Linux Today – Install and Configure Webmin on your Ubuntu System

Oct 16, 2018, 08:00 (0 Talkback[s])

(Other stories by Karim Buzdar)

The Webmin console is your answer to on-the-fly management of Linux as an administrator. You can use any web browser to setup user accounts, Apache, DNS, file sharing, and much more. In this article, we will describe a step-by-step installation of Webmin on your Ubuntu system.

Complete Story

Related Stories:

Source

Download KDE Plasma Linux 5.12.7 LTS

KDE Plasma (formerly K Desktop Environment and KDE Software Compilation and KDE Plasma Workspace and Applications) is an open source project comprised of numerous packages, libraries and applications designed to provide a modern graphical desktop environment for Linux and UNIX-like workstations.

A beautiful, modern and traditional desktop environment

It combines ease-of-use, superior graphical design and powerful functionality with the unique features and architecture of the Linux operating system. It’s comprised of the KDE Plasma Workspaces and KDE Applications components.

Additionally, it contains extra add-on for the panel and desktop, a download manager, an instant messenger, an addressbook, a document viewer, a multimedia layer called Phonon (similar to GStreamer on GNOME), and accessibility functionality, such as a powerful text-to-speech system.

Numerous GNU/Linux distributions use KDE

Numerous modern Linux distributions are built around the KDE desktop environment, either using it as their main computing environment or as an alternate one. Just like in the GNOME desktop environment, KDE tries to keep the same look and feel across all of its default applications. The entire KDE project is written with the Qt toolkit.

Under the hood

Under the hood, the KDE Plasma project is comprised of many core libraries that form KDE Frameworks and are required by all applications, various runtime components that ensure the proper functionality of the included apps, the applications, and the actual user environment.

Comes pre-loaded with apps for daily tasks

Users will find at least one application for each common task, including emailing, web browsing, news reading, painting, image viewing, video and music playback, and many more.

It also includes a collection of basic utilities, such as a calculator or archive manager, various scientific and educational applications, packages that contain extra themes, icons, wallpapers, window decorations and screensavers, some system administration tools, bindings for well known programming languages, and many games.

Bottom line

It is one of the first and best desktop environments for Linux distributions. During the last couple of years, KDE proved to be a very mature, reliable and stable project, backed by a talented community.

KDE dekstop Desktop environment Window manager KDE Dekstop Environment WM

Source

Trojans and RansomWare explained in light of WannaCry RansomWare

Over the past week, around 200,000 systems are believed to have been hacked by wannacry ransomware. Let’s start with some background first, and then move into the details-

Trojans

Before you know what Ransomeware is, it’s important to know what trojans are. We can broadly classify malicious computer programs into 2 categories-

  1. Spread wildly and attack destructively
  2. Spread surgically and attack covertly

The first category comprises the typical viruses that infect your computers, get inside your USB, copy themselves to every avenue they can. They slow down your computer, limit it’s functionality, and in general, make a lot of changes that make them easy to detect. These, in general, serve no particular useful purpose for the writer of the malicious code, other than perhaps giving them the lulz or maybe some sense of accomplishment. Also, once spread, there is very limited amount (or none at all) amount of control that the writer of the malicious code has on it’s actions.

The second ones are the precisely crafted viruses called trojans. These hide behind legitimate files, spread only through very few avenues as seen fit by their programmer. Let me make this point a bit clearer-

  1. Most viruses would copy themselves to all devices attached to the infected system, try to spread via the network, internet etc. from the infected system.
  2. Trojans will not automatically copy themselves. They will stay hidden and inactive.

As with everything else, the means of spread of trojan is also precise. The malicious code writer will hide them behind a legitimate file, and then spread this file using social networks, spam mails, etc. This way, only those computers will get infected that the attacker wants to infect.

