2017-W40 2 October – 8 October 2017

Total Page:16

File Type:pdf, Size:1020Kb

Load more

Weekly IT Security News Bulletin, 2017-W40 2 October – 8 October 2017 Headlines Seven vulnerabilities found in Dnsmasq Dnsmasq is a software package commonly pre-installed in Linux-based routers, servers and IoT devices for providing DNS, DHCP, router advertisement and network boot functions. It is also widely used for tethering on Android smartphones. The Google Security Team recently found it vulnerable to remote code execution, denial of services and information disclosure. The Google team discovered seven vulnerabilities that could be exploited when specially crafted DNS or DHCP packets are received by the systems running the vulnerable Dnsmasq. After the exploitations, attackers could gain further access to internal networks and bypass security protections. Proof-of-concept exploit code has been publicly available to demonstrate the flaws. Linux operating systems with Dnsmasq version prior to 2.78 and Android systems with security patch level before 1st October 2017 are affected. Common Linux distributions, including CentOS, Debian, Oracle Linux, RedHat, SUSE and Ubuntu, have patches released for fixing the flaws. Android users have to wait for patches from the corresponding device manufacturers. De-supported devices may however never be patched. Advice Apply patches to the Linux and Android operating systems whenever they are available. Replace end-of-support devices to avoid the security risk of using systems without update patches available. Disable tethering on Android smartphones before they have been patched. Disable the Dnsmasq service on Linux systems if its functions are not necessary for the systems. Sources Google Bleeping Computer Threatpost GovCERT.HK Weekly IT Security News Bulletin 2017-W40 1 Top mobile apps blacklisted by enterprises A US-based mobile security company published the top 10 Android and iOS applications (apps) that are blacklisted by enterprises. The iOS app that tops the list is WhatsApp, which is rated high-risk because it sends the phone’s address book information to a remote server. What follows is Pokemon GO, which accesses a device’s address book, camera and geolocation. Winzip is the third common iOS app banned since it sends SMS messages out. Most blacklisted iOS apps are for social networking and entertainment. These apps’ behaviours are considered risky by enterprises for fear of data leakage. On the other hand, the blacklisted Android apps are mostly software tools, such as Poot, which tops the list, is to root the Android device. The second and third places are AndroidSystemTheme and Where’s My Droid Pro, which are also utilities. Some banned Android apps track user locations or send data unencrypted while most even exhibit malicious behaviour and detected as carrying malware. Advice Assess the associated risks carefully to formulate enterprise mobile device policies such as application whitelisting or Bring-Your-Own-Device (BYOD) and communicate the policies to all staff. Install mobile apps only from trusted sources. Check for unnecessary permission requests when installing or upgrading mobile apps; stop and uninstall those suspicious apps. Install anti-malware apps on mobile devices and keep them update. Avoid sending sensitive or personal information via social networking apps. Sources SecurityWeek Bleeping Computer Appthority GovCERT.HK Weekly IT Security News Bulletin 2017-W40 2 Product Vulnerability Notes & Security Updates 1. Apache Tomcat https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.23 https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.1 2. Apple iOS and MacOS https://support.apple.com/kb/HT208164 https://support.apple.com/kb/HT208165 https://www.hkcert.org/my_url/en/alert/17100401 3. CentOS https://lists.centos.org/pipermail/centos-announce/2017-September/022550.html https://lists.centos.org/pipermail/centos-announce/2017-September/022551.html https://lists.centos.org/pipermail/centos-announce/2017-September/022552.html https://lists.centos.org/pipermail/centos-announce/2017-September/022553.html https://lists.centos.org/pipermail/centos-announce/2017-October/022554.html https://lists.centos.org/pipermail/centos-announce/2017-October/022555.html 4. Cisco Products https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-anam https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-asa1 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-clm https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cma https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-cms https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-fpsnort https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ftd https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ncs https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-sprk https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-ucm https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-waas https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-waas1 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-wms 5. Debian https://www.debian.org/security/2017/dsa-3986 https://www.debian.org/security/2017/dsa-3987 https://www.debian.org/security/2017/dsa-3988 https://www.debian.org/security/2017/dsa-3989 https://www.debian.org/security/2017/dsa-3990 https://www.debian.org/security/2017/dsa-3991 6. F5 Traffix SDC https://support.f5.com/csp/article/K62178133 https://support.f5.com/csp/article/K71796229 7. GE CIMPLICITY https://ics-cert.us-cert.gov/advisories/ICSA-17-278-01 8. IBM Products http://www-01.ibm.com/support/docview.wss?uid=swg22008547 GovCERT.HK Weekly IT Security News Bulletin 2017-W40 3 http://www-01.ibm.com/support/docview.wss?uid=swg22009232 http://www-01.ibm.com/support/docview.wss?uid=swg22009253 9. Mageia http://advisories.mageia.org/MGASA-2017-0354.html http://advisories.mageia.org/MGASA-2017-0355.html http://advisories.mageia.org/MGASA-2017-0356.html http://advisories.mageia.org/MGASA-2017-0357.html http://advisories.mageia.org/MGASA-2017-0358.html http://advisories.mageia.org/MGASA-2017-0359.html http://advisories.mageia.org/MGASA-2017-0360.html http://advisories.mageia.org/MGASA-2017-0361.html 10. openSUSE https://lists.opensuse.org/opensuse-security-announce/2017-09/msg00084.html https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00002.html https://lists.opensuse.org/opensuse-security-announce/2017-10/msg00006.html 11. Oracle Linux https://linux.oracle.com/errata/ELSA-2017-2836.html https://linux.oracle.com/errata/ELSA-2017-2838.html https://linux.oracle.com/errata/ELSA-2017-2840.html https://linux.oracle.com/errata/ELSA-2017-2860.html 12. Red Hat https://access.redhat.com/errata/RHSA-2017:2836 https://access.redhat.com/errata/RHSA-2017:2837 https://access.redhat.com/errata/RHSA-2017:2838 https://access.redhat.com/errata/RHSA-2017:2839 https://access.redhat.com/errata/RHSA-2017:2840 https://access.redhat.com/errata/RHSA-2017:2841 https://access.redhat.com/errata/RHSA-2017:2858 https://access.redhat.com/errata/RHSA-2017:2860 https://access.redhat.com/errata/RHSA-2017:2863 13. Siemens 7KT PAC1200 data manager https://ics-cert.us-cert.gov/advisories/ICSA-17-278-02 14. Slackware http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware- security.375371 http://www.slackware.com/security/viewer.php?l=slackware-security&y=2017&m=slackware- security.601472 15. SUSE https://www.suse.com/support/update/announcement/2017/suse-su-20172598-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172601-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172616-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172617-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172618-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172619-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172627-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172628-1/ GovCERT.HK Weekly IT Security News Bulletin 2017-W40 4 https://www.suse.com/support/update/announcement/2017/suse-su-20172649-1/ https://www.suse.com/support/update/announcement/2017/suse-su-20172650-1/ 16. Ubuntu https://usn.ubuntu.com/usn/usn-3430-1/ https://usn.ubuntu.com/usn/usn-3430-2/ https://usn.ubuntu.com/usn/usn-3431-1/ https://usn.ubuntu.com/usn/usn-3432-1/ https://usn.ubuntu.com/usn/usn-3433-1/ https://usn.ubuntu.com/usn/usn-3434-1/ https://usn.ubuntu.com/usn/usn-3435-1/ https://usn.ubuntu.com/usn/usn-3435-2/ https://usn.ubuntu.com/usn/usn-3437-1/ https://usn.ubuntu.com/usn/usn-3438-1/ https://usn.ubuntu.com/usn/usn-3439-1/ Sources of product vulnerability information: Apache Tomcat Apple CentOS Cisco Debian F5 HKCERT IBM ICS-CERT Mageia openSUSE Oracle Linux Red Hat Slackware SUSE Ubuntu Contacts: [email protected] GovCERT.HK Weekly IT Security News Bulletin 2017-W40 5 .
Recommended publications
  • CIS Debian Linux 7 Benchmark V1.0.0 - 12-31-2015

