• FACEBOOK
  • TWITTER
  • MASTODON
  • GITHUB

GPL(GENERAL PUBLIC LICENSE) FREEDOM 0:
The freedom to run the program as you wish, for any purpose.
FREEDOM 1:
The freedom to study how the program works, and change it so it does your computing as you wish.
FREEDOM 2:
The freedom to redistribute copies so you can help others.
FREEDOM 3:
The freedom to distribute copies of your modified versions to others.

Found the linux penguin at a store
/// 5 Aug 2025, 6:06 am ////// Reddit ///
submitted by /u/Fx317
[link] [comments]
Recovering Business Accounts That Have Been Hacked: Best Approach Is Prevention
/// 4 Aug 2025, 4:09 pm ////// UNIXMEN ///
cyber security
cybersecurity concept, user privacy security and encryption, secure internet access Future technology and cybernetics, screen padlock.

In today’s interconnected world, businesses are increasingly reliant on digital systems to operate efficiently. However, with this reliance comes an ever-growing threat: cyberattacks. One of the most common and potentially devastating forms of these attacks is account hacking. Recovering from a hacked business account can be complex and costly, making prevention the best defense. Let’s explore how businesses can protect their accounts and the role technologies like network diodes play in securing sensitive information.

Signs Your Business Account May Be Compromised

Before diving into prevention, it’s crucial to recognize the warning signs of a hacked account. These include:

  • Unusual activity: Logins from unfamiliar locations or devices.
  • Unintended actions: Emails sent without authorization or unexpected transactions.
  • Locked accounts: Sudden inability to access critical accounts.
  • Security alerts: Notifications about password changes or unauthorized access.

If you notice these signs, immediate action is necessary to mitigate damage.

Steps to Recover a Hacked Business Account

  1. Act Immediately:
    Disconnect the compromised device from the network to prevent further data theft.
  2. Reset Passwords:
    Use a secure device to change passwords for all affected accounts. Employ strong, unique passwords.
  3. Enable Two-Factor Authentication (2FA):
    Add an extra layer of protection to ensure that even if login credentials are stolen, the attacker cannot access the account.
  4. Investigate the Breach:
    Identify how the attack occurred and what data was compromised to prevent recurrence.
  5. Notify Stakeholders:
    Inform clients, partners, and employees about the breach if their data might be affected. Transparency helps maintain trust.
  6. Report the Incident:
    File a report with the appropriate authorities or regulatory bodies if sensitive data was exposed.

Prevention: The Best Defense

Recovering from a breach is resource-intensive, often resulting in financial losses and reputational damage. Implementing preventive measures is far more effective. Here’s how businesses can proactively secure their accounts:

  1. Employing Network Diodes

Network diodes are powerful tools for ensuring data security. These devices enforce one-way data transfer, making it impossible for hackers to send malicious data back into the network. Here’s how they work:

  • Unidirectional Communication: Data flows in one direction only, from the secure side to the external network.
  • Isolation of Critical Systems: Protects sensitive assets from being accessed remotely by attackers.
  • Applications in Business: Ideal for transmitting financial data, sensitive communications, or proprietary information.

By integrating network diodes, businesses can safeguard their information while maintaining operational efficiency.

  1. Regular Security Audits

Conduct routine evaluations of your cybersecurity protocols to identify vulnerabilities.

  1. Educate Employees

Human error remains one of the weakest links in cybersecurity. Regular training on phishing, password management, and secure browsing is essential.

  1. Leverage Advanced Authentication Methods

Beyond 2FA, consider biometrics or hardware security keys to add further protection.

  1. Backup Critical Data

Regularly back up data to an isolated location. In the event of an attack, this ensures continuity without yielding to ransom demands.

The Role of Cybersecurity Policies

A well-drafted cybersecurity policy is the cornerstone of preventive efforts. Ensure that policies include:

  • Access Controls: Limit access to sensitive systems and data based on roles.
  • Incident Response Plans: Define clear steps for mitigating breaches.
  • Software Updates: Mandate timely updates to close security loopholes.

