● 12.27.15

● Links 27/12/2015: Perl 6, Solus 1.0

Posted in News Roundup at 8:06 am by Dr. Roy SchestowitzContentsGNU/LinuxGNU/Linux

Desktop

↺ Purism’s Librem 13 laptop will come with Qubes OS installed

Kernel Space

↺ Linux Foundation to Develop Hyperledger along with Others

Graphics Stack

↺ NIR Mesa Functions Support Is Coming Along With SPIR-V To NIR
↺ How Haswell OpenGL Performance On Linux Changed In 2015

Applications

↺ Entangle 0.7.0 “Charm” (Software for Controlling the Photo Camera via Computer) Has Been Released
↺ kstart 4.2

Proprietary

↺ Feeling abandoned by Adobe? Check out the video editing suites for penguins

Instructionals/Technical

↺ DVR with Two external networks via flat network provider on CentOS 7.2 RDO Liberty
↺ How to install Univention Corporate Server
↺ How to Install Zen Cart with Nginx on Debian 8
↺ Santa Claus in Linux Style: Top Linux Hardware and Free Linux/Programming Books & Courses Recommendations
↺ IPSEC VPN on Ubuntu 15.10 with StrongSwan
↺ How To Install HotShots 2.2.0 (Lightweight Screenshot Tool) On Ubuntu
↺ Adjusting mouse sensitivity on Linux, and why you might want to

Wine or Emulation

↺ The Wine Development Release 1.9.0 Is Now Available
↺ The Development For Wine 1.9 Has Been Started

Games

↺ Divinity: Original Sin Enhanced Edition Out for Mac, Linux and SteamOS
↺ Divinity: Original Sin Enhanced Edition gets Mac, Linux and SteamOS versions
↺ SuperTux new release, win a Steam Machine, and more open gaming news
↺ 2015 Was A Stellar Year For Linux Gaming
↺ OpenRA 2015 Christmas Release Brings Many Fixes

Distributions

New Releases

↺ f OS Officially Released

Screenshots/Screencasts

↺ Meet Manjaro 15.12 KDE Edition – Video Overview and Screenshot tours

Red Hat Family

↺ Microsoft, Arista, Red Hat, and Micron Could Prosper in 2016
↺ Stock Rating Update on Red Hat, Inc. (NYSE:RHT)

Debian Family

↺ Debian is still changing
↺ Debian packages with /outdated/ packaging style
↺ Debian Med Bug Squashing in Advent 2015
↺ Debian/TeX Live 2015.20151226-1
↺ ROKOS Is A Free Raspberry Pi Operating System To Launch A Bitcoin Node
↺ Debian APT Performance Is Becoming Much Better For Incremental Updates
↺ Much faster incremental apt updates

Derivatives

Canonical/Ubuntu

↺ Ubuntu Touch To Receive Miracast Support Via Aethercast
↺ Ubuntu’s Magical Abacus, New Linux Releases & More…

Flavours and Variants

↺ Linux Mint 17.3 Now In Beta For Xfce/KDE Editions
↺ The XFCE And KDE Flavors Of Linux Mint 17.3 Rosa Are Now In Beta

Devices/Embedded

↺ 10 more Raspberry Pi projects primed for IT
↺ What’s the best Raspberry Pi for your needs?

Phones

Android

↺ Top Android news of the week: New malware hits Android, Apple lawsuit tossed, ASUS ad blocking
↺ 10 Things To Do With Your Old Android Smartphone
↺ CSound now available for Android
↺ The best Android apps of 2015 – live-streaming video goes mainstream
↺ AdBlock Plus Restricts Ads in Asus Android Smartphones
↺ 25 Awesome Android Apps For Your New Device
↺ Xiaomi’s Android 6.0 Marshmallow update for Mi 3, Mi 4 and Mi Note in ‘final testing’ stages
↺ Game of the Year – The best Android games of 2015
↺ The best platform games on Android
↺ Android 6.0 update news: Moto G 3rd gen starts receiving Android Marshmallow
↺ HTC Starts Rolling Out Android 6.0.1 To The Unlocked One
↺ Crowdfunded Console OS Accused Of ‘Stealing’ Android-x86 Project’s Open Source Code
↺ 5 Android Social Media Marketing Apps For A Better Social Presence
↺ How to move music from PC to Android
↺ Update OnePlus One with Android v6.0.1 Marshmallow via crDroid custom ROM [How to install]
↺ Android 6.0.1 is pushed out to the unlocked HTC One A9
↺ LG Nexus 5X Review – Raw Android experience for the masses