    CIS Debian Linux 7 Benchmark V1.0.0 - 12-31-2015

    CIS Debian Linux 7 Benchmark v1.0.0 - 12-31-2015 http://benchmarks.cisecurity.org The CIS Security Benchmarks division provides consensus-oriented information security products, services, tools, metrics, suggestions, and recommendations (the “SB Products”) as a public service to Internet users worldwide. Downloading or using SB Products in any way signifies and confirms your acceptance of and your binding agreement to these CIS Security Benchmarks Terms of Use. CIS SECURITY BENCHMARKS TERMS OF USE BOTH CIS SECURITY BENCHMARKS DIVISION MEMBERS AND NON-MEMBERS MAY: Download, install, and use each of the SB Products on a single computer, and/or Print one or more copies of any SB Product that is in a .txt, .pdf, .doc, .mcw, or .rtf format, but only if each such copy is printed in its entirety and is kept intact, including without limitation the text of these CIS Security Benchmarks Terms of Use. UNDER THE FOLLOWING TERMS AND CONDITIONS: SB Products Provided As Is. CIS is providing the SB Products “as is” and “as available” without: (1) any representations, warranties, or covenants of any kind whatsoever (including the absence of any warranty regarding: (a) the effect or lack of effect of any SB Product on the operation or the security of any network, system, software, hardware, or any component of any of them, and (b) the accuracy, utility, reliability, timeliness, or completeness of any SB Product); or (2) the responsibility to make or notify you of any corrections, updates, upgrades, or fixes. Intellectual Property and Rights Reserved. You are not acquiring any title or ownership rights in or to any SB Product, and full title and all ownership rights to the SB Products remain the exclusive property of CIS.
  • A Letter to the FCC [PDF]