Truths and Myths about Linux machines.

  1. How Reliable are Linux Systems. Are they vulnerable?

Truth: While Linux has a reputation for being secure, it is not immune. Many attacks target misconfigured services, weak SSH credentials, outdated software, and publicly exposed daemons (e.g., Apache, MySQL, OpenSSH).

  • Example: Attackers brute-force SSH logins or exploit outdated WordPress installations.
  1. Compromised Business Accounts Are High-Value Targets

Especially on Linux servers, root or sudo-capable users are a jackpot. Attackers can:

    • Install cryptominers, backdoors, or keyloggers.
    • Harvest SSH keys, database access, or API credentials.
    • Laterally move to other systems via shared keys or VPN credentials.
  1. Logs Can Be Modified or Deleted
  • A common myth is that “you can always find the trail in /var/log.”
  • Truth: Skilled attackers clear or modify logs, or use rootkits to hide traces.
  1. Rootkits and Kernel-Level Malware Exist
  • Tools like LKM rootkits can make malicious processes, files, or ports invisible.
  • Hard to detect with normal tools (ps, netstat, ls).
  1. Business Email Compromise (BEC) Often Starts from a Linux Box
  • Especially if that box hosts email servers, webmail portals, or SMTP relays.

Myths

  1. “Only Windows Gets Viruses”
  • False: Linux malware exists and is growing. Examples include:
    • Mirai, Gafgyt, Xor.DDoS (IoT/Linux botnets).
    • EvilGnome, Turla, HiddenWasp (targeted malware).
  1. “My Server Has No GUI, So It’s Safe”
  • False: Headless servers are often more vulnerable because they:
    • Are exposed to the internet.
    • May run outdated command-line-only services (e.g., nginx, Postfix).
  1. “SELinux/AppArmor Guarantees Safety”
  • False: These tools reduce damage, but are often:
    • Disabled, misconfigured, or bypassed via privilege escalation.
  1. “Strong Passwords Are Enough”
  • False: Even with strong passwords, if SSH keys, sudo privileges, or known vulnerabilities (e.g., sudoedit, dirty pipe) are present — you’re still at risk.
  1. “If There’s No Traffic Spike, Everything’s Fine”
  • False: Many modern attacks are stealthy:
    • Use low-and-slow exfiltration.
    • Set up reverse shells to await commands.
    • Operate during off-hours.

Conclusion

While recovering from a hacked business account is possible, the time, money, and resources spent on remediation underscore the value of prevention. Technologies like network diodes, combined with robust security policies and employee education, can significantly reduce the risk of cyberattacks. By taking proactive steps today, businesses can secure their digital assets and focus on what matters most: growth and innovation.

Taking preventive measures is not just a smart choice—it’s a necessary one in today’s digital landscape. Don’t wait until it’s too late; prioritize cybersecurity now.

The post Recovering Business Accounts That Have Been Hacked: Best Approach Is Prevention appeared first on Unixmen.

The Linux Foundation Marks 2025 Momentum of LF India with Expanding Ecosystem, Engaged Communities and AI-Fueled Innovation - Yahoo Finance
/// 5 Aug 2025, 3:34 am ////// Google News ///
The Linux Foundation Marks 2025 Momentum of LF India with Expanding Ecosystem, Engaged Communities and AI-Fueled Innovation  Yahoo Finance
openSUSE Leap 16.0 Enters RC Phase With New Installer, Xfce On Wayland Option
/// 5 Aug 2025, 1:31 am ////// Phoronix ///
Working toward the stable openSUSE Leap 16.0 release in late 2025, the release candidate period has begun for this Linux distribution aligned with SUSE Linux Enterprise 16 sources...
The Drifter is easily my new favourite point and click adventure
/// 4 Aug 2025, 6:22 pm ////// GamingOnLinux ///
The Drifter from Powerhoof has released, and it is something truly special for the point and click adventure genre that's one not to be missed.

