Author: ProHoster

Kubernetes 1.16: Highlights of what's new

Today, Wednesday, the next release of Kubernetes will take place - 1.16. According to the tradition that has developed for our blog, this is the tenth anniversary time we are talking about the most significant changes in the new version. Information used to prepare this material was taken from the Kubernetes enhancements tracking table, CHANGELOG-1.16 and related issues, pull requests, and Kubernetes Enhancement Proposals […]

GNOME adapted for systemd management

Benjamin Berg, one of the Red Hat engineers involved in the development of GNOME, summarized the work on transitioning GNOME to session management exclusively through systemd, without the use of the gnome-session process. To manage login to GNOME, systemd-logind has been used for quite some time, which monitors session states in relation to the user, manages session identifiers, is responsible for switching between active sessions, […]

Baikal-M processor introduced

The Baikal Electronics company at the Microelectronics 2019 Forum in Alushta presented its new Baikal-M processor, designed for a wide range of target devices in the consumer and B2B segments. Technical specifications: http://www.baikalelectronics.ru/products/238/ Source: linux.org.ru

US Provider Associations opposed centralization in the implementation of DNS-over-HTTPS

Trade associations NCTA, CTIA and USTelecom, which defend the interests of Internet service providers, asked the US Congress to pay attention to the problem with the implementation of “DNS over HTTPS” (DoH, DNS over HTTPS) and request detailed information from Google about current and future plans for enable DoH in their products, and also obtain a commitment not to enable centralized processing by default […]

Release ClamAV 0.102.0

An entry about the release of program 0.102.0 appeared on the blog of the ClamAV antivirus, developed by Cisco. Among the changes: transparent checking of opened files (on-access scanning) was moved from clamd to a separate clamonacc process, which made it possible to organize clamd operation without root privileges; The freshclam program has been redesigned, adding support for HTTPS and the ability to work with mirrors that process requests on […]

Internet shutdown in Iraq

Against the backdrop of ongoing riots, an attempt was made to completely block access to the Internet in Iraq. Currently, connectivity with approximately 75% of Iraqi providers has been lost, including all major telecom operators. Access remains only in some cities in northern Iraq (for example, the Kurdish Autonomous Region), which have a separate network infrastructure and autonomous status. Initially, authorities tried to block access […]

Firefox 69.0.2 Corrective Update

Mozilla has released a corrective update to Firefox 69.0.2. Three errors were fixed in it: a crash when editing files on the Office 365 website was fixed (bug 1579858); fixed errors related to enabling parental controls in Windows 10 (bug 1584613); Fixed a Linux-only bug that caused a crash when the video playback speed in YouTube was changed (bug 1582222). Source: […]

Cisco has released a free antivirus package ClamAV 0.102

Cisco has announced a major new release of its free antivirus suite, ClamAV 0.102.0. Let us recall that the project passed into the hands of Cisco in 2013 after the purchase of Sourcefire, the company developing ClamAV and Snort. The project code is distributed under the GPLv2 license. Key improvements: The functionality of transparent checking of opened files (on-access scanning, checking at the time of file opening) has been moved from clamd to a separate process […]

New side-channel attack technique to recover ECDSA keys

Researchers from the University. Masaryk disclosed information about vulnerabilities in various implementations of the ECDSA/EdDSA digital signature creation algorithm, which make it possible to restore the value of a private key based on an analysis of leaks of information about individual bits that emerge when using third-party analysis methods. The vulnerabilities were codenamed Minerva. The most well-known projects that are affected by the proposed attack method are OpenJDK/OracleJDK (CVE-2019-2894) and […]

Permissions in Linux (chown, chmod, SUID, GUID, sticky bit, ACL, umask)

Hi all. This is a translation of an article from the book RedHat RHCSA RHCE 7 RedHat Enterprise Linux 7 EX200 and EX300. From myself: I hope the article will be useful not only for beginners, but also help more experienced administrators organize their knowledge. So, let's go. To access files in Linux, permissions are used. These permissions are assigned to three objects: the owner of the file, the owner […]

Why do you need a support service that does not support?

Companies announce artificial intelligence in their automation, talk about how they have implemented a couple of cool customer service systems, but when we call technical support, we continue to suffer and listen to the suffering voices of operators with hard-won scripts. Moreover, you probably noticed that we, IT specialists, perceive and evaluate the work of numerous customer support services of service centers, IT outsourcers, car services, help desks […]