thewayne: (Default)
At The Linux Foundation's Open Source Summit North America, Linus Torvalds and his good friend Dirk Hohndel, Verizon's Head of the Open Source Program Office, once more had a wide-ranging conversation about Linux development and related issues.

Sadly, it's a summary and commentary on their talk, not really a detailed copy of their talk. It's quite interesting, and not a long read. Their thoughts on AI are amusing: 'Spell check with steroids'.

https://www.zdnet.com/article/linus-torvalds-takes-on-evil-developers-hardware-errors-and-hilarious-ai-hype/

https://linux.slashdot.org/story/24/04/19/1944235/linus-torvalds-on-hilarious-ai-hype
thewayne: (Default)
This is excellent news. Most of Windows is written in C and C++. Those languages have memory problems. Let's use a simple example. There's a programming construct known as an array, it's sort of an indexed list. Let's say we have an array called MyList(10). It has ten elements to it, what's in them doesn't really matter. What happens when you try to reference element 11?

Usually in the C family of languages, you access the memory 'above' the tenth element and what is returned is undefined: we don't know what it will contain. Maybe it overlaps with the password cache, perhaps it has your banking account number in it.

Now, to be fair to C (personally I hate the C/C++ languages, but I firmly believe in 'to each their own'), later versions have better protection against accessing outside array boundaries and things like that which can cause information to leak.

A while back another programming language came to town, Rust. And it is designed, from the clear page, to have memory protection that will prevent access to element 11 and other buffer/memory issues. Which means that code, properly developed! (always a big problem), will theoretically be safer/more secure than C family languages.

Microsoft is now rewriting some subsystems in the Windows operating system into Rust!!!

This is excellent news. The ability to improve security is always a good thing, and this is the first step in doing it. You simply cannot rewrite the entirety of Windows in Rust in one swell foop, but you can rewrite portions of it - letting you see how it works - and progressively get the whole thing redone eventually!

This is now in an Insider edition of Windows 11, meaning it will eventually see the light of day to all users, and should be completely transparent.

In other Rust news, Linux has started rewriting SUDO into Rust. Sudo is a program that lets an account that does not have administrative permission run admin commands if they have the password for it. A fundamental rule of network security, and computer security in general, is to NEVER let your users run their local machines as administrator! Aside from the fact that it gives them far too much control to utterly screw their machine over - and I've seen it! - if your account with admin permissions gets taken over by malware, that's a leverage point to get into the entire network and subvert it!

Speaking as a system administrator, we see far too many programs that won't work if the user is not an administrator on the machine. The normal vendor solution? Make the user an admin. Usually this is caused by the bad coding practice of the developers having admin access on their computers, which really ticks me off. If a software package only runs as administrator, then it's badly written. We can usually develop some selective permissions to make such software work without giving the user admin, but it's always a PITB.

https://www.thurrott.com/windows/windows-11/282995/first-rust-code-shows-up-in-the-windows-11-kernel
thewayne: (Cyranose)
There are several linux operating systems out there that are designed for privacy and secrecy. It's been acknowledged for a long time that one of the best ways to do such is to mount them on read-only media, like a CD or DVD, boot from the media, do what you need to do and shut down. Nothing is written to the local drive, so there's no forensic evidence from local computers to recover. Also, you're immune to malware being installed on your system since nothing can be written to your drive and the hard drive in the system is disconnected.

This is what Snowden did using a distribution called TAILS, it's a product of two anonymous groups working towards the same goal. You can load it on a thumb drive or CD/DVD, boot from it, and it provides you with a browser and Open Office installation and routes everything through TOR. It has other security features to keep you anonymous and encrypted. This, apparently, is how he communicated with the writers that he'd selected to send documents to.

Apparently it is not a casual installation and takes some configuration work to make it function properly. Not for casual players.