Free Software/Open Source

↺ Why Don’t You Contribute to Open Source?
↺ Open Source Software Went Nuclear This Year
↺ ownCloud 8.2.2, 8.1.5, 8.0.10 and 7.0.12 here with Sharing, LDAP fixes
↺ The problem with self-driving cars: who controls the code?

Events

↺ Nha Trang ICT 2015

BSD

↺ 2.2.6-RELEASE Now Available!

Openness/Sharing

Open Hardware

↺ Little Helper: Open Source Hardware Hacker Multitool

Programming

↺ Santa Claus in Linux Style: Top Linux Hardware and Free Linux/Programming Books & Courses Recommendations
↺ PHP version 7.0.2RC1
↺ The Perl 6 release
↺ Signs that you’re a good programmer

Leftovers

↺ Two men miraculously found alive 72 hours after Shenzhen landslide in China

Health/Nutrition

↺ Bottled air from Canada is selling like crazy in China

Security

↺ #OLEOutlook – bypass almost every Corporate security control with a point’n’click GUI
↺ Somebody Tried to Get a Raspberry Pi Exec to Install Malware on Its Devices
↺ Botnet of Aethra Routers Used for Brute-Forcing WordPress Sites
↺ Steam Had A Very Rough Christmas With A Major Security Issue
↺ Xen Project blunder blows own embargo with premature bug report

Defence/Police/Secrecy/Aggression

↺ US Has More than 200,000 Soldiers Deployed Around the World
↺ America’s Unending War On Terrorism Will Destroy Humanity And Planet Earth
↺ Cameron, Spy Chiefs Trade Secrets With Merkel Over Daesh Terror Threat
↺ Letter: A reader’s election year thoughts
↺ France out-Bushing George W. Bush in its terror fight
↺ Palace: No ISIS training camps in PH
↺ NATO: Seeking Russia’s Destruction Since 1949
↺ Exclusive: Islamic State sanctioned organ harvesting in document taken in U.S. raid

Environment/Energy/Wildlife

↺ Hundreds evacuated after further flooding in northern England – latest updates
↺ More than 100,000 flee El Niño flooding in Paraguay, Argentina, Brazil and Uruguay
↺ Hanging out with the orangutan whisperer
↺ Climate Change: A Tale of Two Governors
↺ UK Deploys Army to Rescue People in North Western County Hit by Floods
↺ UK weather: M62 20ft sinkhole causes travel chaos as north of England battered by floods
↺ Live updates: Homes evacuated, pub collapses, city centre on flood alert as rivers across Manchester burst their banks
↺ 10,000 properties without power across Lancashire and Rochdale
↺ Govt looking at new insurance levy over floods
↺ Flooding Causes Manchester Gas Explosion
↺ Pub washed away in Summerseat on River Irwell

Finance

↺ Capitalism – Not China – Is to Blame for the Current Global Economic Decline
↺ Prof. Wolff comments on U.S. exports of crude oil at RT International
↺ Bitcoin: What It Is And How It Works

PR/AstroTurf/Lobbying

↺ Robin Kelley, Malkia Cyril, Richard Rothstein: Do Black Lives Matter to Media?
↺ Senate Bill 571 censors factual election information
↺ Donald Trump: Another Terrorist from the 1 Percent
↺ Sanders-Clinton Voter Database Hack: a Campaign Pro’s Perspective