What are some examples of trojans-

  1. Remote Administration Tools (RATs) – These are trojans which, when installed on the system, silently position themselves in such a way that they allow the attacker to control the system remotely. This means that the attacker can browser all your files, read all your data, see what you’re typing (hence get all your accounts and passwords), get a live feed of your screen, and access your webcam. As you can clearly see, as opposed to other viruses, trojans have specific use for the malicious author. He now controls the infected computer.
  2. Botnet – This is a special use of a freely spreading trojan whose purpose is to infect as many computers as possible with a RAT like functionality but less control on who gets infected. This reduced control and increase rate of spreading is important because of the purpose of a botnet. Botnet is basically a large network of infected computers which the attacker uses to do his bidding. They are often used to carry out DDOS attacks. Suppose the trojan spread to 1000 computers (a very small number, there are HUGE botnets out there). The attacker can then use these 1000 computers to simultaneously attack websites and take them down. Another use for botnets is bitcoin mining.

Recently, a new use for trojans has been seen-

Ransomware

If you have been paying attention so far, you’ll notice that once infected by a trojan, a computer’s files are under control of the attacker. That means he can easily say- “Give me money or I’ll delete all your files”. Unfortunately for the attacker, once the victim sees this message, the trojan is no longer covert. The victim may install an antivirus, backup his important data to the cloud/ external storage media/ USB, etc.

So, the attacker needs to do something which is equivalent to deleting, but reversible. Also, the reverse procedure should require the consent of the attacker. There is one solution – Encryption. If you know what encryption is, then you should see by now what’s up. Otherwise, here’s a simpler explanation (though not entirely accurate)-

What the attacker can do is similar to what happens when you find a compressed archive with a password. If you know the password, you can uncompress the archive, otherwise not. So, the attacker will take all files except the System files (without which your computer won’t work), put them into a compressed archive with a secure password, and then delete the uncompressed files.

Once he’s done with compressing (encrypting really) everything, he’ll inform you about what just happened, and tell you to pay him a certain amount in bitcoins in exchange for the password of the compressed archive (i.e. the decryption key). If you don’t pay up, he will delete the compressed archive and your data will be lost forever. Even if you manage to remove the ransomware after it announces it’s presence, it’s a bit too late. You avert the possibility of data deletion but that doesn’t mean that you can now get your data back. You still don’t know the decryption key, and unless there’s a cryptographic flaw/weakness in the encryption scheme used by the attacker (basically weak password is used), it’s almost impossible to find the key and decrypt the data.

What’s special about WannaCry?

So while there have been ransomware around for quite some time, this one has spread to epic proportions. Why?

NSA, Shadow Brokers and EternalBlue

The credit for this goes to NSA for discovering the EternalBlue exploit and Shadow Brokers for releasing it to the public. I won’t delve into further details of this, but EternalBlue exploit can hack any Windows machine which didn’t have the patch for it. What does that mean?

The standard Windows security update on 14 March 2017 resolved the issue via security update MS17-010, for all currently supported Windows versions.

“The issue” referring to the vulnerability. However, many systems have automatic updates disabled and didn’t have the patch. All these machines were vulnerable to this attack. Considering how often people end up disabling automatic updates (because they’re annoying), you can imagine the scale of the EternalBlue exploit. This is the reason why this particular ransomware was able to spread so quickly.

WannaCry

At this point, you already have enough background necessary to understand what WannaCry is, on your own. You know it’s a ransomware, and you know it uses EternalBlue to infect computers. The details can be seen n the pic below-

  1. Files have been encrypted
  2. You need to pay $300 via bitcoin
  3. If you don’t pay within 3 days, you need to pay $600
  4. If you don’t pay in a week, all files will be deleted permanently.

This is it for this article.

Suggested reading :

https://www.malwaretech.com/2017/05/how-to-accidentally-stop-a-global-cyber-attacks.html

– This guy slowed down the spread of the ransomware by registering a domain which he felt was suspiciously present in the source code. His diligence saved people a lot of money and hassle. (Oversimplified summary, please read post for more accurate analysis)

Source

The Always-On App: Fighting Application Downtime to Keep Your Business Moving

Share with friends and colleagues on social media

    Nine to five may be the hours you spend in your office (if you’re lucky), but it no longer describes a business workday. That’s because today’s organizations don’t close at night. Applications that power actions as diverse and common as mobile banking, ride sharing, flight booking, online shopping and invoice inquiries can’t shut down at 5 p.m. That means application downtime—whether planned or unplanned—can cost your organization money, time and resources. When it comes to ensuring a good customer experience, then, and maintaining the health of your business, application downtime is the enemy.