.

Read the full article on GamingOnLinux.

There's a New Linux AI Assistant in Town
/// 4 Aug 2025, 7:32 pm ////// Linux Magazine ///

Newelle is a Linux AI assistant that can work with different LLMs and includes document parsing and profiles.

brokefetch – neofetch clone
/// 4 Aug 2025, 10:29 pm ////// Linux Links ///

brokefetch is the only system info tool that doesn't pretend your life is okay.

The post brokefetch – neofetch clone appeared first on LinuxLinks.

GNU/Linux Leftovers
/// 5 Aug 2025, 2:26 am ////// Tux Machines ///
howtos, LF, and more
Debian Plans Long-Awaited Wiki Modernization
/// 4 Aug 2025, 2:47 pm ////// LINUXTODAY ///

The Debian wiki is set to get a revamp as the project transitions to MediaWiki, leaving behind the aging MoinMoin platform.

The post Debian Plans Long-Awaited Wiki Modernization appeared first on Linux Today.

July GNU Spotlight with Amin Bandali featuring seventeen new GNU releases: Bash, Cflow, and more!
/// 4 Aug 2025, 1:35 pm ////// FSF Blog ///
Seventeen new GNU releases in the last month (as of July 31, 2025).
DistroWatch Weekly, Issue 1133
/// 4 Aug 2025, 12:19 am ////// DISTROWATCH ///
The DistroWatch news feed is brought to you by TUXEDO COMPUTERS. This week in DistroWatch Weekly:
Review: Expirion 6.0
News: Debian addresses decades old issue, FreeBSD community discusses potential issues with its new package base, CDE ported to OpenBSD, Btrfs corruption bug hits Fedora users, more malware found in Arch's community repository
Questions and answers: Linux Mint, KDE Plasma, and running....
Best Linux Remote Administration Tools 2025 – Complete Guide
/// 4 Aug 2025, 4:45 pm ////// Blackmoreops ///

🐳 🏢 🎭 Best Linux remote administration tools in 2025, covering configuration management, container orchestration, monitoring, and web-based administration for all organisation sizes.

The post Best Linux Remote Administration Tools 2025 – Complete Guide appeared first on blackMORE Ops.

NVIDIA Triton Bugs Let Unauthenticated Attackers Execute Code and Hijack AI Servers
/// 4 Aug 2025, 4:06 pm ////// The Hacker News ///
A newly disclosed set of security flaws in NVIDIA's Triton Inference Server for Windows and Linux, an open-source platform for running artificial intelligence (AI) models at scale, could be exploited to take over susceptible servers. "When chained together, these flaws can potentially allow a remote, unauthenticated attacker to gain complete control of the server, achieving remote code execution
Looking for an Ubuntu Manual? Try This Book
/// 2 Aug 2025, 2:27 pm ////// ITS FOSS ///
Looking for an Ubuntu Manual? Try This Book

I know that there is pretty extensive online documentation from Ubuntu available for free. But extensive can also be overwhelming too.

Probably that's the reason why there is a new book on Ubuntu, unsurprisingly called "The Ultimate Ubuntu Handbook" and it gives you a good overview of the Ubuntu as a desktop, as a server and as a developer platform.

This book is written by Ken VanDine, a Linux veteran with over 16 years of work experience at Canonical, the parent company of Ubuntu. He primarily worked on GNOME, Ubuntu Desktop, and Snap integration. Ken also has over 30 years of experience in building Linux distros.

I therefore wondered what perspective someone like Ken, an Ubuntu insider, would take when he decided to write a book about the operating system. Turns out, it's something for everyone who wants to use Ubuntu as their daily driver.

The Ultimate Ubuntu Handbook

As the title suggests, this is a book dedicated to Linux users who are using Ubuntu on their desktop or server.

The book contains 19 chapters divided into these four parts.

