilities and Exploits?

When we say a system is “secure,” it’s easy to fall into the trap of thinking that security is binary: a system that is “insecure” can be broken into, and a system that is “secure” cannot be broken into. Flip this around and consider risk instead. It quickly becomes clear that there’s a whole spectrum of risk and security to consider. A “secure” system is a system that has a relatively low risk of being broken into. An “insecure” system is a system that has a relatively high risk of being broken into. Some amount of risk is tolerable, even it’s not ideal. So, what exactly is the nature of this risk? Where does it come from?

In cloud computing and virtualization (as in computing in general), input and output to and from the system is the primary route for malicious payloads into the system. However, workloads are diverse and dependent on users doing the right thing (e.g., running security software, regularly updating their OS and applications, etc.). We cannot assume that all cloud users will do these tasks, so we have to focus on two other techniques to mitigate risks: compartmentalization (or separation of privileges) and the principle of awarding the least privilege to do a job.

Compartmentalization separates access to resources such as virtual machines, processes, users, data, etc. and helps contain problems if they do occur. And, the principle of awarding the least privilege to do a job gives users privileges that are only essential to do their work. For example, a regular user on a server does not need root access or, in some cases, does not need to be allowed to install software.

Virtual machines and containers are the most basic form of compartmentalizing in cloud computing and data centers today. These are “trust domains,” which rely either on a hypervisor or on Linux to enforce separation of the most basic privileges. Now, let’s try to evaluate the risk of someone breaking the virtualization layer and accessing data or resources in other VMs or other containers. Although “breaking through” is probably the best description, it is a bit misleading. This conjures up an image of a brute force strong enough to overcome software’s virtual tensile strength.

In reality, the source of this type of risk in software is vulnerabilities. A vulnerability is a weakness — a bug somewhere in the code or in the configuration that an attacker is able to take advantage of within a trusted domain. The code or the technique that attackers use to take advantage of a vulnerability is called an exploit. If there is a vulnerability, and the attacker knows it, then the attacker can get into your system. If there is no vulnerability, or the attacker does not know it, then the attacker cannot get in. So, this virtual break-in requires not strength, but first and foremost, presence and knowledge of a vulnerability.

Evaluating Vulnerabilities to Protect Your Systems

As listed above, a vulnerability in software is a mistake. This could be a mistake either in the code itself (i.e., the software is not functioning as the developer intended). It could also be in its configuration (i.e., the software itself is functioning as the developer intended, but because it’s not configured properly, it’s not functioning as the administrator intended). Both of these are important to consider when evaluating the security of a system.

Let’s use CVE-2015-3456, or VENOM, as an example. This vulnerability is interesting as it has a configuration angle, as well as a vulnerability angle. VENOM is a vulnerability in QEMU’s Floppy Disk Controller (FDC). QEMU is used in Xen, KVM, Virtualbox, and derived solutions. VENOM allows local guest users to cause a denial-of-service attack or allows the execution of arbitrary code. The Xen toolstack automatically configures QEMU, such that the Floppy Disk Controller is disabled, and KVM users could configure their system manually, such that the FDC is not used. Unfortunately, in this case, there was an additional bug in QEMU, which led to the FDC not actually being disabled in QEMU when asked.

In a nutshell, the lesson for administrators is to disable everything that can be disabled and is not used. Of course, the same lesson applies to software: to avoid vulnerabilities like VENOM, the Xen toolstack disables a wide range of QEMU devices that are not used.

What IT Teams Can Learn From The Walking Dead

Security vulnerabilities in today’s complex software environments are a fact of life. IT professionals are constantly on alert for attackers who might identify and exploit a vulnerability. This risk is real and ever-present for companies in any industry across the world. Although the analogy of The Walking Dead is far afield from technology, it’s useful in that it might scare companies enough to take action and increase their defenses.

Imagine you and your motley crew are the last remnants of humanity, as far as you know. You’re going from place to place, living in the remnants of the old civilization.  You stay in one place until you use up all the resources in that place, then you move on.

zombies

Here are the rules for the Walkers in this analogy:

  • They are active day and night and usually attracted by sound, which leads a few Walkers to come together, eventually finding and merging with new groups forming a herd, growing larger and larger and more ferocious.

  • They’re strong enough to break down a door or smash through a window easily…

  • But, they’re too stupid to recognize a door, window, fence, or wall for what it is. However, a herd will eventually identify a window or will build up enough mass to topple a fence or wall.

