Архив метки: kernel

How to connect your Android device to your Linux desktop

Автор: | 22.05.2018

If you’re an Android and Linux user, you know well the frustration of not being able to connect those two together, especially given that Android makes use of so much of the Linux kernel. Out of the box, these two should easily communicate. They don’t. Fortunately, a lot of work has gone into making this… Читать далее »

How to resolve network problems caused by the Windows 10 April 2018 update

Автор: | 18.05.2018

The latest Microsoft Windows 10 (1803) update from April has the potential to cause problems with wireless network adapters, like lack of connectivity, as well as the failure to show any available networks. This update has been problematic in other ways, causing some PCs to enter a cycle of failed boots, and disabling critical pieces… Читать далее »

How to use the Linux screen command to keep your remote processes running

Автор: | 16.05.2018

How many times have you secure shelled into your data center Linux servers, only to have (for whatever reason) your remote secure shell connection broken? When you reconnect to that server, is that critical command you issued still running? Or did the severed connection put the kibosh on the command? Not only can this be… Читать далее »

How to set up Livepatch and the information gathering tool in Ubuntu 18.04

Автор: | 10.05.2018

Ubuntu Bionic Beaver is here and it brings along with it a number of very useful and shiny new features. Two of those features appear in the first-run wizard: One of which is Livepatch. With Livepatch up and running, many security-related updates, such as the kernel, will not require a reboot. For anyone that’s served… Читать далее »

IT: Patch these critical new vulnerabilities in Windows, Adobe, and OS kernels

Автор: | 09.05.2018

On Tuesday, Microsoft issued patches for two vulnerabilities presently being leveraged by hackers. The most pressing of these—CVE-2018-8174—is a vulnerability in the VBScript engine, which can be exploited with relative ease in a Microsoft Office document that uses an ActiveX control, as well as Internet Explorer (IE) and any other software using the Trident rendering… Читать далее »

Chromebooks: A cheat sheet — TechRepublic

Автор: | 08.05.2018

With every passing iteration of technology more and more of the things we use most move to the cloud. Google knows this, which is why it created products such as G Suite, which allow users to create, edit, and store documents online. Chrome, Google’s market-dominating web browser, has turned into an operating system that’s unique… Читать далее »

Hackers can bypass Windows Meltdown patch, and early builds may be at risk

Автор: | 04.05.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: A newly discovered flaw in the Windows 10 patches against Spectre and Meltdown renders them completely useless through the use of the NtCallEnclave command, which returns the full kernel page table directory. Microsoft fixed the flaw in the Windows 10 April 2018 Update… Читать далее »

How to install Packetfence on CentOS 7

Автор: | 04.05.2018

Image: Jack Wallen Eleven years ago, I managed to get Packetfence installed on a Linux machine. I remember it well, because at the time Packetfence was an absolute nightmare to get up and running. Succeeding at that task made me feel like I’d seriously accomplished something. Back then, I was installing on (are you ready… Читать далее »

How to monitor your Apache web server logs with log.io

Автор: | 02.05.2018

As a web server admin, one of your most important tasks is being able to easily monitor logs in real time. Having this ability can mean the difference between knowing what’s going right or wrong with your web servers, and how to resolve issues quickly. But for some admins, having to SSH into a server… Читать далее »

Windows shops be warned: New Internet Explorer bug lets hackers hijack your system

Автор: | 24.04.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: A Chinese cybersecurity firm has found a zero-day exploit in Internet Explorer that is already being used to infect machines through malicious Microsoft Office documents. Microsoft has yet to issue a response to the discovery, and until it patches the vulnerability IE users… Читать далее »