Looking for an Ubuntu Manual? Try This Book

Part 1: Introduction to Ubuntu

Starting with a brief history and philosophy of Ubuntu, the book moves on to dedicate a chapter on what's new in version 24.04. Yes, the book is focused on the current LTS release. It then lists the advantages of using Ubuntu, followed by an installation guide. All the spans over four chapters.

Part 2: Getting the most out of Ubuntu system

The next six chapters are about using and understanding some basic but essential concepts for using Ubuntu. It starts with a chapter on exploring the Ubuntu desktop and then moves on to dedicated chapters on package management and handing updates and the best practices that should be followed.

A dedicated chapter on getting help may seem overkill but beginners will find it helpful. There is also a chapter introducing 'Ubuntu Landscape', an enterprise tool for managing your fleet of Ubuntu servers.

The last chapter in this section lists command line tricks and shortcuts which is basically a short introduction to essential Linux command usage such as finding files, text, disk usage etc.

Part 3: Network security and privacy

This section has three chapters and the first one introduces basic security landscape. The second chapter is dedicated to using ufw firewall. The third chapter discusses TPM and disk encryption with LUKS and home directory encryption with eCryptfs.,

Part 4: Ubuntu as a development platform

The last part of the book introduces Ubuntu as a developer focused platform. There are dedicated chapters on LXD (containerization), Multipass (for cloud-style virtualization) and MicroK8s (for Kubernetes).

What I like

This is a good introduction for someone who is familiar with Linux to some extent and wants to use it as a daily driver or main development environment.

The book is also filled with callouts to highlight important details.

Looking for an Ubuntu Manual? Try This Book

The chapter on Kubernetes features Microk8s, which is a handy tool for local Kubernetes deployment. This is smart and thoughtful. Most Kubernetes setup involves deploying multiple servers and that is not feasible for everyone.

The book has something for all kinds of Ubuntu users. You don't need to read the entire book, but you should find around 50% of the book suitable for your usecase irrespective of whether you are a desktop user, a sysadmin, devops or developer. Of course, Ubuntu should be your choice of Linux system here.

What I do not like

I feel that some times the book relies too much on text. For example, there is a section that discusses using the Software Center and I feel that it could have included more screenshots.

Looking for an Ubuntu Manual? Try This Book

Since there is so much to cover, the book sometimes only touches the surface of a topic. For example, the chapter on packages doesn't discuss the concept of sources.list. That's something that needs to be talked about, especially when it comes to fixing mistakes that might happen when third-party repositories are added without thinking.

But I understand that the author can also not go too much deep on a specific topic. If we have to cover packaging in Ubuntu in deep, it can be a book in itself.

Do we need a book in the age of unlimited internet and AI?

Well, yes and no. Looking for a specific information on the search engines can be daunting. We live in the age of information overload and getting the precise information from a trusted source is a challenge. A book solves this problem.

Another thing is that you can revisit sections of your favorite book as you know exactly where to look for a certain detail. A quick web search or AI query may seem quicker but you may not get the same answer that you were hoping to look for.

This is why I prefer having my own knowledge base with Obsidian or Logseq. I organize my own notes and refer to them when needed. These notes also contain snippets from various Linux books I read.

Conclusion

Whether you’re new to Ubuntu or have been using it for years, The Ultimate Ubuntu Handbook offers a wealth of practical tips, time-saving tricks, and insider insights that will help you get even more out of your Ubuntu experience.

Even experienced users will discover useful features and best practices they might not have explored on their own, making it a valuable companion for refining your workflow and boosting your productivity.

This isn’t just a reference; it’s a hands-on guide that makes Ubuntu easier, more secure, and more powerful for everyday use. If you want to confidently navigate Ubuntu 24.04 and unlock its full potential, this book is a must-have addition to your collection.

The author, Ken VanDine, has been working at Ubuntu for more than a decade, and he has a good understanding of what a "typical Ubuntu user" would want to learn, and it duly reflects in his book.

The Ultimate Ubuntu Handbook is available in print and digital format both on Packt and Amazon website.