So, all you have to do is keep quiet and make sure that every door, window, or opening of any kind is properly closed/boarded and that your fencing is tall and structurally sound. If you leave a single crack open, and the Walkers find it, then that’s the end of the story.

Although it’s not that hard to secure any given door or window, you’re only human, and often tired, stressed, or in a hurry. So, despite your best efforts, occasionally a door or window is left open, which, by luck, the Walkers won’t find. Like Walkers, computer attackers are looking for an opening they can break through, and you can’t do away with all the openings.

Small, simple doors and windows are easy to secure; whereas bigger ones are much more difficult to protect. The same is true for fences with the minimum possible surface area. Given your time constraints, boarding up five small windows is a lot easier and less error-prone than boarding up one big one. The smaller the better.

Multiple layers of protection, sometimes called defense-in-depth, are best. If you can secure the building and the fence around it, and close and lock doors within the house, that is best, because hackers need to find *several* mistakes to break through. If you have time, you can strengthen or add new doors. This would be akin to improving the “compartmentalization” of your system architecture.

In the next post, we will dive deeper into security vulnerabilities and how they differ with hypervisors compared to containers. Read Open Source Security Process Part 2: Containers vs. Hypervisors – Protecting Your Attack Surface.

 

Lars Kurth had his first contact with the open source community in 1997 when he worked on various parts of the ARM toolchain. This experience led Lars to become a passionate open source enthusiast who has worked with and for many open source communities over the past 19 years. Lars contributed to projects such as GCC, Eclipse, Symbian, and Xen. He became the open source community manager for Xen.org in 2011 and later chairman of the Xen Project Advisory Board.

OpenStack Tokyo: The Ascendance of Cloud Networking

OpenStack Neutron and software defined networking take a quantum leap forward. Networking has always been a part of the open source OpenStack cloud platform, but it has never been more popular, or as exciting as it is now. At the OpenStack Summit in Tokyo, one of the hottest topics is networking, as organizations of all sizes turn to the cloud for Software Defined Networking and Network Functions Virtualization capabilities.

    During the Wednesday morning keynotes, Mark Collier, Chief Operating Officer (COO) of the OpenStack Foundation, asked the audience if they knew what the most active project was during the recent OpenStack Liberty release cycle. The answer, which surprised some, is the Neutron networking project. 

    Read more at Enterprise Networking Planet

    U.S. Sees New EU Data-Sharing Pact Within Reach

    s1.reutersmediaA new transatlantic data-sharing agreement is within reach after the “Safe Harbour” deal used by thousands of companies to comply with EU privacy law was struck down by the highest EU court this month, U.S. Secretary of Commerce Penny Pritzker said. The so-called “Safe Harbour 2.0” agreement currently being negotiated would meet European concerns about the transfer of data to the United States, Pritzker told journalists in Frankfurt on Thursday during a visit to Germany.

    “A solution is within hand…

    Read more at Reuters

    Millennials Not Pursuing Cybersecurity Careers

     
    Lack of awareness about what cybersecurity jobs entail is widespread worldwide among 18- to 26-year-olds — especially women — a new study finds. 
     
    Young adults ages 18- to 26 worldwide just aren’t flocking to the cybersecurity field, despite the industry’s hot job market and talent gap. There’s a lack of awareness of cybersecurity career opportunities, and young women are less interested and informed about the field than men, according to a new survey of young adults by Raytheon and the National Cyber Security Alliance (NCSA).

    Read more at Dark Reading

    Verizon Doubles Down on IoT With ThingSpace Launch

    The ThingSpace portal allows developers to manage their IoT environments and related data, end-to-end, from device to network to application.

    Last week, Verizon revealed that its Internet of things business delivered nearly $500 millionin revenue for the first nine months of 2015. But with the launch of ThingSpace, a Web-based developer platform for IoT, Verizon is aiming to make that number go much higher. Verizon said ThingSpace is the cornerstone of its IoT strategy. Similar to other IoT cloud platforms from IBM and Amazon Web Services, the ThingSpace portal allows developers to manage their IoT environments and related data, end-to-end, from device to network to application.

    Read more at ZDNet News

    Replace Your Laptop with an Android Tablet

    Your sleek little Android tablet is easy to carry, so why not make it your travel computer?

