Latest News

  • Hackers bypass Linux Security with Curing

    Hackers bypass Linux Security with Curing

    Hackers can now bypass Linux security thanks to terrifying new “Curing” rootkit. Most Linux users assume their security tools will catch bad actors before damage is done — but sadly, new research suggests that confidence may be misplaced. You see, ARMO, the company behind Kubescape, has uncovered what could be one of the biggest blind… Read more

  • Ditch the Desktop, Go Headless

    Ditch the Desktop, Go Headless

    6 Reasons to Ditch the Desktop and Run a Headless Server Have you been trying to figure out what to do with that old laptop lying around? Maybe you’ve got an old mini PC or the like that you’ve been wanting to repurpose. Instead of installing a desktop OS on it, here’s why you should… Read more

  • EU OS: Proposal for Public Sector Desktop

    EU OS: Proposal for Public Sector Desktop

    There are many Linux distributions, but now there’s a proposal for one that’s specific to the European Union government and nongovernmental organizations.  There have been thousands of Linux distributions, and at my best estimate, there are still over 250 distros being updated and supported. Now, there’s a proposal for one more: EU OS. This proposed desktop Linux distribution… Read more

  • Arch Linux Now Official WSL Image

    Arch Linux Now Official WSL Image

    Arch Linux now has an official WSL Image … …and it is officially (re)distributed by Microsoft! A few months ago, the eventuality of building and providing an official Arch Linux WSL image (Windows Subsystem for Linux – a Microsoft solution allowing to run Linux environments within Windows) was brought to the table within the Arch Linux staff.… Read more

  • China Hackers use Open Source Tools

    China Hackers use Open Source Tools

    China-backed Threat Actor “UNC5174” Using open source tools in stealthy attacks.Sysdig researchers detailed an ongoing campaign from China-backed threat actor UNC5174, which is using open source hacking tools to stay under the radar. A state-backed Chinese threat actor known as “UNC5174” is using stealthy techniques and open source software to attack its victims. Cloud security… Read more

  • Kubuntu for 8 Months

    Kubuntu for 8 Months

    I’ve Used Kubuntu for 8 Months: What I’ve Learned About This Linux Distro Ubuntu may get the limelight a lot in Linux circles, but it has several cousins. One of them is Kubuntu Linux, and it has some unique qualities that might lead you to make it your primary operating system. If you have trouble… Read more