I think there are some networks where this wouldn't work, such as at my uni. Before you use a device on their network, you have to sign in to your student account and register the MAC address, then reboot your device. I think they're using a combination of MAC registry at the switch level and also perhaps a persistent cookie, though I haven't checked in to that. I suppose you could use TAILS to register the MAC address, which would be the address of the local computer's ethernet card, but you wouldn't be able to store the cookie, so I don't know how TAILS would work in an environment like that, or even if it could get out to the internet.

http://www.wired.com/2014/04/tails/

http://yro.slashdot.org/story/14/04/15/1940240/snowden-used-the-linux-distro-designed-for-internet-anonymity
thewayne: (Cyranose)
I've had to fight to get linux working on laptops when I was messing with it a long time ago, I think this would be more of a fight.

http://www.strangehorizons.com/2004/20040405/badger.shtml
thewayne: (Cyranose)
They recently completed switching over 37,000 of the 72,000 computers to Linux. And they did it in a quite sensible fashion:

"To make the switch less abrupt, the Gendarmerie first moved to cross-platform open source applications such as OpenOffice, Firefox, and Thunderbird. That allowed employees to keep using Windows while they got used to the new applications. Only then did the agency move them onto a Linux OS running these same applications.

The migration started in 2004, when the Gendarmerie was faced with providing all its users with access to its internal network. In order to save money, the agency switched from Microsoft Office to OpenOffice. Then the agency rolled out Firefox and Thunderbird in 2006. Finally, in 2008, it switched the first batch of 5,000 users to a Linux OS based on the Ubuntu distribution."


They say their total cost of ownership savings is 40%, I expect it will be higher when they find they can keep older equipment going longer.

http://www.wired.com/wiredenterprise/2013/09/gendarmerie_linux/
thewayne: (Cyranose)
Westcliff High School for Girls Academy did something interesting last year: they switched to Linux. Their servers, their student workstations, their faculty/staff workstations. Everything went SuSe/Gnome. And a year later, it's still going strong.

England had a school curriculum that dictated that all students would Learn Microsoft Office and that would make them computer literate. Fortunately they ditched that standard and made it more open for the individual schools/districts to teach more useful things.

The best thing about this, aside from tremendous savings in software, was the tremendous savings in hardware. Microsoft is in this tight clench with hardware makers and you end up replacing all your computers every four or five years, they just can't handle the load. That's the sweet thing about Linux: runs fine on 5-10 year old hardware. They did have to replace eight network switches to bring the entire network up to gigabit speeds, that seems to have been their major surprise that they had not anticipated in their mini-trials.

This is an article with their IT administrator who did the switch after many hours of grilling by school administration.

http://opensource.com/education/13/7/linux-westcliff-high-school

http://linux.slashdot.org/story/13/07/31/1645240/a-year-of-linux-desktop-at-westcliff-high-school
thewayne: (Default)
Good for them! I'm glad to see that they have endured and prospered. I don't use their product, but I still respect it.

http://linux.slashdot.org/story/12/03/29/1233225/in-your-face-critics-red-hat-passes-1-billion-in-revenue


In other Linux news, the city of Munich has saved an estimated 4 million Euros with switching to Linux.

"Mayor Ude reported today that the city of Munich has saved €4 million so far (Google translation of German original) by switching its IT infrastructure from Windows NT and Office to Linux and OpenOffice. At the same time, the number of trouble tickets decreased from 70 to 46 per month. Savings were €2.8M from software licensing and €1.2M from hardware because demands are lower for Linux compared to Windows 7."</i http://linux.slashdot.org/story/12/03/29/0025239/munich-has-saved-4m-so-far-after-switch-to-linux
thewayne: (Default)
This is sad. In my brief experiments with Linux, Mandriva was one of the better ones for recognizing my particular combinations of hardware and working well. They had a shareholders meeting in early December and put forth some plans for shoring up the finances, but the majority shareholders did not approve.

It is possible that something might yet happen that will save them, but I would not hold my breath.

http://www.h-online.com/open/news/item/Mandriva-facing-bankruptcy-1405023.html
thewayne: (Default)
DVL is purposely made as insecure as possible by running old versions of software with known vulnerabilities. It's a tool for security researchers to see how exploits and privilege escalation works. I'm sure it'll also be very attractive for people running honey pots to study exploits.

Pretty cool! But what I'm wondering is that system updates on it will look like.

Download image is 1.8 gig.

http://www.damnvulnerablelinux.org/index.html

http://www.geek.com/articles/news/damn-vulnerable-linux-the-most-vulnerable-and-exploitable-operating-system-ever-20100717/

http://linux.slashdot.org/story/10/07/17/2136237/Damn-Vulnerable-Linux-mdash-Most-Vulnerable-Linux-Ever
thewayne: (Default)
If you're running Lucid Lynx v10.04, plugging your iPhone mounts it as a USB device and you have total access to the data on the phone.

