Open-source News

Linux 6.3 Features Expected From AMD Auto IBRS To Pluton CRB TPM2 & Dropping Old Code

Phoronix - Mon, 01/23/2023 - 21:00
There still is another month to go until the Linux 6.2 kernel is released as stable and in turn kicking off the Linux 6.3 merge window. But from my monitoring in recent weeks, here is an early preview of some of the material expected for the v6.3 kernel based on what's been queuing in the various subsystem "-next" branches or otherwise looking like it should align for the next cycle...

Running The macOS-Inspired, FreeBSD-Powered helloSystem v0.8 On AMD Zen 4

Phoronix - Mon, 01/23/2023 - 20:00
With this weekend's release of helloSystem 0.8 as a macOS-inspired open-source desktop OS built atop FreeBSD, I decided to try out this new release on an AMD Ryzen 9 7950X desktop to see how it would go.

Arm Cortex-M85 Enablement Makes It Into GCC 13 With PACBTI Support

Phoronix - Mon, 01/23/2023 - 19:25
The Armv8.1-M based Cortex-M85 processor support has made it into the GCC 13 compiler for this highest performing Cortex-M processor use for MCUs and embedded applications...

Fwupd 1.8.10 Released With New Hardware Support, Faster Startup On ChromeOS

Phoronix - Mon, 01/23/2023 - 18:58
Fwupd 1.8.10 is out this morning to kickoff a new week and continuing to enhance the open-source firmware updating support on Linux systems...

Linux Engineer - IT-Online

Google News - Mon, 01/23/2023 - 16:00
Linux Engineer  IT-Online

Create your own website with Joomla!, an open source CMS

opensource.com - Mon, 01/23/2023 - 16:00
Create your own website with Joomla!, an open source CMS Shane Barker Mon, 01/23/2023 - 03:00

Joomla! is among the leading open source content management systems (CMS) for publishing web content. It's user friendly, accessible, extensible, responsive, and multilingual. What's more, it's also search engine optimized. No wonder Joomla! has a 3.5% share of the content management system market.

In this article, I'll introduce you to Joomla! and why I think it's an excellent choice for your website or online application.

Joomla! is open source

A CMS software application lets you build and manage a website without coding. In fact, you can use a CMS even if you don't know how to code at all. You can quickly create, modify, manage, and publish content with a good CMS. You can also customize the design and functionality of the website by using several pre-built templates and extensions. If you're looking to set up a site for e-commerce, for example, Joomla! is one of the easiest options available.

Here are a few features:

  • Content Management: Create and publish content through a simple web interface.
  • User Management: Create user accounts with varying levels of authority so that any number of people can contribute or help maintain your site.
  • Media Manager: Enables users to upload media to the site through the web interface.
  • Templates: Change the look of your site. Templates are available from many third-party sources and are easy to apply.
  • Banner Management: Use standardized banners to advertise special deals or upcoming events to site visitors.
  • RSS: Allows visitors to subscribe to your website and get updates when you publish new content.
Joomla! Extensions Directory (JED)

The Joomla! Extensions Directory (JED) is a neatly organized directory of Joomla! extensions. It's the official Joomla! website that lets you explore hundreds of extensions available as plug-ins, modules, and components.

All extensions on the website are organized by category and rating and include user reviews. This also makes it easy for you to compare different extensions before starting. Additionally, you can search the JED by keyword, category, tag, or simply browse to explore the various options.

Each category is notated with the number of available extensions in it. Hover your mouse over an individual category to see a list of subcategories to refine your search.

Image by:

(Ryan Johnson, CC BY-SA 4.0)

Install Joomla!

The first step is installing Joomla! There are several ways you can go about this.

If you want to launch your website within minutes, you can use Joomla! online. However, this process has certain limitations. You must renew your website every 30 days to keep it available. This feature is often used for demonstrations or to try Joomla! and is not preferred for a permanent website.

The second option is a manual installation. This choice encompasses downloading Joomla! for free and then using it on your web host's server. This process requires you to perform the following steps:

  • Create an SQL database for your website.
  • Upload all the Joomla! files to your website's root directory.
  • Run the Joomla! configuration wizard, available at your site's URL.
  • Once complete, configure the database.
  • Install the sample data and configure your email.
Image by:

(Ryan Johnson, CC BY-SA 4.0)

Create content on Joomla!

