The New Yorker on Linus Torvalds

Linux

Posted by msmash

on Thursday September 20, 2018 @10:31AM

from the closer-look dept.

Linus Torvalds announced on Sunday that he was sorry for

how he treated the community over the years

. Torvalds, 48, said he planned to make some changes to how he conducted himself, and on that part, he said he would be taking some time off from Linux kernel development work.

The New Yorker has published a story on Torvalds today

in which it notes that it reached out to Torvalds days before he made the big announcement. From the story, which may be paywalled for some readers:

Torvalds’s decision to step aside came after The New Yorker asked him a series of questions about his conduct for a story on complaints about his abusive behavior discouraging women from working as Linux-kernel programmers. In a response to The New Yorker, Torvalds said, “I am very proud of the Linux code that I invented and the impact it has had on the world. I am not, however, always proud of my inability to communicate well with others — this is a lifelong struggle for me. To anyone whose feelings I have hurt, I am deeply sorry.”

Torvalds’s response was conveyed by the Linux Foundation, which supports Linux and other open-source programming projects and paid Torvalds $1.6 million in annual compensation as of 2016. The foundation said that it supported his decision and has encouraged women to participate but that it has little control over how Torvalds runs the coding process. “We are able to have varying degrees of impact on these outcomes in newer projects,” the statement said. “Older more established efforts like the Linux kernel are much more challenging to influence.”

Linux’s elite developers, who are overwhelmingly male, tend to share their leader’s aggressive self-confidence. There are very few women among the most prolific contributors, though the foundation and researchers estimate that roughly ten per cent of all Linux coders are women. “Everyone in tech knows about it, but Linus gets a pass,” Megan Squire, a computer-science professor at Elon University, told me, referring to Torvalds’s abusive behavior. “He’s built up this cult of personality, this cult of importance.”

 

Never call a man a fool. Borrow from him.

Working…

Source

Doghouse – Continuity » Linux Magazine

Developing an exit strategy can ensure continuity when it comes to FOSS projects.

In a conversation with a chief technical officer (CTO) of a web-hosting company the other day, he mentioned that a large piece of FOSS that his company depended on was being removed from the Linux kernel, because there was no one to develop and support it. While he did not really come out and make the accusation, I inferred from his remark that he felt parts of the Linux kernel were not receiving proper attention, given their importance to the FOSS world.

This does happen, and it has been noted in the past. Typically at the last minute, the FOSS community will belly up to the bar, and a few more developers will be found. Or some company will fund the primary developers, so they can spend full time supporting the software that they had been supporting and developing in their spare time.

Yes, the FOSS community has a coverage problem from time to time. Yes, sometimes software that we depend on goes stagnant, with the developers either leaving the project or sometimes (unfortunately) dying. This is why software projects need to spend as much time “building community” around their projects as they do writing code. The project leaders have to attract new talent, both building enthusiasm for the project, as well as building expertise in those who will become the new architects and leaders of tomorrow.

[…]

Use Express-Checkout link below to read the full article (PDF).

Source

Linux Today – Have a Plan for Netplan

Oct 16, 2018, 19:00 (0 Talkback[s])

(Other stories by Shawn Powers)

The old way of configuring Debian-based network interfaces was based on the ifupdown package. The new default is called Netplan, and although it’s not terribly difficult to use, it’s drastically different. Netplan is sort of the interface used to configure the back-end dæmons that actually configure the interfaces. Right now, the back ends supported are NetworkManager and networkd.

If you tell Netplan to use NetworkManager, all interface configuration control is handed off to the GUI interface on the desktop.

Complete Story

Source

Upgrade Ubuntu 18.04 LTS to 18.10

The Ubuntu 18.10 Cosmic Cuttlefish will be released on October 18, 2018. If you can’t wait to see what Ubuntu 18.10 has to offer, then good news for you. Ubuntu 18.10 Beta version is now available to download. You can also upgrade your existing Ubuntu 18.04 LTS Bionic Beaver installation to Ubuntu 18.10 Cosmic Cuttlefish.

In this article, I will show you how to upgrade your existing Ubuntu 18.04 LTS to Ubuntu 18.10. Let’s get started.

In this section of the article, I will show you how to upgrade your Ubuntu 18.04 LTS desktop to Ubuntu 18.10 (currently in Beta) Desktop operating system.