    A Letter to the FCC [PDF]

    Before the FEDERAL COMMUNICATIONS COMMISSION Washington, DC 20554 In the Matter of ) ) Amendment of Part 0, 1, 2, 15 and 18 of the ) ET Docket No. 15­170 Commission’s Rules regarding Authorization ) Of Radio frequency Equipment ) ) Request for the Allowance of Optional ) RM­11673 Electronic Labeling for Wireless Devices ) Summary The rules laid out in ET Docket No. 15­170 should not go into effect as written. They would cause more harm than good and risk a significant overreach of the Commission’s authority. Specifically, the rules would limit the ability to upgrade or replace firmware in commercial, off­the­shelf home or small­business routers. This would damage the compliance, security, reliability and functionality of home and business networks. It would also restrict innovation and research into new networking technologies. We present an alternate proposal that better meets the goals of the FCC, not only ensuring the desired operation of the RF portion of a Wi­Fi router within the mandated parameters, but also assisting in the FCC’s broader goals of increasing consumer choice, fostering competition, protecting infrastructure, and increasing resiliency to communication disruptions. If the Commission does not intend to prohibit the upgrade or replacement of firmware in Wi­Fi ​ ​ devices, the undersigned would welcome a clear statement of that intent. Introduction We recommend the FCC pursue an alternative path to ensuring Radio Frequency (RF) compliance from Wi­Fi equipment. We understand there are significant concerns regarding existing users of the Wi­Fi ​ spectrum, and a desire to avoid uncontrolled change. However, we most strenuously advise against prohibiting changes to firmware of devices containing radio components, and furthermore advise against allowing non­updatable devices into the field.
  • Leafpad Download

    Leafpad Download

    Leafpad download LINK TO DOWNLOAD Download Leafpad Latest Version for Linux – The last but not least software you can take as an option for a text editor is Leafpad. Have you ever heard about it before? If not, let’s come to define it based on Wikipedia. Well, it is stated that Leafpad is an open source . Download Leafpad for Linux - Leafpad is a GTK based simple text editor. 11/5/ · I n this article, we are going to learn How to install Leafpad Linux text editor in Ubuntu. Leafpad is a nice open-source text editor for Linux. It’s not an advanced text editor like vi but a simple lightweight GTK+ based user-friendly text editor application comes with some basic features mentioned below.. Print documents. Search for any phrase or word & replace it. The Leafpad program tool can be installed in such operational systems, as Linux, FreeBSD and Maemo. Among the disadvantages of the utility is the absence of syntax highlight and the capability of non- printed (system) symbols display. For close acquaintance with the app abilities, just download Leafpad for free from the official web-resource. Leafpad - posted in Linux How-To and Tutorial Section: Leafpad is a basic text renuzap.podarokideal.rues: Display line numbers - Limitless undo/redo Installation instructions are provided below by. Leafpad is not available for Windows but there are plenty of alternatives that runs on Windows with similar functionality. The most popular Windows alternative is Notepad++, which is both free and Open renuzap.podarokideal.ru that doesn't suit you, our users have ranked more than 50 alternatives to Leafpad and loads of them are available for Windows so hopefully you can find a suitable replacement.
  • An User & Developer Perspective on Immutable Oses

