The creator of the Linux kernel and Git has said that security issues should be publicly disclosed, not swept under the rug where vendors can leave them unsolved for years. Read more at ZDNet News Source: Linux
Month: January 2015
Survey: IT Development, Operations Teams Really Do Deliver When Working Together
by
•One in four enterprises employs DevOps,and it’s making a difference in software delivery. Data security is a concern, however. Read more at ZDNet Linux Source: Linux
Managed Services & Hosting Summit 2015 announced
by
•Leading Vendors, Solution and Service Providers to meet in London in September 2015[London, 15 January 2015] IT Europa and Angel Business Communications announced today that they will jointly be staging the fifth annual UK Managed Services & Hosting Summit on 17 September 2015. The event will bring leading hardware and software vendors, hosting providers, telecommunications…
Why MariaDB Says MaxScale Will Make Life Easier for Developers and Admins
by
•With the availability of open-source MaxScale, database firm MariaDB thinks the middleware will have a big impact on developers and database admins. Read more at ZDNet News Source: Linux
IGEL presents the UD6 thin client with quad core processor for high-performance computing
by
•The IGEL UD6 expands the range of applications for thin client computing to CAD applications, unified communication, film editing and big data visualizationReading, UK. January 15, 2015 – IGEL Technology unveiled its newest and most powerful thin client today. The IGEL UD6 comes with Intel Celeron quad core processors offering speeds of up to 2.42…
Microsoft Migration Tool Enables Linux Workloads to Move to Azure
by
•Microsoft is now enabling testers of its Migration Accelerator tool to move Linux physical and virtual workloads more easily to Azure. Read more at ZDNet News Source: Linux
alpaca-variant-caller 0.3.1
by
•ALPACA is a single nucleotide variant caller for next-generation sequencing data, providing intuitive control over the false discovery rate with generic sample filtering scenarios, leveraging OpenCL on CPU, GPU or any coprocessor to speed up calculations and an using HDF5 based persistent storage for iterative refinement of analyses within seconds. Often, variant calling entails filtering…
Ubuntu: 2468-1: Linux kernel vulnerabilities
by
•Software Description: – linux: Linux kernel Details: A null pointer dereference flaw was discovered in the the Linux kernel’s SCTP implementation when ASCONF is used. A remote attacker could exploit this flaw to cause a denial of service via a malformed INIT chunk. Source: Tech
Top 5 open source project management tools in 2015
by
•Last year, I covered five of the best open source project management tools , like ProjectLibre and OpenProject. The article struck a chord with readers and continues to prove valuable. Source: Tech
pwntools – CTF Framework & Exploit Development Library
by
•Written in Python, it is designed for rapid prototyping and development, and intended to make exploit writing as simple as possible. from pwn import * context r = remote # EXPLOIT CODE GOES HERE r.send )) r.interactive() pwntools is best supported on Ubuntu 12.04 and 14.04, but most functionality should work on any Posix-like distribution…