On the Lawrence Systems Forums
Tony Bemus, Tom Lawrence, Phil Porada and Jay LaCroix
Sound bites by Mike Tanner
The LawrenceSystems YouTube Channel Where videos
Jay’s Bash Prompt https://pastebin.com/kzPjE8y4
South Korea will ditch Microsoft Windows for Linux
List of Linux adopters
The attacks can be launched with the help of specially crafted TCP packets sent to vulnerable Linux boxes which can trigger use-after-free errors and enable the attackers to execute arbitrary code on the target system.
The remotely exploitable vulnerability has been assigned a 8.1 high severity base score by NIST’s NVD, it is being tracked as CVE-2019-11815 (Red Hat, Ubuntu, SUSE, and Debian) and it could be abused by unauthenticated attackers without interaction from the user.
Nextcloud 16 introduces machine learning based security and usability features, ACL permissions and cross-app projects
History of the OwnCloud to NextCloud Fork
Six more devices from ThinkPenguin, Inc. now FSF-certified to Respect Your Freedom
Linux Kernel’s Perf Now Supports Zstd-Compressed Trace Recording
It’s not just Huawei. Trump’s new tech sector order could ripple through global supply chains.
Executive Order on Securing the Information and Communications Technology and Services Supply Chain
Ann Arbor Tech Trak – June 7, 2019
Hack:A2 – June 8, 2019
Next Generation Plasma Notifications
Tilix Terminal Emulator Needs a New Maintainer
Mozilla Had A Rough Night With Add-Ons Getting Disabled Due To An Expired Certificate
What is a zombie process?
Centos8 build cycle and status
FCC to combat robocalls (finally wow, great job team, /sarcasm)
Today we are announcing a new Certificate Transparency log called Oak. The Oak log will be operated by Let’s Encrypt and all publicly trusted certificate authorities will be welcome to submit certificates.
Certificate Transparency (CT) is a system for logging and monitoring certificate issuance. It greatly enhances everyone’s ability to monitor and study certificate issuance, and these capabilities have led to numerous improvements to the CA ecosystem and Web security. As a result, it is rapidly becoming critical Internet infrastructure. Let’s Encrypt accelerated the adoption of CT by logging every certificate since we started issuing in 2015 – approximately half a billion certificates at this point.
Microarchitectural Data Sampling “MDS” vulnerabilities now known more commonly as Zombieload
This content is published under the Attribution-Noncommercial-Share Alike 3.0 Unported license.