SMLR Episode 275 Did you hear laurel? yanny? We heard Linux
Podcast: Play in new window
Subscribe: Apple Podcasts | RSS
Downloads:
MP3 format (for Freedom Haters!)
OGG format (for Freedom Lovers!)
Contact Us:
show (at) smlr.us or the Contact us page
Intro:
Tony Bemus, Tom Lawrence, Phil Porada and Mary Tomich
Sound bites by Mike Tanner
Phils GitHub
The LawrenceSystems YouTube Channel Where videos
https://www.youtube.com/user/TheTecknowledge
Tech News:
Introducing Git protocol version 2
https://opensource.googleblog.com/2018/05/introducing-git-protocol-version-2.html?m=1
Kdenlive 18.04.1 released
https://kdenlive.org/en/2018/05/kdenlive-18-04-1-released/
Congratulations to Tesla on Their First Public Step Toward GPL Compliance
https://sfconservancy.org/blog/2018/may/18/tesla-incomplete-ccs/
Open source’s big German win: 300,000 users shift to Nextcloud for file sharing
Git Branching Guide
https://opensource.com/article/18/5/git-branching
AMD Ryzen 5 2600 / Ryzen 7 2700 Benchmarks On Linux, 9-Way Ubuntu CPU Comparison
https://www.phoronix.com/scan.php?page=article&item=ryzen-2600-2700&num=1
Malware in Snap
https://www.omgubuntu.co.uk/2018/05/ubuntu-snap-malware
Packets over a LAN are all it takes to trigger serious Rowhammer bit flips
Lutris – https://lutris.net/
Lutris is an open source gaming platform for GNU/Linux. It allows you to gather and manage (install, configure and launch) all your games acquired from any source, in a single interface.
- Easier than PlayOnLinux
- Way easier than Wine and Winetricks
0ad – https://play0ad.com/
Wildfire Games, an international group of volunteer game developers, proudly announces the release of 0 A.D. Alpha 23 “Ken Wood”, the twenty-third alpha version of 0 A.D., a free, open-source real-time strategy game of ancient warfare.
It’s been in development since 2001. Ken Wood was a chief designer of 0ad before passing away.
Jagged Alliance 2 Straciatella – https://ja2-stracciatella.github.io/
An improved, cross-platform, stable Jagged Alliance 2 runtime
The goal of the project is to make Jagged Alliance 2 available on a wide range of platforms, improve its stability, fix bugs and provide a stable platform for mod development. Moddability is still in the early stages.
- Been playing this since 2000
Steam controller kernel support – https://www.phoronix.com/scan.php?page=news_item&px=Steam-Controller-Linux-4.18
The Linux 4.18 kernel will feature the initial Steam Controller kernel driver that works without having to use the Steam client or using third-party user-space applications like the SC-Controller application.
The Linux 4.18 merge window will open up around mid-June when this new HID driver will land while the Linux 4.18 stable kernel should debut by September. Linux 4.18 is what should make it into the Ubuntu 18.10 and Fedora 29 releases this autumn.
- Haptic feedback is cool. – recreates the sense of touch by applying forces, vibrations, or motions to the user.
Asteroid OS – https://asteroidos.org/#
AsteroidOS is built on standard Linux technologies including OpenEmbedded, opkg, Wayland, Qt5, systemd, BlueZ, and PulseAudio. This makes it the ideal platform to build any sort of wearable project you can imagine. Do you want to run Docker on your watch? AsteroidOS can do it. Do you want to run Quake on your watch? AsteroidOS can do that too.
Nethammer – https://thehackernews.com/2018/05/remote-rowhammer-attack.html
If you are unaware, Rowhammer is a critical issue with recent generation dynamic random access memory (DRAM) chips in which repeatedly accessing a row of memory can cause “bit flipping” in an adjacent row, allowing attackers to change the contents of the memory.
Researchers tested Nethammer for the three cache-bypass techniques:
- A kernel driver that flushes (and reloads) an address whenever a packet is received.
- Intel Xeon CPUs with Intel CAT for fast cache eviction
- Uncached memory on an ARM-based mobile device.
All three scenarios are possible, researchers showed.
In their experimental setup, researchers were successfully able to induce a bit flip every 350 ms by sending a stream of UDP packets with up to 500 Mbit/s to the target system.
Since the Nethammer attack technique does not require any attack code in contrast to a regular Rowhammer attack, for example, no attacker-controlled code on the system, most countermeasures do not prevent this attack.
This content is published under the Attribution-Noncommercial-Share Alike 3.0 Unported license.