    Unfortunately, at first glance, solving issues of application downtime can be daunting. Applications rely on so many moving parts, from server hardware to networking components to software services. Yelling at an application vendor won’t help. But working with SUSE probably can. That’s because SUSE provides the foundation of enterprise infrastructure. Solving issues of application downtime is just part of what it takes to become a nonstop IT shop, a goal we’re helping organizations with every day.

    You can’t address application downtime without looking at your infrastructure holistically. Traditionally, different pieces of hardware (servers, switches, disk arrays, etc.) have limited what your infrastructure can do. These pieces have always been connected, but they had to be managed individually, which has never given IT departments the control they want. Today, more and more functionality is happening in the software. This software-defined infrastructure (SDI) approach acknowledges the connections in your data centers—and gives you the tools to manage them.

    At SUSE, we believe that a move to SDI can best help organizations tackle the availability and access demands they face today. We’ve long believed that making software more reliable, flexible and easier to manage makes it better at supporting the applications that run your business. Our SDI solutions enable IT to drive innovation with greater agility, easier automation and reduced costs. They offer flexibility and efficiency so you can improve time to market while ensuring service availability. All so that customers and employees can access applications any time they need them.

    One of the pieces of our software-defined infrastructure approach is SUSE® Linux Enterprise Live Patching. It allows you to apply critical kernel patches without interrupting the operating system for even a second. In the world of application availability, that’s huge. You can keep your operating system up to date for security purposes without interrupting the apps you rely on.

    Just as important is ensuring that your servers are arranged in resilient clusters to help ensure availability. SUSE Linux Enterprise High Availability Extension and Geo Clustering for SUSE Linux Enterprise High Availability Extension can do just that. By building server clusters with automated failover, you create a rock-solid foundation for your applications, so a small issue in one server is unnoticed by your apps or the people who rely on them. By linking those clusters across long distances using rules-based failovers, you further insulate yourself from regional disasters and other issues. Ciclum Farma, the Portuguese drug manufacturer, achieved 100 percent uptime for its mission-critical SAP solutions using the SUSE high-availability tool.

    Your customers and employees are out there relying on your services day in and day out. Your applications must be available to them. Luckily, with a software-defined infrastructure approach powered by SUSE, you can build a solid foundation for all the moving parts that keep applications available. And that reliability means that even though your apps can’t work only a 9 to 5, maybe your IT team can.

    Check out SUSE’s solutions for Business Critical computing @ https://www.suse.com/programs/business-critical/ .

    Jeff.Reser@suse.com

    @JeffReserNC

    Share with friends and colleagues on social media

      Source

      It’s a Command Line Showdown – Red Hat Enterprise Linux Blog

      Nearly a year ago, Casey Stegman and I wrote a short blog on how we had (big) plans to “change up our marketing approach”… and how it might involve comic books. We also shared our new marketing mantra: Listen. Learn. Build. Well, I have some great news. We listened, we learned, we built—and today I’d like to share.

      Listening

      In the latter half of 2017 we took our show on the road. After that fateful encounter in Austin—where we learned that some developers just want the operating system to “get out of the way”—we knew there was an ocean of knowledge and experiences to learn from. From Cape Cod (Flock 2017) to Prague (Open Source Summit Europe 2017) to Las Vegas (AWS re:Invent 2017) to San Francisco (Red Hat Summit 2018), we spoke with literally hundreds of passionate problem solvers. We also had a blast discovering people’s various superpowers and illustrating them as the (command line) heroes / heroines that they are. Some folks you may recognize:

      @mrry550 @tbyeaton & @seattledawson@fatherlinux

      Learning

      From these interviews we learned a lot about the challenges that developers, admins, and architects are facing. We learned that while many people are struggling with technical challenges, from embracing containers and re-architecting for hybrid cloud, others are facing equally impressive turbulence as they adopt agile development practices and DevOps workflows. Fun fact here: We also learned a lot about our heroes / heroines “origin stories.” While many got their start via some form of video game (Colossal Cave Adventure anyone?) others were given early access to various bits of hardware (think: “my father brought home this crazy machine”) and began their journey from there.