Censorship

↺ To tolerate or to take offence? That’s the question
↺ Tuesdays at Cheongster Cafe: Report Police Report
↺ Remembrance theme ranks high on Google Singapore searches
↺ Anonymous Hacks Asia Pacific Telecommunity Portal to Protest Against Censorship In Asia
↺ When Censorship is Really Tempting
↺ Free speech trumps censorship – be it Cecil Rhodes or Adolf Hitler
↺ International publishers blast censorship in Turkey
↺ Turkey attacked by international publishers for ‘blatant political censorship’
↺ How Websites Will Signal When They’re Censored
↺ Bradbury-Inspired 451 Error Code Warns of Online Censorship
↺ Error 451 is the new HTTP code for online censorship
↺ Forget 404 Errors: HTTP Now Has a Code for Censorship
↺ CALLING OUT CENSORSHIP BY NAME, OR AT LEAST BY NUMBER
↺ Burmese artists caught in self-censorship
↺ Mercury News editorial: China’s Internet conference is all about censorship
↺ China is Finally Taking its Seat at the Big Table
↺ China’s Xi calls for cooperation on Internet regulation
↺ Is American film industry pandering to Chinese censors?
↺ So you think Thai Internet censorship is bad?
↺ The Delicate Dance of a Chinese Journalist
↺ Students Call for ‘Terrifying’ Wave of Censorship
↺ Trigger Warnings on College Campuses Are Nothing but Censorship
↺ Self-censorship makes us victims of political jihad
↺ Tact is tactical. Obsequiousness signals surrender
↺ Self-censorship? Lok Sabha Speaker expunges her own remarks after Congress raises concern
↺ e-Books help overcome Book Censorship in the Middle East
↺ Police encourage social media censorship
↺ Students need education, not indoctrination
↺ In Hong Kong, Fears for an Art Museum
↺ Don’t Let Principals Censor the Internet
↺ The Palestinian-Israeli singer challenging everyone’s misconceptions
↺ Closing down access to ‘free speech’ is not a joking matter
↺ Why did Iranian TV censor interview with Zarif?
↺ NY Times Warns About Europe Expanding The ‘Right To Be Forgotten’
↺ Keystrokes in the West may mean a death sentence in Saudi Arabia
↺ Rated R for Ridiculous
↺ Why Did Facebook Block the Sharing of This New York Times Article About Nuclear Targets?
↺ Thai high court upholds conviction of webmaster for postings
↺ British pub’s Facebook account banned over ‘offensive’ name
↺ Twitter says it is beating the trolls
↺ ICFJ’s Butler: American journalists feel the attacks on colleagues in Turkey and elsewhere