"This, quite honestly, is a staggering flaw. It basically allows anyone capable of driving a Linux PC to copy data off of an iPhone without the owner of the phone having any idea whatsoever that this has happened.

What’s more worrying is that Marienfeldt and Herbeck think that write access to the iPhone is only a buffer overflow away, which means serious access."


http://www.zdnet.com/blog/hardware/ubuntu-lucid-lynx-1004-can-read-your-iphones-secrets/8424

http://apple.slashdot.org/story/10/05/27/1826207/iPhones-PIN-Based-Security-Transparent-To-Ubuntu?art_pos=24


There was a recent article about smartphones being seized by law enforcement organizations (LEO) and the potential for the phone to be remotely ordered to wipe itself. I know iPhones and Blackberries can do this. So they're talking about LEOs using needing to use Faraday Cage bags and rooms to examine the phones after they make sure to remove the battery when they seize the phone. Of course, the iPhone is a sealed unit and the battery cannot be removed.


Apple claims: "iPhone 3GS protects data through encryption of information in transmission, at rest on the device, and when backed up to iTunes."

In the past I used a Palm Pilot extensively and had a program called CryptoPad that used Blowfish encryption and I knew the backup was also encrypted which required a desktop version of the program to access the backups. I've been looking for an encryption product for the iPad Touch which has become my daily use PDA, so this really bothers me that I can't encrypt things and have confidence that they're secure.

Apparently Apple's encryption and business-level security is badly flawed. And that sucks.

http://marienfeldt.wordpress.com/2010/03/22/iphone-business-security-framework/

http://www.wired.com/gadgetlab/2009/07/iphone-encryption/
thewayne: (Default)
I think the site's header says it all:

"The Fink project wants to bring the full world of Unix Open Source software to Darwin and Mac OS X. We modify Unix software so that it compiles and runs on Mac OS X ("port" it) and make it available for download as a coherent distribution. Fink uses Debian tools like dpkg and apt-get to provide powerful binary package management. You can choose whether you want to download precompiled binary packages or build everything from source."

The thing that brought them to my attention was a recent review of open source office productivity apps that mentioned a database for Mac called Kexi that purports to be an Access-like DB for Macs.

http://www.finkproject.org/

http://pdb.finkproject.org/pdb/package.php/kexi
thewayne: (Default)
Quite amusing. They were able to get this open source school up and running in four weeks! There's some dispute in the comments about whether or not the NZ schools are required to run Windows, still, this sounds like a school that I would have loved to attend.

Just because the racks will hold 48 servers doesn't mean a Microsoft-powered school would require 192 servers, so that comparison is kind of farcical. Still, it will mean a tremendous reduction in power, heat, and noise.

http://www.cio.com.au/article/333686/nz_school_ditches_microsoft_goes_totally_open_source?pp=1

http://linux.slashdot.org/story/10/01/25/0230231/NZ-School-Goes-Open-Source-Amid-Microsoft-Mandate?art_pos=12
thewayne: (Default)
A little back story. Fall '04 I was planning on taking an advanced computer security course which required heavy use of Red Hat Linux. So I downloaded it, burned a couple of CD images, and installed it on my laptop. This made my laptop dual-boot so that I could continue using my Win XP installation.

Naturally the class was cancelled.

I've had an interest in learning LAMP, an abbreviation for Linux, Apache, MySQL, and PHP. The AMP portion of it powers a HUGE number of web sites, I can't give you the exact number, but it's impressive. So I used the Red Hat installation to work with AMP, largely unsuccessfully. Time passes, and I forget my Linux passwords! Yes, I should have put them in an encrypted note in my Palm Pilot, but I shouldn't have needed to as I was using a formula that I use for generating passwords, but somehow I screwed up.

And since a lot of people on my flist have probably zero interest in Linux, I'll hide the rest under a cut!
Read more... )

May 2025

S M T W T F S
    1 23
45678910
1112 131415 1617
18 19 20 212223 24
25262728 2930 31

Syndicate

RSS Atom

Most Popular Tags

Style Credit

Expand Cut Tags

No cut tags
Page generated Jun. 3rd, 2025 01:10 am
Powered by Dreamwidth Studios