First, check the version of Ubuntu you’re using before you go through the upgrade process. That way, you will be able to verify whether the upgrade worked or not.

As you can see, from the About (Settings > Details > About) tab, I am using Ubuntu 18.04 LTS GNOME 3.28.1 desktop environment.

To get the same information from the command line interface, open up a Terminal and run the following command:

As you can see, I get the same information here.

Now, search for Software & Updates app from the Application Menu and click on the Software & Updates app as marked in the screenshot below.

Software & Updates app should open up. Now click on the Updates tab as marked in the screenshot below.

From the Updates tab, make sure the check boxes are marked as shown in the screenshot below.

Also, change Notify me of a new Ubuntu version to For any new version as marked in the screenshot below.

Now type in your password and click on Authenticate.

Now click on Close to exit out of Software & Updates app.

Now you have to make sure all the software packages are up to date on your Ubuntu 18.04 LTS before you upgrade your Ubuntu 18.04 LTS to 18.10. This is very important because if all the softwares are not up to date, then you may face problems in the upgrade process.

On Ubuntu 18.04 LTS, you can use the Software Updater app to update all the software packages very easily. Look for Software Updater from the Application Menu and then click on the Software Updater icon as marked in the screenshot below.

Software Updater should check for softwares updates for your Ubuntu 18.04 LTS operating system.

If any software update is available, it should show up in the Software Updater app as you can see in the screenshot below. About 342 MB of internet data will be used to download the required packages for the software update. If your using limited internet plan (such as Mobile broadband), make sure you have enough internet data available. Once you’re done reviewing everything, click on Install Now to start the software update process.

Now type in your password and click on Authenticate.

Software Updater app should download and install all the required packages.

Once the software update is complete, you should see the following window. Now click on Restart Now.

Once your computer starts, your Ubuntu 18.04 LTS should be updated to the latest stable version (18.04.1 LTS at the time of this writing) as you can see in the screenshot below. The GNOME version is also upgraded from 3.28.1 to 3.28.2 (at the time of this writing).

The Software Updater app may not update some of the packages on your Ubuntu 18.04 LTS desktop. To make sure these are updated as well, open up a Terminal (press <Ctrl> + t) and run the following command:

Now press y and then press <Enter>.

If you see the following message, just keep the default and press <Enter>.

The packages are updated.

Now reboot your computer with the following command:

Your Ubuntu 18.04 LTS desktop is now ready to be upgraded to Ubuntu 18.10.

Just open a Terminal from the Application Menu or by pressing <Ctrl> + t and run the following command:

$ sudo do-release-upgrade -d

NOTE: As Ubuntu 18.10 is in Beta now, you have to run sudo do-release-upgrade -d in order to upgrade to Ubuntu 18.10 from Ubuntu 18.04. But once Ubuntu 18.10 is released, please run sudo do-release-upgrade without the -d flag.

Ubuntu 18.10 package repository is being added and APT package repository cache is being updated.

When you see the following prompt, press y and then press <Enter>.

Now press <Enter> to continue.

The release upgrade has started. It should take a while to complete.

Press y and then press <Enter> to continue.

Now press y and then press <Enter>. Your computer should be restarted.

Now you should be booted into the Ubuntu 18.10 login screen as you can see in the screenshot below.

Once you login, you should see the following window. This is the default look and feel of Ubuntu 18.10. Ubuntu 18.10 got a new theme and icon set. I love it.

As you can see, I am using Ubuntu 18.10 Cosmic Cuttlefish development branch or Beta version with GNOME 3.30.1

Congrats! You’ve successfully upgraded to Ubuntu 18.10 from Ubuntu 18.04 LTS.

Upgrading to Ubuntu 18.10 from 18.04 from the Terminal:

You can also upgrade to Ubuntu 18.10 from 18.04 LTS from the command line.

First, open up a Terminal by pressing <Ctrl> + t.

Now open the /etc/apt/sources.list file with the following command:

$ sudo nano /etc/apt/sources.list

Make sure at least the marked package repositories are enabled.