Privacy

↺ Is the American Freakout Over a Chinese Social Monitoring Project Justified?
↺ Free press prevails in Palm Beach
↺ Dragnet NSA Spying Survives: 2015 in Review
↺ NSA, FBI ask judge to dismiss lawsuit claiming mass surveillance at ’02 Utah Olympics
↺ NSA sued over alleged spying during 2002 Winter Olympics
↺ NSA overstepped authority, mayor says; NSA disagrees
↺ Feds ask judge in Utah to dismiss Olympic surveillance case
↺ NSA wants lawsuit over 2002 Olympic spying tossed
↺ NSA helped GCHQ spies hack Juniper firewalls – Snowden leak
↺ It doesn’t matter if the NSA planted the Juniper backdoor
↺ NSA knew about Juniper backdoors and kept quiet about them
↺ Researchers suspect NSA as FBI probes Juniper back door vulnerability
↺ Top Secret Document Indicates NSA Knew Of Juniper Vulnerabilities In 2011
↺ NSA suspected in Juniper firewall backdoor mystery, but questions remain
↺ The NSA May Have Spawned Backdoor That Has U.S. Government in a Panic
↺ NSA suspected in Juniper firewall backdoors
↺ Researchers think that a dangerous ‘back door’ in software used by the US government was caused by the NSA
↺ Partners Concerned Over Document Stating NSA Had Backdoor Access To Juniper Firewall
↺ GCHQ and NSA found security holes in Juniper back in 2011
↺ NSA helped British spies hack Juniper firewalls
↺ NSA behind dangerous ‘backdoor’?
↺ Researchers claim the NSA hacked Juniper’s firewall software
↺ NSA aided GCHQ in finding holes in Juniper products
↺ National Security Agency Implicated in Juniper Backdoor Vulnerabilities
↺ Who hid a backdoor in a popular corporate VPN program?
↺ NSA backdoor leaves United States government open to attack
↺ Juniper Backdoor Only Possible Because Of NSA’s Own ‘Dual EC’ Backdoor, Say Security Experts
↺ Juniper’s VPN security hole is proof that govt backdoors are bonkers
↺ Juniper breach reflects risk of ‘back doors’ – researchers
↺ Juniper Networks’ backdoor: it’s not China, it’s the US, suggest researchers
↺ Honeypot Trap Suggests NSA Monitoring Associated With Juniper Breach
↺ Researchers Say The Juniper Hack Could Be The Work Of Government—But Which One?
↺ Cisco Starts Company-Wide Code Audit to Search for Hidden Backdoors
↺ Cisco searches its gear for backdoors
↺ Juniper Backdoor Picture Getting Clearer
↺ Hackers Are Already Using the Secret Juniper Firewall Backdoor in Their Attacks
↺ Juniper updates list of backdoored enterprise firewall OS versions
↺ NSA hacked Juniper’s firewall software – Snowden Leaks
↺ How to log into any backdoored Juniper firewall – hard-coded password published
↺ Juniper Networks backdoor confirmed, password revealed, NSA suspected
↺ FBI Investigating Juniper VPN Hack
↺ Juniper Warns of Spying Code in Firewall
↺ Juniper ScreenOS devices had default backdoor password: Rapid7
↺ FBI, DHS investigating Juniper hack; secret backdoor dates back 3 years
↺ Critical patches issued after spying backdoors found built into Juniper firewalls
↺ Juniper Backdoor Password Goes Public
↺ Juniper Networks Shortens ScreenOS Threat List
↺ FBI Probes Network Hack Affecting Govt Communication
↺ FBI Investigates Potential Of Foreign Spying In Juniper Router Hack
↺ Juniper Warns of ‘Unauthorized Code’ on Its Firewalls
↺ CNN: New hack discovered that breached gov’t encrypted communications — for three years
↺ Did a foreign government hack Juniper’s network software?
↺ Juniper found vulnerabilities in it’s firewalls
↺ Juniper firewalls compromised by bad code: What you need to know
↺ Juniper breach reflects risk of ‘back doors’ – researchers
↺ Juniper Networks Spy Code Story Continues
↺ Juniper Warns of Spying Code in Firewall Join our daily free Newsletter
↺ The Year’s 11 Biggest Hacks, From Ashley Madison to OPM
↺ When the NSA Is a Hacker’s Best Friend
↺ Your Business Been Hacked? Thanks NSA!
↺ Cisco probes self for Juniper-style backdoors, silently mouths: ‘We’re doing this for yooou’
↺ Cisco launches code review after Juniper’s spyware disclosure
↺ After Juniper security mess, Cisco searches own gear for backdoors
↺ Listen up, FBI: Juniper code shows the problem with backdoors
↺ Feds Scrambling to Close Backdoor in Widely Purchased IT Gear
↺ Juniper firewall fiasco is a major blow-up for government’s backdoor rhetoric
↺ A nightmare example of why any government backdoor access is terrible
↺ U of T tool tracks if the NSA could be tracking you
↺ New Hampshire Bill Would Ban NSA Activity Called the “Biggest Threat Since the Civil War”
↺ Anonymous hacktivists have twisted this well-known Christmas carol to spread their anti-surveillance message
↺ Servers of email host used in US school bomb threats seized by German police
↺ Commentary: U.S. accusation over China’s anti-terror legislation hypocritical, groundless
↺ Facebook still won’t change it’s “real name” policy but adds a loophole that might work
↺ Snowden to appear via video link at New Hampshire convention
↺ Switzerland’s alpine fortresses spur start-up boom
↺ The encryption delusion
↺ Snowden, Sketched
↺ Hack the Planet
↺ Palantir Has Raised $880 Million At A $20 Billion Valuation
↺ Government, Not Data-Thieves, Is Why The War On Encryption is Insane
↺ GDPR: How will the EU data protection law impact U.S. industry?
↺ Europe vs. the U.S. in 2015: A year of transatlantic tussles
↺ Replacing the Safe Harbor – Robust privacy protections in a new EU-US data transfer agreement
↺ “Safe Harbour Principles” – Are they really safe? (Decision of the Court of Justice of the EU on case No. C-­362/14)
↺ House legislation would revive bulk surveillance
↺ There’s a Secret Catalog of Surveillance Tech for US Law Enforcement Agencies
↺ Leaked Documents Expose The US Government’s Cell Phone Surveillance Options
↺ Cryptology, cryptography, and cryptanalysis
↺ Fact-Checking the Debate on Encryption
↺ Israeli Group Rayzone Develops InterApp Smartphone Hacking System
↺ Provision In Congress-Approved Spending Bill Worries Privacy Advocates
↺ Spending bill slips in erosion of privacy rights for cybersecurity
↺ Cybersecurity Act 2015: Obama to sign new cybersecurity law to allow information sharing between companies and government agencies
↺ Obama signs $1.1 trillion spending package, approves CISA surveillance legislation
↺ US Cyber Threats Persist With Limited Actions to Resolve Vulnerabilities
↺ Congress Just Abandoned Data Privacy, But Banks Can Restore It
↺ US Congress Passes Controversial Info-Sharing Bill
↺ Cybersecurity Information Sharing Act Sets Back Privacy
↺ Is the Cybersecurity Act really government spying in disguise?
↺ Cybersecurity, Federal Data Protection Rules Get Thrown Into Omnibus Budget Bill
↺ Massive year-end spending bill includes cybersecurity act
↺ Just Before Passing Surveillance Expansion, Lawmakers Partied With Pro-CISA Lobbyists
↺ Cyber bill reportedly included in omnibus deal
↺ Cyber Threat-Sharing Rider Makes It to Budget Bill
↺ Final CISA bill wrapped into omnibus package
↺ Controversial Cybersecurity Act Slipped Into ‘Omnibus’ Budget Bill
↺ Congress Slips Controversial Cybersecurity Plan Into Budget
↺ Amash, Massie Warn of Secret Surveillance Provision in Spending Package
↺ NORTH: Congress quietly passes a second Patriot Act
↺ Lawmakwers To Vote On Controversial Cybersecurity Bill This Week
↺ After San Bernardino, the pendulum may swing back toward more surveillance