    An User & Developer Perspective on Immutable Oses

    An User & Developer Perspective on Dario Faggioli Virtualization SW. Eng. @ SUSE Immutable OSes [email protected] dariof @DarioFaggioli https://dariofaggioli.wordpress.com/ https://about.me/dario.faggioli About Me What I do ● Virtualization Specialist Sw. Eng. @ SUSE since 2018, working on Xen, KVM, QEMU, mostly about performance related stuff ● Daily activities ⇒ how and what for I use my workstation ○ Read and send emails (Evolution, git-send-email, stg mail, ...) ○ Write, build & test code (Xen, KVM, Libvirt, QEMU) ○ Work with the Open Build Service (OBS) ○ Browse Web ○ Test OSes in VMs ○ Meetings / Video calls / Online conferences ○ Chat, work and personal ○ Some 3D Printing ○ Occasionally play games ○ Occasional video-editing ○ Maybe scan / print some document 2 ● Can all of the above be done with an immutable OS ? Immutable OS: What ? Either: ● An OS that you cannot modify Or, at least: ● An OS that you will have an hard time modifying What do you mean “modify” ? ● E.g., installing packages ● ⇒ An OS on which you cannot install packages ● ⇒ An OS on which you will have an hard time installing packages 3 Immutable OS: What ? Seriously? 4 Immutable OS: Why ? Because it will stay clean and hard to break ● Does this sound familiar? ○ Let’s install foo, and it’s dependency, libfoobar_1 ○ Let’s install bar (depends from libfoobar_1, we have it already) ○ Actually, let’s add an external repo. It has libfoobar_2 that makes foo work better! ○ Oh no... libfoobar_2 would break bar!! ● Yeah. It happens. Even in the best families distros
  • Fedora Astronomy the Benefits for Astronomical Software from Integration Into Linux Distributions

    Fedora Astronomy the Benefits for Astronomical Software from Integration Into Linux Distributions

    Fedora Astronomy The benefits for astronomical software from integration into Linux distributions Christian Dersch AG Astronomie, Philipps-Universität Marburg June 27, 2018 History of Fedora Astronomy 2003 Fedora has been founded, successor of Red Hat Linux, some basic packages like cfitsio right from beginning 2008 Fedora SciTech Special Interest Group (SIG) has been founded Fedora Astronomy SIG has been founded 2008 - Packaging of many important astronomical software 2016 Fedora Astronomy Lab released with Fedora 24 Christian Dersch (Uni Marburg) Fedora Astronomy June 27, 2018 2 / 17 Fedora Science & Technology SIG As many packages and tasks are not unique to a specific scientific domain: Fedora SciTech (Science & Technology) SIG has been founded Takes care of packaging of general packages, e.g. Python SciPy-Stack, TeXLive and Sage Package groups for scientific applications Handles questions like handling of BLAS/LAPACK implementations Contact for user questions https://fedoraproject.org/wiki/Category:SciTech_SIG Christian Dersch (Uni Marburg) Fedora Astronomy June 27, 2018 3 / 17 Fedora Astronomy SIG The Astronomy SIG works on top of SciTech: Takes care of software and tasks specific for astronomy Creates ready to use live environment (installable): Astronomy Lab Coordinates collaboration with other distribution projects Fedora is “bazaar” style: everyone can follow and contribute, development is transparent, currently 4-5 active members Point of contact for users (Mailing list, IRC etc.) Important: Be interesting for both amateurs and professionals
  • The BIG Change for Opensuse Leap 15.3 About Me

    The BIG Change for Opensuse Leap 15.3 About Me

    The BIG Change for openSUSE Leap 15.3 About Me openSUSE Manager Hobbies ● Marketing/PR ● Fantasy Sports ● Event Organizer ● Mining ● Coordinate Event ● Series Binge Watcher Sponsorship Interesting Fact Education Christopher Reeve was ● MBA - Business to blame for me breaking my arm ● BA - Education Douglas DeMaio (Superman 1978) V International GNU Health Conference - Nov. 20 - 21, online event - #GHCon2020 The Way to openSUSE Leap 15.3 bout Me !losing the Leap Gap What is it & why does it matter. Jump 15.&.1 Leap 15.3 The efforts to change What to expect with in how a distribution is coming releases of this built openSUSE distribution What is openSUSE Leap Leap is trying to bridge “Community and Enterprise” the distribution is based on the latest version of SUSE Linux Enterprise available to the date, typically with a 12 months release cycle. Leap 15.2 Retrospective told us that users value most the installer, stability, seamless migrations, and YaST. These would be then our strengths according to users! The distribution is often profiled as the more stable one and easy to use as there should be no radical or disruptive changes in between minor updates. Some users say It’s the KDE distribution. Box says “The Linux Distribution for Beginners and Pros” !"osing the Leap Gap ● CtLG is a SUSE driven effort to bring Leap closer to SUSE Linux Enterprise than ever before. This brings quite some challenges but also open some new opportunities. ● Unification of openSUSE Leap and SUSE Linux Enterprise 15 code streams and feature set. ● Concept of building a community distribution by combining rpms from openSUSE Backports (community part) and SUSE signed SLE rpms (Enterprise part).
  • Zypper Cheat Sheet Or Type M an Zypper on a Terminal