The Ultimate Ubuntu Handbook on Packt
The Ultimate Ubuntu Handbook on Amazon
New Steam on Linux Market Share Stats 'Likely the Largest Surveyed Figure Ever'
/// 2 Aug 2025, 5:34 pm ////// Slashdot ///
"The July 2025 results of the Steam Survey were posted a few minutes ago," Phoronix reported last night, "and show a healthy 0.32% increase to put the Linux gaming marketshare at 2.89%." That's a recent high in percentage terms and while Steam saw around 3% in the early days of Steam on Linux a decade ago, in absolute terms this is likely the largest surveyed figure ever for the Linux gaming population. Linux was at 2.89% for July while macOS was at 1.88% and Windows at 95.23%. There does seem to be a jagged line that's trending upward... November: 2.03% December: 2.29% January: 2.06% February: 1.45% March: 2.33% April: 2.27% May: 2.69% June: 2.57% July: 2.89%

Read more of this story at Slashdot.

Fedora for Architects: Open Source Tools for Architectural Design
/// 4 Aug 2025, 8:00 am ////// Fedora Magazine ///

Why Fedora for Architects

Architects depend on digital tools for every stage of design, from sketching to modelling and documentation. But many popular tools are expensive, closed-source, or limited to specific platforms.

Fedora offers a fast, stable, and open environment for professional design work. With a growing ecosystem of free and open source software, architects can build a complete work-flow on Fedora, without sacrificing capability or control.

As an architect, I’d like to introduce how we can use Fedora for architectural design.

Fedora as Design Platform

Fedora Workstation is a solid choice for creative professionals. It is fast, up to date, and well-supported on a wide range of hardware, including laptops commonly used in architecture, like ThinkPads.

Fedora gives you access to a wide selection of open source applications through DNF, Flatpak, and COPR. Whether you’re installing stable packages or testing the latest versions, Fedora’s software ecosystem is flexible and developer-friendly.

With Wayland by default, good pen tablet support, and modern graphics drivers, Fedora handles demanding design tasks smoothly. It is a platform that gets out of the way, letting you focus on your ideas.

Open Source Tools for Architectural Design

Fedora supports a wide range of open source applications that can cover every stage of the architectural design process. From early sketching to 3D modelling, documentation, and even BIM. The following are some tools I use in practice.

Sketching and Early Concepts

Early-stage design relies on speed, intuition, and flexibility. On Fedora, you can use Krita for freehand sketching and expressive form exploration. Its brush engine and tablet support make it feel natural, especially when working through visual ideas. For quick annotations or tracing over site plans, Xournal++ offers a fast and lightweight interface. When you need to build simple diagrams or zoning layouts, LibreOffice Draw lets you combine shapes and text easily. These tools support a fluid design process, helping you stay focused on ideas, not technical barriers.

Drawing, Modelling, and Visualization

As your design develops, modelling becomes a way to explore space, proportion, and materiality. On Fedora, Blender offers a robust environment for 3D modelling, rendering, and animation. You can build conceptual massing studies, detailed geometry, and even walk-throughs or camera animations to communicate spatial experience. Real-time rendering in Blender with the Eevee rendering engine and photo-realistic output using the Cycles rendering engine make it possible to move quickly from model to image or video.

Blender

For precise 2D drafting, QCAD provides a clean and efficient workspace. It is useful for early layout studies, plans, and diagrams where clear lines matter more than complex parametrics.

QCAD

These tools help you move from form to image — and from image to motion — using an entirely open work-flow in the open source ecosystem.

Parametric and Algorithmic Design

Parametric design lets you build geometry through rules and relationships — making form more flexible and responsive. While visual tools like Grasshopper aren’t natively available on Linux, Blender offers a few promising options.

