The new vulnerability in the Bash shell is the worst we’ve seen in many years. No software on critical systems can be assumed as safe. Read more at Enterprise Open Source Toolkit Source: Linux
Month: September 2014
Free Software Foundation statement on the GNU Bash "shellshock" vulnerability
by
•Bash is the GNU Project’s shell; it is part of the suite of software that makes up the GNU operating system. The GNU programs plus the kernel Linux form a commonly used complete free software operating system, called GNU/Linux. The bug, which is being referred to as “shellshock,” can allow, in some circumstances, attackers to…
IGEL integrates Microsoft RD Gateway into Linux thin clients
by
•Reading, UK September 25th 2014 – With the latest firmware update for IGEL Linux users can now access their RDP environment via a Microsoft Remote Desktop Gateway when using Linux-based thin clients. This can be done easily and conveniently via the Internet, cutting administrative time whilst increasing security. The IGEL Linux firmware means it is…
Big Data Comes of Age in 2014
by
•Many Businesses See Potential of Approach but Issues around Technology Skills and Resourcing are Holding Some BackMaidenhead, Berkshire – 25 September 2014 – A new survey has revealed 2014 looks set to be the year when many businesses make the step from Big Data theory to practical real-world roll-outs. The research, carried out in Spring…
HGI Co-operating with Leading Organisations to Discuss the Connected Home Ecosystem
by
•HGI is actively working with home networking technology groups to address the Smart Home24 September 2014. HGI, the leading global organisation for publishing requirements for the Smart Home, has recently met both the EnOcean Alliance and the ULE Alliance to explore current trends and case studies within the Smart Home.Luca Giacomello, HGI Chairman and Project…
Kali NetHunter turns Android device into hacker Swiss Army knife
by
•Free to download, ready to customize, NetHunter puts the power of a pen-tester’s Linux desktop on a Nexus phone or tablet. One of the tools we’ve leaned on heavily in some of our lab testing of software privacy and security is Kali Linux. Source: Tech
Make Linux Troubleshooting Easier
by
•It’s up to the sysadmin to ensure that Linux servers operate at peak performance. Linux troubleshooting is of paramount concern in the data center. Data center experts answered some of your burning Linux server troubleshooting questions around performance problems, optimization and useful tools. Read more at TechTarget. Source: Linux
Why Red Hat's Third-Quarter Forecast Is No Valuation Threat
by
•Your browser is not supported. Please upgrade to one of the following browsers: Google Chrome Mozilla Firefox Apple Safari Microsoft Internet Explorer 8+ You may proceed to the site by clicking here , however some pages might not work correctly. Source: Tech
Brocade Announces New Hardware and Software for Brocade MLXe Routers to Help Transition to the "New IP"
by
•Additions Address Growing Network Bandwidth, Scale, and Programmability San Jose, CA, September 23, 2014 Today, Brocade (NASDAQ: BRCD) announced new hardware modules and software for the Brocade® MLX® Series routers with the industry’s most comprehensive capabilities to address the bandwidth, scale, and performance needed for the networks of today; providing a seamless path to open,…
rncbc.org updates Qtractor to v0.6.3 – The Armed Hadron beta release
by
•“Quick Search” KVR Audio’s Product Database, News Items, Developer Listings, Forum Topics and videos here. For advanced Product Database searching please use the full product search . Source: Tech