Civil Rights

↺ Digital Rights Battles in 2015: NSA Reform, Net Neutrality, CISA and Beyond
↺ 10 human rights cases that defined 2015
↺ US revokes visa of British Muslim without explanation
↺ Conservative Media’s Demand That Muslims Atone For Terrorism Is A Rigged Game
↺ Iranian-Americans Are Once Again The Escape-Goats. Why?
↺ Congress Put Iranian-Americans and Others At Risk for Becoming Second-Class Citizens
↺ Yahoo now warns users if they’re targets of state-sponsored hackers
↺ Yahoo becomes the latest company to warn users of suspected state-sponsored attacks
↺ Controversial China anti-terror law looks set to pass this month
↺ These are the people responsible for our out of control police…
↺ Smiles and Nerves: Schools reopen in Ukraine’s frontline villages
↺ Trump’s Muslim ban is as American as apple pie
↺ Western Democracy: Who’s Watching the Watchers?
↺ China’s cyber-diplomacy
↺ The Advocates: Four Public Interest Lawyers To Know
↺ The Perfect Storm in Digital Law
↺ 2 fatally shot, 1 accidentally, by Chicago police on West Side; families demand answers

Internet/Net Neutrality

↺ There’s wi-fi in the middle of the only place in the U.S. where wi-fi is ‘outlawed’
↺ Facebook’s Fraudulent Campaign on Free Basics
↺ 10 reasons that explain why you should oppose Facebook’s Free Basics campaign

DRM

↺ Welcome to the Digital Dark Ages

Intellectual Monopolies

Copyrights

↺ Netgear Shows Customers How to Share Pirate Movies
↺ New Zealand court rules that Kim Dotcom can be extradited
↺ Kim Dotcom Challenges U.S. Govt. in Christmas Address

Share in other sites/networks: These icons link to social bookmarking sites where readers can share and discover new web pages. Permalink  Send this to a friend

----------

Techrights

➮ Sharing is caring. Content is available under CC-BY-SA.