The Geometry Nodes system in Blender supports procedural modelling based on attributes, modifiers, and data flows. For a more Grasshopper-like experience, the Sverchok add-on brings node-based parametric design into Blender — allowing you to create complex structures with visual logic. You can learn more about Sverchok at https://nortikin.github.io/sverchok/

If you prefer scripting, Blender’s built-in Python API gives you full control for custom modelling and automation. While the ecosystem is still evolving, these tools offer a solid foundation for algorithmic thinking in open work-flows.

Building Information Modelling (BIM)

If you work with BIM, Fedora supports open source tools that follow open standards like IFC. FreeCAD includes an Arch workbench designed for architectural model modelling, with objects like walls, windows, and sections that carry semantic data. It also supports parametric editing and IFC export, making it suitable for early-stage modelling and coordination. You can learn more about FreeCAD BIM Workbench at https://wiki.freecad.org/BIM_Workbench/.

FreeCAD BIM Workbench

Bonsai, an add-on for Blender, brings IFC-based modelling and data editing into a powerful 3D environment. You can create, inspect, and modify BIM models directly in Blender, with full control over geometry and metadata — without relying on proprietary formats. You can learn more about Bonsai at https://bonsaibim.org/.

While open source BIM is still evolving, these tools already offer meaningful work-flows for concept modelling, coordination, and documentation — all while staying aligned with open data standards.

Graphic and Document Production

Architectural work involves more than modelling — it also requires clear visuals and well-structured documents. On Fedora, tools like Inkscape and GIMP help you produce diagrams, edit renderings, or refine presentation materials with full control over layout and image quality.

GIMP

For documentation, LibreOffice offers a reliable suite for writing specifications, reports, and schedules. If you prefer more control over formatting, LaTeX gives you a structured way to produce professional documents — especially when precision and consistency matter.

These tools help you communicate ideas clearly, whether for clients, collaborators, or construction teams.

Fedora Tips for Architects

Flatpak vs DNF

Many design tools are available through both Flatpak and DNF. Use Flatpak when you want easy access to the latest versions and isolated environments (e.g., graphics software), and DNF when you prefer tighter system integration and package control.

Pen Tablet Setup

Fedora detects most pen tablets automatically. You can configure pressure sensitivity, button mapping, and input area through GNOME Settings > Devices > Stylus, or use CLI tools like xsetwacom or libinput for advanced tweaks.

Fonts and Typography

Fedora provides a wide selection of high-quality free fonts through its repositories. You can install additional font packages using dnf, or manually place fonts in ~/.fonts/ for user-level use — useful when working on design boards or documents.

Version Control with Git

Even for design files, Git can help track changes and back up your work. Use it for versioning .blend, .svg, .fcstd, or even LaTeX files. For larger binaries, consider using Git LFS or structured folder snapshots.

Conclusion

Architecture is about more than form, it’s about intent, structure, and the systems that support them. The same applies to the tools we use. Choosing open source is not just about avoiding cost; it’s a decision to work with transparency, adaptability, and long-term agency.

Fedora offers a platform where design and freedom coexist, where architects can shape their tools as much as they shape space. It may not have every convenience out of the box, but it gives us something more enduring: control over our work-flow, and a community-driven path forward.

Designing openly is not always the easiest path, but it may be the most honest one.

Legal
[Privacy Statement]
[Terms Of Service]
[ Licenses]
[ Citation]
[ What Is Copyleft ]
Impact
[Social Benefit Award ]
[Advancement of Free Software Award]
[Open Source Organizations]
[Userspace Mission]
Resources
[Linux Founation Event List]
[EdX - Free Online Courses]
[Free Computer EBooks]
[Supported Hardware]

Design by [Daniel Yount] ::: Powered By [WordPress] ::: Encrypted By [LetsEncrypt]

 L O A D I N G 
General Contact Email

    [md-form]

    [md-text label="Your Name"]

    [/md-text]

    [md-text label="Your Email"]

    [/md-text]

    ENTER "QUESTION:" IN MESSAGE OR IT WONT BE SENT.
    [md-textarea label="Message"]

    [/md-textarea]

    [md-submit]

    [/md-submit]

    [/md-form]