Open-source News

libdisplay-info Started To Address The Wayland Fragmentation Around EDID/DisplayID

Phoronix - Sun, 03/27/2022 - 19:50
There has been a known problem for some time that with the increasing number of different Wayland compositors out there, there is a lot of fragmentation when it comes to display EDID/DisplayID handling. Thankfully libdisplay-info has been started with hopes of addressing that issue...

WirePlumber 0.4.9 Fixes Surround Sound For Some Linux Games

Phoronix - Sun, 03/27/2022 - 18:48
WirePlumber is the increasingly used session/policy manager for PipeWire for audio/video streams on the Linux desktop. Out this weekend is WirePlumber 0.4.9 with some important fixes and improvements...

Linux 5.18 Xen USB Driver To Harden Against Malicious Hosts

Phoronix - Sun, 03/27/2022 - 18:17
The many USB and Thunderbolt feature patches have landed into the in-development Linux 5.18 kernel...

KDE Plasma 5.25 Seeing Touch Gesture Additions, More Fixes & Other Work

Phoronix - Sun, 03/27/2022 - 17:26
KDE developer Nate Graham is out with his usual weekly summary of all the notable KDE changes to land in the past week...

Ceph File-System Updates For Linux 5.18 Address A "Pretty Nasty Problem", Other Bugs

Phoronix - Sun, 03/27/2022 - 17:17
The Ceph file-system updates for this scalable distributed storage system have landed for Linux 5.18 with some fairly noteworthy fixes...

New book highlights open source tools and tips for personal cybersecurity

opensource.com - Sun, 03/27/2022 - 15:00
New book highlights open source tools and tips for personal cybersecurity Joshua Allen Holm Sun, 03/27/2022 - 03:00 Up Register or Login to like.

The internet can be a dangerous place. Not a week goes by without a cyber attack taking place. Go H*ck Yourself: A Simple Introduction to Cyber Attacks and Defense by Bryson Payne shows you how many basic cyber attacks work, so you can learn to defend against them. Payne teaches how to perform a variety of hacks to show that they are easy to do. 

The book’s eleven chapters begin with straightforward concepts, like using a browser’s inspect tool to make a password field display the password and gaining administrative access to a Windows or Mac using installation media. The third chapter explains how to use VirtualBox to create Kali Linux and Microsoft Windows virtual machines that will be used for the exercises in the following chapters.

More on security The defensive coding guide 10 layers of Linux container security SELinux coloring book More security articles

Chapters four through ten dig deep into various hacks that can be used against you. Chapter four demonstrates what "Googling yourself" can reveal by entering your name into Google. A hacker could use this information against you. Chapter four also provides tips for writing advanced search queries to help you dig deeper with your searches. Chapter five deals with social engineering and teaches how to create phishing websites. It also shows you how emails are used for potential phishing attempts. Chapter six explains malware and viruses. It also shows how to write a simple virus and take control of a Windows computer. Chapter seven goes into stealing and cracking passwords. Chapter eight details web hacking, including Cross-Site Scripting attacks and SQL Injection attacks. Chapter nine touches on hacking Android mobile devices. Chapter ten concerns hacking automobiles. Each chapter is full of detailed, well-explained exercises that teach you what malicious hackers are trying to do and how to stop them from succeeding in their goals.

The book's final chapter, chapter 11, provides an overview of "ten things you can do right now to protect yourself online." These ten things reiterate the lessons taught throughout the book and are accepted "best practices" advice. Payne points out to the reader that they are a target. They need to be aware of social engineering attempts, and they should follow the advice presented throughout the book to protect themselves best. Chapters one through ten are fascinating and informative, but require some preexisting technical knowledge to get the most out of them. "Go H*ck Yourself" is beginner friendly, but not "I have no idea how a computer works at all" friendly. Chapter 11 is the chapter you can refer to for anyone in your life that needs help, even the relative who repeatedly asks to see if maybe this time that request for money from a seemingly friendly stranger is not a scam.

The book also has two appendixes. The first explains how to create a Windows 10 installation disc or flash drive. The second provides tips for troubleshooting VirtualBox. These two appendixes should help anyone with a modest background in computers figure out how to set up everything so they can perform the exercises in the various chapters.

In a world that has to contend with constant cyber threats, "Go H*ck Yourself" is a necessary read for anyone who spends any time on the internet. Payne's lessons will provide you with the tools needed to defend yourself and your friends and family from malicious hackers who are up to no good. Because the book is a technical book with hands-on exercises, it is not an ideal read for those who most need the lessons the book imparts. Anyone with a basic grasp of tech know-how should pick up this book, read it, apply its lessons in their own life, and share the knowledge they learned.

In a world that has to contend with constant cyber threats, this new book by author Bryson Payne is a necessary read for any open source technologist who spends time on the internet.

Security and privacy What to read next This work is licensed under a Creative Commons Attribution-Share Alike 4.0 International License. Register or Login to post a comment.

MGLRU Could Land In Linux 5.19 For Improving Performance - Especially Low RAM Situations

Phoronix - Sun, 03/27/2022 - 06:00
MGLRU is a kernel innovation we've been eager to see merged in 2022 and it looks like that could happen for the next cycle, v5.19, for improving Linux system performance especially in cases of approaching memory pressure...

Debian 11.3 Released With Many Bug Fixes, Security Updates

Phoronix - Sun, 03/27/2022 - 05:33
Debian 12 "Bookworm" is coming next year while out this weekend is Debian 11.3 as the newest update in the "Bullseye" series...

Intel CET Indirect Branch Tracking Submitted For Linux 5.18

Phoronix - Sun, 03/27/2022 - 01:45
Indirect Branch Tracking (IBT) that is part of Intel's Control-Flow Enforcement Technology (CET) found with Tiger Lake CPUs and newer is landing for the Linux 5.18 kernel...

Pages