Now update the APT package repository cache with the following command:

Now update all the packages with the following command:

Now update the kernel and some of the system packages with the following command:

Once these upgrades are complete, reboot your computer with the following command:

Now upgrade your Ubuntu 18.04 LTS to Ubuntu 18.10 Cosmic Cuttlefish with the following command:

$ sudo do-release-upgrade -d

NOTE: Once Ubuntu 18.10 is released, remove the -d flag from the command. The reason is explained in the earlier section of this article above.

Once the release upgrade is complete, reboot your computer with the following command:

You should be booted into Ubuntu 18.10.

So that’s how you upgrade Ubuntu 18.04 LTS to Ubuntu 18.10. Thanks for reading this article.

Source

An introduction to Ansible Operators in Kubernetes

For years, Ansible has been a go-to choice for infrastructure automation. As Kubernetes adoption has skyrocketed, Ansible has continued to shine in the emerging container orchestration ecosystem.

Ansible fits naturally into a Kubernetes workflow, using YAML to describe the desired state of the world. Multiple projects, including the Automation Broker, are adapting Ansible for use behind specific APIs. This article will focus on a new technique, created through a joint effort by the Ansible core team and the developers of Automation Broker, that uses Ansible to create Operators with minimal effort.

What is an Operator?

An Operator

is a Kubernetes controller that deploys and manages a service or application in a cluster. It automates human operation knowledge and best practices to keep services running and healthy. Input is received in the form of a custom resource. Let’s walk through that using a Memcached Operator as an example.

The Memcached Operator can be deployed as a service running in a cluster, and it includes a custom resource definition (CRD) for a resource called Memcached. The end user creates an instance of that custom resource to describe how the Memcached Deployment should look. The following example requests a Deployment with three Pods.

apiVersion: “cache.example.com/v1alpha1”
kind: “Memcached”
metadata:
name: “example-memcached”
spec:
size: 3

The Operator’s job is called reconciliation—continuously ensuring that what is specified in the “spec” matches the real state of the world. This sample Operator delegates Pod management to a Deployment controller. So while it does not directly create or delete Pods, if you change the size, the Operator’s reconciliation loop ensures that the new value is applied to the Deployment resource it created.

A mature Operator can deploy, upgrade, back up, repair, scale, and reconfigure an application that it manages. As you can see, not only does an Operator provide a simple way to deploy arbitrary services using only native Kubernetes APIs; it enables full day-two (post-deployment, such as updates, backups, etc.) management, limited only by what you can code.

Creating an Operator

The Operator SDK makes it easy to get started. It lays down the skeleton of a new Operator with many of the complex pieces already handled. You can focus on defining your custom resources and coding the reconciliation logic in Go. The SDK saves you a lot of time and ongoing maintenance burden, but you will still end up owning a substantial software project.

Ansible was recently introduced to the Operator SDK as an even simpler way to make an Operator, with no coding required. To create an Operator, you merely:

  • Create a CRD in the form of YAML
  • Define what reconciliation should do by creating an Ansible role or playbook

It’s YAML all the way down—a familiar experience for Kubernetes users.

How does it work?

There is a preexisting Ansible Operator base container image that includes Ansible, ansible-runner, and the Operator’s executable service. The SDK helps to build a layer on top that adds one or more CRDs and associates each with an Ansible role or playbook.

When it’s running, the Operator uses a Kubernetes feature to “watch” for changes to any resource of the type defined. Upon receiving such a notification, it reconciles the resource that changed. The Operator runs the corresponding role or playbook, and information about the resource is passed to Ansible as extra-vars.

Using Ansible with Kubernetes

Following several iterations, the Ansible community has produced a remarkably easy-to-use module for working with Kubernetes. Especially if you have any experience with a Kubernetes module prior to Ansible 2.6, you owe it to yourself to have a look at the k8s module. Creating, retrieving, and updating resources is a natural experience that will feel familiar to any Kubernetes user. It makes creating an Operator that much easier.

Give it a try

If you need to build a Kubernetes Operator, doing so with Ansible could save time and complexity. To learn more, head over to the Operator SDK documentation and work through the Getting Started Guide for Ansible-based Operators. Then join us on the Operator Framework mailing list and let us know what you think.

Michael Hrivnak will present Automating Multi-Service Deployments on Kubernetes at LISA18, October 29-31 in Nashville, Tennessee, USA.