      Building

      What did we do with all of this newfound knowledge and information? We built. Specifically, a podcast, called Command Line Heroes, which we debuted earlier this year. It’s a podcast about the people who transform technology from the command line up. We found a successful formula by taking the stories we heard, digging into some additional research, and diving deep into everything from

      If you’ve been living in a (colossal) cave and have yet to subscribe to the podcast, it’s not too late! Command Line Heroes is available wherever you download / access podcasts today.

      We’re not done!

      More good news? We’re not done. As the fall event season approaches here in North America we plan to get back on the road. In August we’ll be in Boston at DevConf.us and then north of the border for Open Source Summit North America 2018. If you have plans to attend either event, find us—we’d love to hear more about your story.

      But if you’re not traveling, here’s another way you can help us listen, learn, and build. We’ve designed a showdown of sorts. In fact, it’s a Command Line Showdown.

      As we ramp up towards celebrating System Administrator Appreciation Day on Friday, July 27th, we’re going to pit various commands against each other and allow y’all to help us find “the most useful Linux command.” Quick note: The set of commands we chose was sourced from conversations with you at some of the aforementioned events. Of course, we couldn’t include them all, but if this takes off we can definitely look to a future with more polls, more commands, and bigger showdowns.

      So get voting! But also don’t be shy (we know you won’t be) about giving us your feedback.

      One final note. We’re hard at work on a season 2 of Command Line Heroes. And if you’d love to influence its direction, but can’t come to any of the events we’re attending, vote in “the showdown” or email us your thoughts (commandlineheroes@redhat.com). If all else fails, subscribe to the podcast and stay tuned for more news soon.

      Source

      Phoenicis PlayOnLinux 5 Alpha Release


      Finally after several years of waiting, PlayOnLinux developers released the first Alpha version of PlayOnLinux 5

      https://www.playonlinux.com/en/comments-1354.html
      Installers:

      https://repository.playonlinux.com/PlayOnLinux/5.0.0-alpha1
      Unfortunately they are scripting games from scratch, which means there are currently 135 supported Games/Installers (scripts)

      Report bugs here:

      https://github.com/PhoenicisOrg/phoenicis/issues
      They changed the names of the tabs so now we have:

      • Library
      • Apps
      • Containers
      • Engines
      • Installations
      • Settings

      Library Tab
      Is kind of confusing, specially with no games installed. It must be where the shortcuts will reside once you install something?

      Apps Tab
      This is where you can search their repository of scripted installers… or Games. Similar to clicking Install in POL4

      Containers Tab
      Shows you all of your wineprefixes and allows you to modify them like with Configure in POL4

      They removed the “run a shell command line” in the virtual drive which prevents installing winetricks and ability to install other dependencies like:

      • vcrun2015
      • dotnet 4.5 or 4.6

      Engine Tab
      Where you can choose a version of Wine to install. The only reason you would want to do this is to test the script installed game with another version of Wine. I would think the script would be updated to newer versions as game/client updates break the script…

      Installations Tab
      Appears to show current script installations that are in progress. I’m guessing it will be blank when all of your games are done installing.

      Settings Tab
      Allows you to change graphical settings in Phoenicis and Network, Repository, File Association settings. Not all features are available yet.

      I tried installing Dark Forces and there was very little feedback that anything was happening. After about 2 minutes the Steam installation began.

      There was a Steam error and after clicking “OK” nothing happened. There was a pending installation in the Installations Tab, but my only option was to “cancel”
      Then it disappeared.

      Side Note:

      • No manual installation to test your non-listed programs
      • Most of the GUI is just like PlayOnLinux 4 wrapped in new Java graphics.
      • All of the icons are re-used from PlayOnLinux 4
      • I don’t see a debug option anywhere
      • I don’t see any arguments for additional commands to run in the game console
      • No Components installations for manual testing of non-listed programs
      • No way to switch Wine versions on a Container (Installed Virtual Drive)

      Source

      Crime Cities Guide | GamersOnLinux


      crimecities91.jpg

      Roam the cities of the future and take out criminals as a Mercenary of the Law. Take contracts for the police and upgrade your weapons & vehicle to eliminate growing threat of gangsters. Explore huge cities of skyscrapers and roam freely among busy public traffic.

      crimecities83.jpg

      Follow my step-by-step guide on installing, configuring and optimizing Crime Cities in Linux with PlayOnLinux.