    I love my Thinkpad, but my go-anywhere travel companion is an Android tablet. I could spend a giant pile of money on something sleek and lightweight like a MacBook Air, Dell XPS 13, or Lenovo’s X1 Carbon, which includes a proper trackpoint. These have screen sizes from 11″ to 14″, good battery life, and enough memory and CPU to do real work.

    asus-fintie smallBut, they’re still oversized and heavy compared to my 8″ ASUS Memo Pad. The Memo Pad weighs .70 pounds. Add a good Bluetooth keyboard, a folio case, and the power cord, and the whole outfit is well under two pounds. In comparison, the 11″ MacBook air is about 2.4 pounds and has a bulky power connector. All of the super-lightweight laptops have expensive bulky proprietary power adapters. The Memo Pad uses a generic 5v micro-USB charger, so if you lose it you can easily replace it. I can stuff it in my small shoulder bag or coat pocket and go anywhere. The super-lightweight laptops range from $899 to $1800. I bought the Memo Pad for $175.

    Of course, the laptops have more of everything: bigger screens, good keyboards, more storage, more memory, more power, and more connectivity. You can run a full Linux distribution on them. Everything is a tradeoff; if I could get an X1 Carbon for $175, well, duh, of course I would take it.

    So, can you do real work on an Android tablet? Yes, you can.

    Keyboard

    The key elements in doing serious work on a tablet are having a good keyboard and finding the right apps. Maybe you are a very fast finger-poker and don’t need an external keyboard; in that case you only need apps that do what you want.

    My keyboard is a Fintie Bluetooth keyboard that came with a nice folio stand cover. It is a sturdy little metal keyboard with a good touch. The keys are small, so it might not work for large hands. I can touch-type on it almost as fast as on a full-sized keyboard. I like not having to give up screen real estate for a keyboard, because 8″ is none too big. There are many keyboards for tablets now, even soft keyboards that roll up.

    Apps

    I’m not a fan of the Chromebook model, where you must have Internet to do anything. I prefer local apps, and my main app is a good text editor. Of course, I still need Internet for web surfing, IRC, and email. I also need a Git client and an SSH client, and the Android world supplies all of these.

    DroidEdit Pro is a great text editor that supports syntax highlighting for nearly 200 programming languages, and it has Dropbox, Google Drive, S/FTP, and Git integration. The interface is very configurable, including keyboard shortcuts, and it comes with a batch of prefab themes. It has HTML preview, runs external commands through SSH, and even has a root mode for editing any file on your rooted Android.

    DroidEdit Pro’s Git integration is limited, supporting only a subset of Git commands. You can try Pocket Git for fuller Git client functionality. Pocket Git does cloning, checkout, stage, unstage, commit, branching, supports SSH, passwords and private keys, and a nice graphical log. The one command it’s missing that I use a lot is git cherry-pick. Other than that, it does everything I need.

    ConnectBot is a nice SSH client with a lot of useful functionality, including Telnet and a local file browser. (Yes, Telnet is still useful for troubleshooting connectivity and testing mail servers.) You can run multiple SSH sessions at the same time, right-click select/mouse wheel paste, and use the disconnect all button to stop all those multiple sessions at once.

    I tried several mail clients and, as always, found them wanting. If you have a large volume of email, it’s going to be pain no matter what. I settled on K-9 Mail, because it supports POP3 and IMAP, you can easily turn auto-sync on and off, and it supports multiple accounts in a nice way: there is a Unified Inbox to see all of your messages in one place, and each account has its own inbox. You can do batch operations, and it has good sorting filters such as date, subject, sender, star, read/unread. You can limit the size of message downloads, store your mail on an external SD card (it’s rather amazing how many Android apps still don’t have a clue about external storage), and configure all kinds of notifications, including sounds and blinking LEDs.

    For IRC, I use AndroIRC. It’s just a nice basic IRC client that supports multiple servers.

    The Hacker’s Keyboard is a great replacement for the standard Android keyboard. It’s very customizable and has a proper numbers row, arrow keys, F keys, punctuation in the right places, Tab/Ctrl/Esc keys, metakeys, and it supports many layouts and voice input.

    My little tablet runs Skype and Google Hangouts satisfactorily. Like most small computers, the speakers are nothing to get excited about, but the audio comes to life in a good headset, and it has enough power and resolution for smooth video.

    Like any Android device, it has a lot of other useful functionality, such as built-in cameras and an audio recorder. In the olden days, journalists carried large heavy kits. Now we can do it all with a little tablet. I wouldn’t want to work on it everyday, because I am thoroughly spoiled by my nice PC with its big screen and good keyboard. As an inexpensive go-anywhere travel companion, it’s pretty nice.