Source

Arm’s Mbed Linux OS feeds into Pelion IoT strategy

Arm unveiled an “Mbed Linux OS” distro that mixes Yocto and Mbed code and works with its Pelion IoT Platform. Arm also extended Pelion to support x86 devices that use Intel’s SDO provisioning scheme.

Politics and international relations may be fraught with acrimony these days, but the tech world seems a bit friendlier of late. Last week Microsoft joined the Open Invention Network and agreed to grant a royalty-free, unrestricted license of its 60,000-patent portfolio to other OIN members, thereby enabling Android and Linux device manufacturers to avoid exorbitant patent payments. This week, Arm and Intel kept up the happy talk by agreeing to a partnership involving IoT device provisioning.

Arm’s recently announced Pelion IoT Platform will align with Intel’s Secure Device Onboard (SDO) provisioning technology to make it easier for IoT vendors and customers to onboard both x86 and Arm-based devices using a common Peleon platform. Arm also announced Pelion related partnerships with myDevices and Arduino (see farther below).

In another nod to Intel, Arm unveiled a new, IoT focused Mbed Linux OS distribution that combines the Linux kernel with tools and recipes from the Intel-backed Yocto Project. The distro also integrates security and IoT connectivity code from its open source Mbed RTOS.

Pelion IoT Platform architecture
(click image to enlarge)

 

When Pelion was announced, Arm mentioned cross-platform support, but there were few details. Now with the Intel SDO deal and the launch of Mbed Linux OS, Arm has formally expanded Pelion from an MCU-only IoT data aggregation platform to one that supports more advanced x86 and Cortex-A based systems.

Mbed Linux OS

The early stage Mbed Linux OS will be released by the end of the year as an invitation-only developer preview. Both the OS source code and related test suites will eventually be open sourced.

In the Mbed Linux OS blog announcement, Arm’s Mark Wright pitches the distro as a secure, IoT focused “sibling” to the Cortex-M focused Mbed that is designed for Cortex-A processors. Arm will support Mbed Linux with its MCU-oriented Mbed community of 350,000 developers and will offer support for popular Linux development boards and modules. The Softbank-owned company will also supply optional commercial support.

Like Mbed, Mbed Linux will be “deeply integrated” with the Pelion IoT System in order “to simplify lifecycle management.” The Pelion support provides device provisioning, connectivity, and updates, thereby enabling development teams to update the OS and the applications independently, says Wright. Working with the Pelion Device Management Application, Mbed Linux OS can “simplify in-field provisioning and eradicate the need for legacy serial connections for initial device configuration,” says Arm.

Mbed Linux will support Arm’s Platform Security Architecture and hardware based TrustZone security to enable secure, signed boot and signed updates. It will also enable deployment of applications in secure, OCI-compliant containers.

Arm did not specify which components of the Yocto Project code it would integrate with Mbed. In late August, Arm and Facebook joined Intel and TI as Platinum members of the Yocto Project. The Linux Foundation hosted project was launched by Intel but is now widely used on Arm as well as x86 based IoT devices.

Despite common references to “Yocto Linux,” Yocto Project is not a distribution, but rather a collection of open source templates, tools, and methods for creating custom embedded Linux-based systems. A Yocto foundation underlies most major commercial Linux distributions such as Wind River Linux and Mentor Embedded Linux and is often spun into custom builds by DIY developers, especially for resource constrained IoT devices.

We saw no mention of a contribution for the Arm-backed Linaro initiative for either Mbed Linux or Pelion. Linaro, which oversees the 96Boards project, develops open source embedded Linux and Android software components. The Yocto and Linaro projects were initially seen as rivals, but they have grown increasingly complementary. Linaro’s Arm toolchain can be used within Yocto Project, as well as with the related OpenEmbedded build environment and Bitbake build engine.

Developers can sign up for the limited number of invites to participate in the upcoming developer preview of Mbed Linux OS here.

Arm’s Pelion partnerships

Arm’s Pelion IoT Platform will soon run on devices with Intel’s recently launched Secure Device Onboard (SDO) service, enabling customers to deploy both Arm and x86 based systems controlled by the common Pelion platform. “We believe this collaboration is a big step forward for greater customer choice, fewer device SKUs, higher volume and velocity through IoT supply chains and lower deployment cost,” says Arm.

