Latest News

  • DEB Files on Arch? Run Any App on Any Distro

    DEB Files on Arch? Run Any App on Any Distro

    Frustrated by an app’s absent or lagging support for your preferred distro? Like magic, Distrobox runs applications from different Linux distributions right on your Linux computer. They’re running on your computer, yet they’re in their own native distribution. We show you how it works. Containers are a form of virtual machine. A traditional virtual machine… Read more

  • Helpful Backup Utilities for Users

    Helpful Backup Utilities for Users

    Dump and restore are two Linux utilities that help ensure reliable backups. From utility installation to restoring file systems, this tutorial is for Linux users of all levels. The dump utility is a simple, powerful backup tool from the early days of Linux. Where most backup programs operate on a per-file basis, dump backs up… Read more

  • Linux Tier List

    Linux Tier List

    Chris Titus, the venerable Tech Youtuber, creates his Linux Tier List for 2023. In this video, he shares his opinions on 43 Linux Distros, using his own classification list that is both funny and controversial. See if you share his opinions, or if you want to post your disgust on his findings. Either way, his… Read more

  • Kali vs. ParrotOS: 2 versatile distros for security pros

    Kali vs. ParrotOS: 2 versatile distros for security pros

    Network security doesn’t always require expensive software. Two Linux distributions — Kali Linux and ParrotOS — can help enterprises fill in their security gaps. It’s a wonderful time to be a Linux user: Today’s distributions are full-featured, powerful and stable. How can a single distribution distinguish itself in such a competitive world? One way is… Read more

  • New Bluetooth Flaw Let Hackers Take Over Android, Linux

    New Bluetooth Flaw Let Hackers Take Over Android, Linux

    A critical Bluetooth security flaw could be exploited by threat actors to take control of Android, Linux, macOS and iOS devices. Tracked as CVE-2023-45866, the issue relates to a case of authentication bypass that enables attackers to connect to susceptible devices and inject keystrokes to achieve code execution as the victim. “Multiple Bluetooth stacks have… Read more

  • Stealthy Linux rootkit found undetected for 2 years

    Stealthy Linux rootkit found undetected for 2 years

    Stealthy and multifunctional Linux malware that has been infecting telecommunications companies went largely unnoticed for two years until being documented for the first time by researchers on Thursday. Researchers from security firm Group-IB have named the remote access trojan “Krasue,” after a nocturnal spirit depicted in Southeast Asian folklore “floating in mid-air, with no torso,… Read more