Home Tags Unix

Tag: Unix

Stack Clash flaws blow local root holes in loads of top...

We knew about this in 2005.

And 2010.

And people are still building without -fstack-check Powerful programs run daily by users of Linux and other flavors of Unix are riddled with holes that can be exploited by logged-in miscreants to gain root privileges, researchers at Qualys have warned.…

12-year-old security hole in Unix-based OSes isn’t plugged after all

“Stack Clashrdquo; poses threat to Linux, FreeBSD, OpenBSD, and other OSes.

9 shell tips every developer should know

The shell is your friend. But many developers don’t really know the shell, the Unix or Linux command-line environment available in several operating systems. (Bash is the best known, but there are others.)Some of you, when you transitioned from Windows to Mac, took your (slow) clickety habits with you, not realizing that the power laid in that app called Terminal hidden under Applications somewhere. Some of you have been shelling into “the server” to tweak a setting or two without realizing that you could automate your life away without even cracking a devops tool.[ Discover the power of Bash on Windows. | The power of PowerShell: PowerShell intro for Windows Server admins • PowerShell intro for Exchange admins • Essential PowerShell scripts for security admins • All about PowerShell providers and modules. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Whatever brought you to the shell, chances are you’re not using it to its full advantage. Here are my top nine tricks for doing so:To read this article in full or to leave a comment, please click here

NT Workstation may make a return with new high-end desktop Windows...

New version will support up to 4 sockets and 6TB RAM.

IDG Contributor Network: Microservices need to honor contracts

“The fox knows many things, but the hedgehog knows one big thing.” Archilochus said in 700nbsp;B.C.

Centuries later, Unix was developed using similar philosophy: “Do one thing and do it well.”Derived on the same principles, microservices aim to deliver specific functionality in an independent repeatable way, but any change to that microservice must not result in breaking other services or consumers that it interacts with.

Because microservices often invoke other microservices, each must provide a well-defined contract for deployed versions so that any change in the producer microservice will not break the functionality of its consumer counterparts.To read this article in full or to leave a comment, please click here

HPE offers an escape from the aging HP-UX OS via containers

Hewlett Packard Enterprises' HP-UX OS has been around for more than 30 years, and users may be looking to move on from the Unix-based OS.Now HPE is offering a way out of the ancient OS using containers, which are small buckets running instances of a...

18 things you should know about using Linux tools in Windows...

Last year Microsoft added an unusual new feature to Windows 10: Linux support.

The Windows Subsystem for Linux (WSL) — sometimes called Bash on Windows — is “Microsoft’s implementation of a Linux-compatible infrastructure that runs atop and within the Windows kernel,” senior program manager Rich Turner tells CIO.com.

That means running Linux binaries without leaving Windows.“Bash on Windows offers a toolset for developers, IT administrators and other tech professionals that want or need to run Linux command-line tools alongside their Windows tools and applications,” Turner explains.

Developed with the help of Canonical (and a large community of Linux users), it’s not there to turn Linux into Windows, or Windows into Linux.
It’s just that some Linux tools are so ubiquitous for development and deployment that it’s useful to be able to use them without spinning up a virtual machine (VM).

That’s one of the reasons Macs are so popular with developers: MacOS is based on BSD, which is Unix, so it can run Linux tools like Bash.

And now, so can Windows 10.To read this article in full or to leave a comment, please click here

10 Unix commands every Mac and Linux user should know

GUIs are great—we wouldn’t want to live without them.

But if you’re a Mac or Linux user and you want to get the most out of your operating system (and your keystrokes), you owe it to yourself to get acquainted with the Unix command line. Point-and-click is wonderful whenever you need to do something once or twice.

But if you need to repeat that task many times, the command line is your savior.The command line is a window into the full, awesome power of your computer.
If you long to break free of the constraints of the GUI or think that programming or administering remote machines is in your future, then learning the Unix command line is definitely for you.To read this article in full or to leave a comment, please click here

ShadowBrokers Dump More Equation Group Hacks, Auction File Password

The ShadowBrokers' latest dump of Equation Group hacks focuses on UNIX systems and GSM networks, and was accompanied by an open letter to President Trump.

Angry Shadow Brokers release password for suspected NSA hacking tools

Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced on Saturday and released what they said was the password to files containing suspected National Security Agency tools they had earlier tried to sell.“Is appearing you are abandoning ‘your base’, ‘the movement’, and the peoples who getting you elected,” the group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here

Penquin’s Moonlit Maze

Moonlight Maze is the stuff of cyberespionage legend.
In 1996, in the infancy of the Internet, someone was rummaging through military, research, and university networks primarily in the United States, stealing sensitive information on a massive scale.

To say that this historic threat actor is directly related to the modern day Turla would elevate an already formidable modern day attacker to another league altogether.

AWS follows Google with Reserved Instance flexibility changes

Customers who have Reserved Instance contracts with Amazon Web Services will be able to subdivide some of their Linux and Unix virtual machine instances while maintaining their capacity discounts, thanks to pricing changes announced Monday.Reserved Instances allow customers to lock themselves into paying AWS for a certain amount of compute capacity with the company's EC2 (Elastic Compute Cloud) in exchange for a discount off its list price. To read this article in full or to leave a comment, please click here