Intel’s Secure Device Onboard provisioning used within Pelion IoT Platform
(click image to enlarge)

 

The SDO “zero-touch onboarding service” depends on Intel Enhanced Privacy ID (EPID) data embedded in chips to validate and provision IoT devices automatically. SDO automatically discovers and provisions compliant devices during installation. This “late binding” approach reduces provisioning times from 20 minutes to an hour to a few minutes, says Intel.

Unlike PKI based authentication methods, “SDO does not insert Intel into the authentication path.” Instead, it brokers a rendezvous URL to the Intel SDO service where Intel EPID opens a private authentication channel between the device and the customer’s IoT platform.

Pelion device management conceptual diagram (from Arm’s Aug. announcement)
(click image to enlarge)

 

The Pelion IoT Platform offers its own scheme for provisioning and configuration of devices using cryptographic identities built into Cortex-M MCUs running Mbed. With the new Mbed Linux, Pelion will also be able to accept devices that run on Cortex-A chips with TrustZone security.

Pelion combines Arm’s Mbed Cloud connected Mbed IoT Device Management Platform with technologies it acquired via two 2018 acquisitions. The new Treasure Data unit supplies data management services to Pelion. Meanwhile, Stream Technologies provides Pelion managed gateway services for wireless technologies including cellular, LoRa, and satellite communications.

The partnership with myDevices extends Pelion support to devices that run myDevices’ new IoT in a Box turnkey IoT software for LoRa gateways and nodes. myDevices, which is known for its Linux- and Arduino-friendly Cayenne drag-and-drop IoT development and management platform, launched IoT in a Box to enable easy set up a LoRa gateway and LoRa sensor nodes. Different IoT in a Box versions target specific applications ranging from home and building management to storage lockers to refrigeration systems. Developers can try out Pelion services together with IoT in a Box for a new, $199 IoT Starter Kit.

The Arduino partnership is a bit less clear. It appears to extend Arm’s Pelion Connectivity Management stack, based on the Stream Technologies acquisition, to Arduino devices. The partnership gives users the option of selecting “competitive global data plans” for cellular service, says Arm.

More details on this and the other Pelion announcements should emerge at Arm TechCon in San Jose, Calif. and IoT Solution World Congress in Barcelona, both of which run Oct 16-18. Intel also offers a video overview of the Pelion/SDO mashup.

This article is copyright © 2018 Linux.com and was originally published here. It has been reproduced by this site with the permission of its owner. Please visit Linux.com for up-to-date news and articles about Linux and open source.

Source

Android Pie Is Filled with AI | Operating Systems

Artificial Intelligence plays a big role in Android 9, the latest version of Google’s mobile operating system, released Monday.

Called “Android Pie,” the OS is designed to learn from its users’ behavior, and apply those lessons to simplify and customize their phone experiences.

“From predicting your next task so you can jump right into the action you want to take, to prioritizing battery power for the apps you use most, to helping you disconnect from your phone at the end of the day, Android 9 adapts to your life and the ways you like to use your phone,” noted Sameer Samat, Google’s vice president of product management for Android and Google Play.

google's android 9 pie

Adaptive Brightness and Adaptive Battery are two ways Android Pie uses AI to customize and improve a phone’s performance.

Adaptive Brightness learns what brightness levels a user likes in certain conditions and automatically adjusts the display to those settings when those conditions arise.

Adaptive Battery plugs into Google’s DeepMind systems and can learn a person’s phone usage patterns and make adjustments to optimize power usage.

“Users of the Android P beta program on Google Pixel phones found a 20 percent increase in battery life,” said David McQueen, research director for consumer devices in the London offices of ABI Research, a technology advisory firm.

“Battery life has always been a major pain point for the smartphone user, so this implementation of AI will be welcome relief,” he told TechNewsWorld.

Seeing Will Be Believing

The power management feature works without adding additional hardware, McQueen pointed out.

Huawei introduced performance-enhancing AI in its Mate 10 Pro product, he said, but to do it, the company had to add a chip to the device, which it called a “neural processing unit.”

“There’s not much going on in terms of new battery technology that can lengthen battery life, so Adaptive Battery could be a good thing,” suggested William Stofega, program director for mobile phones and drones at
IDC, a market analysis company based in Framingham, Massachusetts.

