6 C
London
Wednesday, November 22, 2017
Home Tags Unix

Tag: Unix

Kaspersky Lab Industrial Control Systems Cyber Emergency Response Team (Kaspersky Lab ICS CERT) publishes the results of its research on the threat landscape for industrial automation systems for the first six months of 2017.
ShadowPad backdoor found embedded in a software product used by major organizations around the globe to manage their Linux, Windows, and Unix servers.
We knew about this in 2005.

And 2010.

And people are still building without -fstack-check Powerful programs run daily by users of Linux and other flavors of Unix are riddled with holes that can be exploited by logged-in miscreants to gain root privileges, researchers at Qualys have warned.…
“Stack Clashrdquo; poses threat to Linux, FreeBSD, OpenBSD, and other OSes.
The shell is your friend. But many developers don’t really know the shell, the Unix or Linux command-line environment available in several operating systems. (Bash is the best known, but there are others.)Some of you, when you transitioned from Windows to Mac, took your (slow) clickety habits with you, not realizing that the power laid in that app called Terminal hidden under Applications somewhere. Some of you have been shelling into “the server” to tweak a setting or two without realizing that you could automate your life away without even cracking a devops tool.[ Discover the power of Bash on Windows. | The power of PowerShell: PowerShell intro for Windows Server admins • PowerShell intro for Exchange admins • Essential PowerShell scripts for security admins • All about PowerShell providers and modules. | Keep up with hot topics in programming with InfoWorld's App Dev Report newsletter. ]Whatever brought you to the shell, chances are you’re not using it to its full advantage. Here are my top nine tricks for doing so:To read this article in full or to leave a comment, please click here
New version will support up to 4 sockets and 6TB RAM.
“The fox knows many things, but the hedgehog knows one big thing.” Archilochus said in 700nbsp;B.C.

Centuries later, Unix was developed using similar philosophy: “Do one thing and do it well.”Derived on the same principles, microservices aim to deliver specific functionality in an independent repeatable way, but any change to that microservice must not result in breaking other services or consumers that it interacts with.

Because microservices often invoke other microservices, each must provide a well-defined contract for deployed versions so that any change in the producer microservice will not break the functionality of its consumer counterparts.To read this article in full or to leave a comment, please click here
Hewlett Packard Enterprises' HP-UX OS has been around for more than 30 years, and users may be looking to move on from the Unix-based OS.Now HPE is offering a way out of the ancient OS using containers, which are small buckets running instances of a...
Last year Microsoft added an unusual new feature to Windows 10: Linux support.

The Windows Subsystem for Linux (WSL) — sometimes called Bash on Windows — is “Microsoft’s implementation of a Linux-compatible infrastructure that runs atop and within the Windows kernel,” senior program manager Rich Turner tells CIO.com.

That means running Linux binaries without leaving Windows.“Bash on Windows offers a toolset for developers, IT administrators and other tech professionals that want or need to run Linux command-line tools alongside their Windows tools and applications,” Turner explains.

Developed with the help of Canonical (and a large community of Linux users), it’s not there to turn Linux into Windows, or Windows into Linux.
It’s just that some Linux tools are so ubiquitous for development and deployment that it’s useful to be able to use them without spinning up a virtual machine (VM).

That’s one of the reasons Macs are so popular with developers: MacOS is based on BSD, which is Unix, so it can run Linux tools like Bash.

And now, so can Windows 10.To read this article in full or to leave a comment, please click here
GUIs are great—we wouldn’t want to live without them.

But if you’re a Mac or Linux user and you want to get the most out of your operating system (and your keystrokes), you owe it to yourself to get acquainted with the Unix command line. Point-and-click is wonderful whenever you need to do something once or twice.

But if you need to repeat that task many times, the command line is your savior.The command line is a window into the full, awesome power of your computer.
If you long to break free of the constraints of the GUI or think that programming or administering remote machines is in your future, then learning the Unix command line is definitely for you.To read this article in full or to leave a comment, please click here
The ShadowBrokers' latest dump of Equation Group hacks focuses on UNIX systems and GSM networks, and was accompanied by an open letter to President Trump.
Annoyed with the U.S. missile strike last week on an airfield in Syria, among other things, hacker group Shadow Brokers resurfaced on Saturday and released what they said was the password to files containing suspected National Security Agency tools they had earlier tried to sell.“Is appearing you are abandoning ‘your base’, ‘the movement’, and the peoples who getting you elected,” the group wrote in broken English in a letter to U.S. President Donald Trump posted online on Saturday.[ 18 surprising tips for security pros. | Discover how to secure your systems with InfoWorld's Security Report newsletter. ]The hacker group, believed by some security experts to have Russian links, released in January an arsenal of tools that appeared designed to spy on Windows systems, after trying to to sell these and other supposedly Windows and Unix hacking tools for bitcoin.To read this article in full or to leave a comment, please click here