After the installation, access your Joomla! website by logging in with your admin credentials. Once you log in, you're directed to your website's control panel.

Image by:

(Ryan Johnson, CC BY-SA 4.0)

This process probably feels familiar if you've used WordPress, Drupal, or a similar CMS. Click the New Article link in the control panel to get started posting content. This opens an editor where you can compose an article.

Image by:

(Ryan Johnson, CC BY-SA 4.0)

You can write the content in the main window and use the options available in the above rows to format and edit the text, add new elements, add links to the content, and so on.

Once you've written your article, you can save and publish it to the website. And to do that, you must return to the control panel and look at the options on the right-hand side. You can assign the article a category, add some tags, and determine its visibility levels. Finally, click the Save button, and view the article on your website.

Add extensions to your website

The next step entails expanding the site's functionality by adding Joomla! extensions. Extensions are collections of code you can install on your website to enjoy additional features. With these extensions, even new developers can launch a fully functional Joomla! website with ease.

The Joomla! Extensions Directory offers various categories, enabling you to choose from several extensions.

Image by:

(Ryan Johnson, CC BY-SA 4.0)

Once you've chosen a specific extension, click on it to open its main page. This main page offers additional information and provides a download link. You can click on the link and save the extension to your computer. To install it on your site, return to the control panel and click the Install Extensions link on the left.

Image by:

(Ryan Johnson, CC BY-SA 4.0)

Clicking on this button takes you to the Extensions page.

Image by:

(Ryan Johnson, CC BY-SA 4.0)

Drag and drop the ZIP file containing the extension onto the page. Alternatively, you can click on the Or browse for file button. Once you have downloaded and installed the extension, you can configure it and use it to enhance your site's functionality.

More open source alternatives Open source project management tools Trello alternatives Linux video editors Open source alternatives to Photoshop List of open source alternatives Latest articles about open source alternatives Use templates to change your website's appearance

Joomla! websites have a standardized look and feel. However, you can change this appearance by using smart Joomla! templates. These templates modify the appearance and layout of your site. Just like extensions, there are lots of templates to choose from. Joomla! lets you use more than one template on your site.

Once you have chosen a template for your site, download it as a ZIP file. To install it, return to your site's control panel and install the new template just like you installed an extension: Drag and drop the template's ZIP file or select it from a file chooser.

Clicking on the Templates button in the control panel takes you to the template manager. This screen displays all installed templates, and it's here that you can change between templates.

Wrap up

Joomla! is an excellent and user-friendly CMS platform that lets you easily build a powerful website. The platform is relatively straightforward to get started, and it has plenty of documentation. There's also an active Joomla! community that can help you along the way. If you're thinking of starting a website, try Joomla!

Get to know the many features of the Joomla! open source content management system.

Image by:

Opensource.com

Alternatives What to read next This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License. Register or Login to post a comment.

3 predictions for open source in confidential computing

opensource.com - Mon, 01/23/2023 - 16:00
3 predictions for open source in confidential computing Dpal Mon, 01/23/2023 - 03:00

It's a new year, which means it's time to predict what the next year will bring regarding future tech trends. After guessing the World Cup champion, I feel confident sharing my personal perspective on the confidential computing market in the near future.

What is confidential computing?

Confidential computing is the practice of isolating sensitive data and the techniques used to process it. This is as important on your laptop, where your data must be isolated from other applications, as it is on the cloud, where your data must be isolated from thousands of other containers and user accounts. As you can imagine, open source is a significant component for ensuring that what you believe is confidential is actually confidential. This is because security teams can audit the code of an open source project.

Confidential computing is a big space. When I talk about confidential computing, I first think of workloads running inside trusted execution environments (TEE). There are several categories of such workloads:

  • Off-the-shelf products provided by a vendor
  • Products built by a third party that need to be adapted and integrated into the customer environment
  • Applications built and run by companies in support of their business
Off-the-shelf security products

Applications in this category already exist, and are expected to mature over the course of the year. The number of these applications is also expected to grow. Examples of applications include hardware security modules (HSM), security vaults, encryption services, and other security-related applications that render themselves to be the first choice for adopting confidential computing. While these applications exist, they constitute a fraction of the potential workloads that can run inside a TEE.