The Adaptive Battery feature appears to be compelling, acknowledged Tuong Nguyen,
a senior principal analyst at Gartner, a research and advisory company
based in Stamford, Connecticut. However, he is withholding judgment on the feature until the verdict from users comes in.

“We see a lot of power optimization announcements, and I’m sure they work well enough,” Nguyen told TechNewsWorld, “but my perception as a consumer is that I can never stay sufficiently charged and am always using too much battery.”

Screen Slices

Another new addition to Android is App Actions. It makes connections between when and how you use apps and makes suggestions based on those connections. For example, it’s 5:15 p.m. on a Monday. App Action may ask if you want to open the e-book you’ve been reading on your commute to and from work for the past week.

Google also announced a feature for Android Pie called “Slices,” which won’t appear in the OS until later this fall.

Slices shows relevant information from apps depending on a user’s screen activity. So if a user started typing Lyft into Google Search, Slice would display a slice of the Lyft app with information such as prices to a destination and the ETA for a driver.

“Slices is great because it brings us a step closer to the post-app world,” Nguyen said.

“Instead of searching through a dozen of apps and individually opening them,” he continued, “the UI allows me to use them with fewer steps.”

Better Security

Android Pie also sports a new single home button for simpler navigation.

In addition, Android’s Overview feature has been redesigned to display full screen previews of recently used apps. It also now supports Smart Text Selection, providing action suggestions based on selected text.

Security has been beefed up in Android 9. It has an improved security model for biometrics. It uses a secure, dedicated chip to enable hardware security capabilities that protect sensitive data, such as credit card information.

Android 9 chooses the TLS protocol by default, as well as DNS over TLS, to help protect all Web communications and keep them private.

Multi-Camera and HEIF Support

Android’s photographic capabilities are expanded in Pie. It supports multiple cameras, which enables developers to access streams from a number of physical cameras simultaneously.

“Multi-camera support is a potentially cool feature because it impacts the trajectory of immersive augmented reality, mixed reality and virtual reality experiences,” Nguyen said.

“Anything that advances immersive is exciting for me, but it’s a long road, so don’t expect to see something with a super impact immediately,” he added. “It’s more of a building block for bigger things to come.”

Android Pie also supports a new image format, HEIF. The format provides better compression than the widely used JPEG format without a loss in quality. Apple has been using the format for awhile.

A common complaint among consumers is a lack of storage on phones, Nguyen noted.

“I’m not familiar with the technical details on HEIF, but I think all consumers can appreciate having more room because of better compression,” he said.

Fighting Phone Addiction

With concerns rising about how much time people spend with their phones, Google decided to add some time management features to Android Pie.

“While much of the time we spend on our phones is useful, many of us wish we could disconnect more easily and free up time for other things,” observed Google’s Samat.

“In fact, over 70 percent of people we talked to in our research said they want more help with this,” he added. “So we’ve been working to add key capabilities right into Android to help people achieve the balance with technology they’re looking for. ”

The new “digital well-being” features that will be added to Android Pie this fall include the following:

  • A Dashboard that helps users understand how they’re spending time on their devices;
  • An App Timer that lets an operator set time limits on apps and grays out the icon on their home screen when the time is up;
  • A Do Not Disturb mode, which silences all the visual interruptions that pop up on a screen; and
  • Wind Down, which switches on Night Light and Do Not Disturb and fades the screen to grayscale before bedtime.

While the new digital health features may be embraced by some users, they could be annoying to others.

“I can see things like Wind Down and app timers getting in the way,” IDC’s Stofega told TechNewsWorld. “I thiink people want to use their devices whenever and however they want.”

Possible Pain Points

For many Android users, all the goodies in the latest version of the OS are likely to remain out of their hands for some time, since Pie works only on Pixel models, and a few other phones that participated in the beta program for the software.

“It will be telling how quickly Android P is able to migrate to Samsung and Huawei smartphones, and then on to those that run Android One,” McQueen said.

Even for those who are able to get their hands on the new OS, there could be challenges.

“The issue always is how quickly will people be able to recognize some of these new features,” and whether these devices are “getting too complex for their own good,” Stofega said.

“These devices are becoming Swiss Army knife-like,” he remarked. “Device makers have to figure out and adjust to what people really need versus what’s technically possible.”