      Note: This guide applies to the Retail version of Crime Cities. Other versions may require additional steps.Tips & Specs:
      To learn more about PlayOnLinux and Wine configuration, see the online manual: PlayOnLinux Explained

      Mint 18.3 64-bit

      PlayOnLinux: 4.2.12
      Wine: 3.0

      Wine Installation
      Click Tools

      Select “Manage Wine Versions”
      wine01.png

      Look for the Wine Version: 3.0

      Select it
      Click the arrow pointing to the right
      wine02.png

      Click Next

      Downloading Wine

      wine04.png

      Extracting

      Downloading Gecko

      wine05.png

      Installed

      wine06.png

      Wine 3.0 is installed and you can close this window

      Copy Disk Data
      Create a new folder on your Desktop

      Enter Disk 1
      Copy all the data from Disk 1 to the new folder
      Eject Disk 1 (right-click icon on Desktop, slect eject)
      Enter Disk 2
      Copy all data to new folder
      crimecities01.png

      !IMPORTANT!
      Leave Disk 2 in the drive

      PlayOnLinux Setup
      Launch PlayOnLinux

      Click Install
      crimecities02.png

      Click “Install a non-listed program”

      crimecities03.png

      Select “Install a program in a new virtual drive”

      Click Next
      crimecities04.png

      Name the virtual drive: crimecities

      Click Next
      crimecities05.png

      Check all three options:

      • Use another version of Wine
      • Configure Wine
      • Install some libraries

      Click Next
      crimecities06.png

      Select Wine 3.0

      Click Next
      crimecities07.png

      Select “32 bits windows installation”

      Click Next
      crimecities08.png

      Wine ConfigurationApplications Tab
      Windows version: Windows XP

      Click apply
      crimecities09.png

      Graphics Tab
      Check “Automatically capture the mouse in full-screen windows”

      Click OK
      crimecities10.png

      PlayOnLinux Packages (DLLs, Libraries, Components)

      Check the following:

      • POL_Install_corefonts
      • POL_Install_d3dx9
      • POL_Install_tahoma

      Click Next
      crimecities11.png

      Note: All packages should automatically download and install
      Click “Select another file”

      Click Next
      crimecities12.png

      Click Browse

      Navigate to the new folder on your Desktop

      Select “Setup.exe”
      Click Open
      crimecities14.png

      Click Next again…

      Click Next

      crimecities16.png

      Check “I Agree”

      Click Next
      crimecities17.png

      Click Next

      crimecities18.png

      Click Next to install

      crimecities19.png

      • Uncheck “Create Desktop Shortcut”
      • Uncheck “View the readme.txt file”
      • Check “Install Intel Indeo(r) 5.0 (required for movies)
      • Uncheck “Install DirectX 9.0

      Click Finish

      crimecities20.png

      Click No

      crimecities21.png

      Click Next

      crimecities22.png

      Note: Indeo installation might crash or error, but it still installs
      Click Exit

      crimecities23.png

      PlayOnLinux Shortcut
      Select “CrimeCities.exe”

      Click Next
      crimecities24.png

      Name the shortcut: Crime Cities

      Click Next
      crimecities25.png

      Check “I don’t want to make another shortcut”

      Click Next
      crimecities26.png

      PlayOnLinux Configure
      Back to PlayOnLinux

      Select “Crime Cities”
      Click Configure
      crimecities27.png

      General Tab
      Wine version: 3.0

      crimecities28.png

      Note: Click the down-arrow to select other versions of Wine. Click the + to download other versions of WineDisplay Tab
      Video memory size: enter the amount of memory your video card/chip uses

      crimecities29.png

      CD Audio Hack
      Before we launch Crime Cities we need to remove the CD audio bug

      Otherwise the game with hang at loading the first level

      Nagivate to Crime Cities install folder

      Full Path:

      Code:

      /home/username/.PlayOnLinux/wineprefix/crimecities/drive_c/Program Files/Strategy First/ Crime Cities/Scripts/
      Rename cd.scr
      to cd.scr-old
      crimecities32.png

      Launch Crime Cities
      Back to PlayOnLinux

      Select “Crime Cities”
      Click Run
      crimecities30.png

      Note: Click Debug to see errors
      Launcher

      Select Video Tab

      Adjust:

      • Resolution
      • Windowed Mode
      • Visibility range
      • Disable Fog
      • Disable Extra Flares
      • Texture Quality
      • Low Video Quality
      • Use Texture Compression If Available

      Click Start
      crimecities31.png

      Conclusion:
      After I figured out how to avoid the CD Audio crash Crime Cities ran perfectly. It a very old game and should run great on just about any laptop or netbook. Unfortunately if you do not have a DVD ROM drive, you won’t be able to play it, but you can always purchase Crime Cities on GOG.com

      I was surprised that Crime Cities supported 1920×1080 resolution. That is impressive for an old game.

      Gameplay Video:

      Screenshots:crimecities80.jpg

      crimecities81.jpg

      crimecities87.jpg

      crimecities86.jpg

      crimecities89.jpg

      crimecities90.jpg

      crimecities97.jpg

      Source

      KDE Plasma 5.14 Released – Slashdot

      binspamdupenotthebestofftopicslownewsdaystalestupid
      freshfunnyinsightfulinterestingmaybe
      descriptive

      103369556
      story

      KDE

      Unix

      GUI

      Open Source

      Software

      Linux

      KDE Plasma 5.14 Released (kde.org)

      Posted
      by

      BeauHD

      on Tuesday October 09, 2018 @07:30PM

      from the come-and-get-it dept.

      jrepin

      writes:

      KDE has released Plasma 5.14 desktop. Among many other things, Plasma 5.14 simplifies managing multiple displays thanks to its new Display Configuration widget; Global Menus a la macOS now work also with GTK applications like GIMP; a new safeguard feature warns you if other users are logged in when you log out; and Discover now lets you install Snaps from all available channels (not just the default), orders software by release date, and shows package dependencies.

      Downloads can be found

      here

      .

      Regardless of whether a mission expands or contracts, administrative
      overhead continues to grow at a steady rate.

      Working…

      Source

      Cultist Simulator has a free update out now along with The Dancer DLC

      Developed Weather Factory, some of the same people responsible for Fallen London and Sunless Sea, have pushed out a good free update for Cultist Simulator along with the first DLC.

      See Also: Scaine’s original review of Cultist Simulator who said it’s “like nothing you’ve probably ever seen before”.

      I have to agree with what Scaine said about it, the game is truly unique and while very interesting it can be difficult to get into and quite confusing at the start. It’s also a strange game to try and describe! A single-player tabletop card game with you dragging cards around and slotting them into actions to progress through it.

      Even with the starting confusion, it’s certainly a game that managed to pull in my entire undivided attention in a way that not many games are able to. That’s thanks to the excellent writing, the atmosphere and the many options you’re presented with to further whatever goal you desire. It’s a brilliantly addictive game.

      Here’s what’s in the free update out today:

      • Wounds and scars: Followers now learn from their mistakes. It’s much safer to send them on Expeditions, and though they’ll still die if they injured enough.
      • Follower romance: what could go wrong with workplace relationships when your office is an occult society dedicated to bringing the apocalypse? Court your cultists and date your disciples. It probably won’t end disastrously.
      • Rebellion and rivals: mistreating acolytes now risks turning them against you and attempting to win the game faster than you can.
      • Quality of life updates: a smorgasbord of UI/UX improvements based on feedback since launch. Snap-to-grid cards, double-click card placement, intelligent card stacking… now nobody should get RSI. Yay!

      As for the The Dancer DLC, it includes:

      • One new Legacy (AKA starting character): rise to unearthly fame as the Dancer, employed at the infamous Gaiety Theatre, Ecdysis Club or in some of the more exclusive city parlours.
      • Two new Ascensions (AKA ways to win): explore a trinity of insights into the powers of Heart, Moth, and those who came before. Realise your true form, and perhaps even tempt one of the enigmatic Ligeians to the Dance.
      • Animal spirit-selves (AKA why would you not want to go on holiday as a boar): some dances can only be performed in far places, and some cannot be performed in human shape.

      You can pick up Cultist Simulator on Humble Store (DLC link), GOG (DLC link) and Steam (DLC link).

      Source

      WP2Social Auto Publish Powered By : XYZScripts.com