Third-party enablement applications

Workloads in this category are the ones built by software vendors for other customers. They require adaptation and integration for use. A vendor who makes this kind of software isn't a security vendor, but instead relies on security vendors (like Profian) to help them adapt their solutions to confidential computing. Such software includes AI software trained on customer data, or a database holding customer data for secure processing.

Homemade applications

These applications are built by customers for their internal use, leveraging assistance and enablement from confidential computing vendors.

Developing confidential computing technology

I suspect that third-party and homemade applications have similar dynamics. However, I expect more progress in a third-party enablement application segment, and here is why.

In the past year, a lot of discovery and educational activities were developed. Confidential computing is now better known, but it has yet to become a mainstream technology. The security and developer communities are gaining a better understanding of confidential computing and its benefits. If this discovery trend continues this year, it can influence more outlets, like conferences, magazines, and publications. This shows that these entities recognize the value of confidential computing. In time, they may start to offer more airtime for talks and articles on the subject.

Prediction #1: Pilot programs

The next phase after discovery is creating a pilot. Profian is seeing more interest among different vendors to move forward in building solutions and products that consciously target execution within trusted environments. This year, I expect to see a lot of pilot programs. Some of them can become production ready within the year. And some can pave the way for production-ready implementation next year.

Further interest is generated by greater visibility of confidential computing, a better understanding of the technology, and its value. In addition, the success of pilots, actual products, and services based on confidential computing platforms is guaranteed to generate interest.

Over the years, companies have collected and stored a lot of data about their business. If used using analytics and AI, this data helps companies improve business operations. They can also offer new or improved services and products to customers. Some of the data and models are valuable and need to be handled with security in mind. That's an ideal use case for confidential computing.

Companies looking to put their data to good use should start asking questions about security. This eventually leads them to discover confidential computing. From there, they can express interest in leveraging trusted environments to do computation. This, in turn, grows the attention of the companies (in the third-party category above) that provide products in this space to consider putting some of their products and offerings into confidential computing. I don't expect to see drastic changes in this area during this year. I do anticipate a shift in mindset toward recognizing the value of confidential computing and how it can help on a greater scale.

More on security The defensive coding guide 10 layers of Linux container security SELinux coloring book More security articles Prediction #2: Hardware and confidential computing

This year, I expect new hardware chips supporting confidential computing from different vendors and architectures. The hardware ecosystem is growing and that should continue this year. This gives more options to consumers, but also creates more requirements for hardware-agnostic solutions.

Prediction #3: Open standards

Finally, multiple security vendors are working on different deployment and attestation solutions. As those solutions mature, the need for some kind of interoperability is expected. Efforts for standardization are underway. But this year is likely to bring more pressure for projects to agree upon standardization and rules for interoperability.

Open source in confidential computing

Open source is key in confidential computing. The Enarx project provides a runtime environment, based on WebAssembly. This allows deploying a workload into a TEE in an architecture- and language-indifferent way. With the general awareness trends I've described above, I expect more engineers to join the open source ecosystem of confidential computing projects. This year, more developers might contribute to all elements of the stack, including the kernel, WebAssembly, Rust crates and tools, and Enarx itself.

Maybe one of those developers is you. If so, I look forward to collaborating with you.

Confidential computing is becoming more widely known by security and developer communities. Look out for these key trends in 2023.

Image by:

Tumisu. CC0

Security and privacy What to read next This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License. Register or Login to post a comment.

What Is Linux? and How Does Linux Work?

Tecmint - Mon, 01/23/2023 - 13:36
The post What Is Linux? and How Does Linux Work? first appeared on Tecmint: Linux Howtos, Tutorials & Guides .

In this article, we explore what Linux is and some of the attributes and components associated with the Linux operating system. What Is Linux? Linux is an open-source, community-developed operating system with the kernel

The post What Is Linux? and How Does Linux Work? first appeared on Tecmint: Linux Howtos, Tutorials & Guides.

Pages