John P. Mello Jr. has been an ECT News Network reporter
since 2003. His areas of focus include cybersecurity, IT issues, privacy, e-commerce, social media, artificial intelligence, big data and consumer electronics. He has written and edited for numerous publications, including the Boston Business Journal, the
Boston Phoenix, Megapixel.Net and Government
Security News
. Email John.

Source

Top 5 Websites to Master Hacking With Kali Linux : For Beginners

Despite writing so many tutorials on hacking with Kali Linux, I often get stuck and have to consult other resources. My blog has a lot of things but since I myself don’t know everything, there’s no way I can provide all the resources that you guys need. Here’s a list of top 5 websites about hacking with Kali Linux that have enough resources to answer 99.9% of your queries, and have enough tutorials to teach you most of the stuff you need to know to get to a level where you can read the more complex stuff on any website.

5. Null Byte

Not dedicated to Kali, but to white hat hacking in general.

Advantages-

  • Lot of high quality content
  • Many content-creator / authors
  • Has a forum as well to ask questions
  • Active comments section

Disadvantages-

  • Not tailored to Kali
  • Navigation not very intuitive. Hard to find out stuff related to Kali.

4. Hacking-Tutorial

Very old website. Most websites in this list are fairly new, and probably didn’t write tutorials for backtrack (Kali is what came after Backtrack 5 r3, instead of backtrack 6). However, this website was around before the time of Backtrack 5 R1 (when the the display manager was not started by default, and we had to use startx command just to get a GUI).

Advantages-

  • Lot of high quality content
  • Mostly articles pertain to Kali Linux or Backtrack (the old posts). The backtrack ones will work with Kali without any changes in commands/procedure.
  • Only one author, so all posts are from one guy, means less low quality posts.

Disadvantages-

  • Design looks cluttered. Too many sharing widgets.
  • Only one author on this website, while it had it’s advantage, there are disadvantages too. There’s only so much good stuff one person can write.

3. Hacking Tutorials

Fairly new, pretty looking and frequently updated website.

Advantages-

  • The homepage is quite good and has posts organized by categories.
  • Content is high quality (I said this for every damn website I posted here, but then they made it to the list because of the high quality content).
  • Has many tutorials that you may not find on other websites (most sites have redundant tutorials, all the sites I’ve mentioned here will have a post about aircrack-ng, etc., but this site has some uncommon attacks and tools covered as well).

Disadvantages-

  • Not well organized content. You might end up reading something whose prerequisites you don’t know and you can’t understand what’s going on in the tutorial.
  • Some very long posts doing stuff no one gives a rats ass about. Basically, lots of unnecessary content. I guess that comes as a side effect of having uncommon tutorials that won’t be found on other websites. There’s a reason why they aren’t on most websites. It’s because no is interested in reading them.

2. Black More Ops

Not limited to Kali Linux, has a lot of hacking tutorials.

Advantages-

  • While it’s not limited to Kali, most of the content is focused on Kali
  • Again, lots of high quality content.
  • Navigation much easier

Disadvantages-

  • Some of the posts have nothing but a Youtube video, with no content to go along with it.
  • Some posts are news articles, instead of tutorials. Many people may not mind this, but some may.

1. Security Tube

This one has been around for ages too. However, it isn’t providing any new free content anymore (but there’s a lot of old content which is golden). The owner is now selling certified courses. (

the creator

is a badass, has written books, sells courses, discovered vulnerabilities and written attacks for WEP, etc.).

Advantages-

  • Gold mine of resources if you’re really interested in getting into hacking. No script kiddie stuff. The owner makes video tutorials and groups them up into megaprimers. Everything I know about wireless hacking I learnt from his wireless hacking megaprimer (the videos are free, the certification, if you want, will cost you).
  • I haven’t stressed this enough, no script kiddie stuff. He actually has two assembly language megaprimers (again, free of cost).

Disadvantages-

  • Megaprimers are in very old operating systems, mostly backtrack 5.
  • Lets be honest, not everyone wants to watch 10 hours of video to learn the intricacies of hacking. Some are happy using tools and not caring about why or how they work. Unless you want to pursue a career in security, knowing how to use the tools would often be enough.

Despite the disadvantages, it’s an awesome website. If you are really a security enthusiast, this is the go to site. All the other sites I’ve mentioned, as well as my blog, can’t give you the in depth knowledge you can get from there.

At last, I would stop pretending that I’m a selfless person who wants every one of his blog’s visitor to go to his competitor websites. The last item on the list, my own blog (yay!)-

Bonus : Kali Tutorials

My hobby blog. I am the main content creator. Over time, many have contributed. In one accident, all content by two of my friends was lost, and I become the sole author again. Recently, another author has joined in, and there’s two of us now, but I still have to do most of the posting.

Advantages-

  • Kali is our (mine really, but ours sounds so cool, almost like I have a team of authors) utmost priority. Only a few tutorials are there that aren’t related to Kali
  • Tried my best to make the navigation nice, and order the posts so that beginners can read them in order of difficulty.

Disadvantages-

  • Homepage sucks
  • I am the only person who replies to comments, and sometimes I can’t reply to all. So many queries go unanswered.
  • Site slow af.
  • Only two authors. The other author focuses on youtube videos so mainly it’s just me. So, not a lot of regular content.

PS: I’m looking for people who are willing to write content, mail me at admin@kalitutorials.net if you’re interested.
PPS: Would love to edit advantages/disadvantages based on comments (especially for my blog, since review of one’s own work is bound to be inaccurate and biased). Let me know how you feel. This article represents my personal views, and it’d be awesome to be able to incorporate a wider perspective on the basis of comments.

Source

AI combat arena ‘Gladiabots’ has enabled Linux support on Steam

No longer hidden behind a beta of Steam, AI combat arena Gladiabots from GFX47 is now officially supported on Steam for Linux. Do note, the game is still in Early Access.

If you love strategy games and feel like you want a little more control over unit AI, this might be the game for you. In Gladiabots you assemble a team of robots, design their AI with a handy drag and drop interface and attempt to beat another AI in battle. There’s decent tutorials, a campaign, cross-platform online play that doesn’t require you to be online at the same time and it’s really quite clever.

While the programming side of it is quite simple to look at, the features it offers can end up quite complex. It’s a system that hides complication behind an easy to understand interface so as to not scare you away. It also offers up a sandbox mode, so you can toy with the AI as much as you want which is very cool. Once you’ve got the hang of it, there’s even regular tournaments to get into too.

There’s certainly an interesting learning curve to it though, the challenges can be a little difficult requiring some creative thinking. I’ve spent quite a lot of time testing, tinkering and attempting to beat it and it becomes a hard game to put down. Getting your AI to do exactly what you want, with a number of conditions feels insanely satisfying.

For a look behind the scenes at what the developer is planning to add and fix, they have a public trello tracker to follow.

You can grab it from itch.io and Steam.

Source

Plane Theme and Icons Gives Your Desktop An Appearance Boost – NoobsLab

Another theme pack with icons for your Linux Desktop. Plane theme is designed to make desktop more elegant and simple, it goes very well along with its own icon pack. Now a days many themes are under development for Gnome and Plane is one of them, it is constantly updating since 2017, fixing and making theme look better. It has some parts from Arc and Adwaita themes, also some other themes inspired author to make Plane more eye catching.

There are two versions in this theme: light version and dark version which gives comfort to your eyes. This pack includes Gnome shell themes as well, which lets you match your Gnome shell with your Gtk theme.

Primarily, this pack targets Gnome Shell desktop but can be used on other desktops as well such as: Cinnamon, Xfce, Mate etc. Icons are designed to use with this theme pack but if you want then you can use them with any theme of your choice. Themes are available for Ubuntu 18.10/18.04 and Linux Mint 19 via our PPA. Icons available for Ubuntu 18.10/18.04/16.04/14.04/Linux Mint 19/18/17. If you find any kind of bug or problem with this theme pack then report it to author and it will get fixed in the next update.

Available for Ubuntu 18.10/18.04 Bionic/Linux Mint 19/and other Ubuntu derivatives
To install Plane themes in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal:
Available for Ubuntu 18.10/18.04 Bionic/16.04 Xenial/14.04 Trusty/Linux Mint 19/18/17/and other Ubuntu derivatives
To install Plane icons in Ubuntu/Linux Mint open Terminal (Press Ctrl+Alt+T) and copy the following commands in the Terminal:
That’s it

Source

WP2Social Auto Publish Powered By : XYZScripts.com