    Zypper Cheat Sheet Or Type M an Zypper on a Terminal

    More Information: Page 1 Zypper Cheat Sheet https://en.opensuse.org/SDB:Zypper_usage or type m an zypper on a terminal For Zypper version 1.0.9 Package Management Source Packages and Build Dependencies Basic Help Selecting Packages zypper source-install or zypper si Examples: zypper #list the available global options and commands By capability name: zypper si zypper zypper help [command] #Print help for a specific command zypper in 'perl(Log::Log4perl)' Install only the source package zypper shell or zypper sh #Open a zypper shell session zypper in qt zypper in -D zypper By capability name and/or architecture and/or version Install only the build dependencies zypper in 'zypper<0.12.10' Repository Management zypper in -d zypper zypper in zypper.i586=0.12.11 Listing Defined Repositories By exact package name (--name) Updating Packages zypper in -n ftp zypper repos or zypper lr By exact package name and repository (implies --name) zypper update or zypper up Examples: zypper in factory:zypper Examples: zypper lr -u #include repo URI on the table By package name using wildcards zypper up #update all installed packages zypper lr -P #include repo priority and sort by it zypper in yast*ftp* with newer version as far as possible By specifying a .rpm file to install zypper up libzypp zypper #update libzypp Refreshing Repositories zypper in skype-2.0.0.72-suse.i586.rpm and zypper zypper refresh or zypper ref zypper in sqlite3 #update sqlite3 or install Installing Packages Examples: if not yet installed zypper ref packman main #specify repos to be
  • Article, Written by Wobo in Early October 2010, Published in Print in Linux User, Issue # 11/2010 (In German)

    Article, Written by Wobo in Early October 2010, Published in Print in Linux User, Issue # 11/2010 (In German)

    Article, written by wobo in early October 2010, published in print in Linux User, issue # 11/2010 (in German) (translated to English for Mageia by wobo) Introduction Numerous economical problems in the French company Mandriva SA have finally been answered by the community: former employees and free developpers have decided to build a plattform to continue the development of the distribution as a free and open community project. Article The 19th September marked a turning point in the history of the Distribution currently known as Mandriva Linux: Several former employees of Mandriva SA announced the intention to found a nonprofit organization that wishes to continue the distribution Mandriva Linux in a fork as a community project [1 ]. The reasons for this step go back to the year 2005: at that time the newcomer Ubuntu appeared on the scene simultaneously with the restructuring of the ailing Mandriva SA (see box of MandrakeSoft to Mandriva on the next spread). While this newcomer gained more and more popularity Mandriva failed to start a positive trend in its business and critical voices in the community arose about the Mandriva management. Mandriva©s business and communication policy met a rising reluctance of users and free developers. A key moment in this crisis was certainly the lay-off of company co-founder Gael Duval, along with popular community leaders (like Adam Williamson) and well known freelancers [2]. Downward trend Despite numerous cuts in various business areas the decline of Mandriva SA continued unabated. In spring 2010 the company was on the brink of bankruptcy and started initial negotiations with interested buyers.
  • Snort 2.9.9.X on Opensuse Leap 42.2

    Snort 2.9.9.X on Opensuse Leap 42.2

    Snort Installation on openSUSE Leap 42.2 64 bits Boris A. Gómez Universidad Tecnológica de Panamá July 2017 About This Guide This guide has been tested on openSUSE Leap 42.2, 64 bits, using DAQ 2.0.6 and Snort 2.9.9.0. Software was installed in a virtual machine: Virtual Machine Manager: VirtualBox 5.1.22 or KVM 1.4.0 HOST operating system: Windows 7 or openSUSE Leap 42.2 GUEST operating system: openSUSE Leap 42.2 (Snort will be installed here) For clarity, the following color code was used: Orange – commands that the user types at the shell prompt. Blue – text inside of configuration files. Purple – text to focus your attention on. This guide is based on the document "Snort 2.9.8.x on OpenSuSE 13x" by William Parker. Network Card Configuration Run VirtualBox | KVM manager and configure the network section of the guest machine to bridge mode. KVM Manager: VirtualBox Manager: Guest Machine Start your guest machine and set its network interface card to a static IP, for example 192.168.99.10, then check settings: ifconfig eth0 Link encap:Ethernet HWaddr 08:00:27:50:CA:99 inet addr: 192.168.99.10 Bcast:192.168.99.255 Mask:255.255.255.0 Verify that you can access Internet by accessing a web page, for example: https://snort.org Before proceeding, it is advisable to update the system. Required Packages Use YAST to install the following packages: gcc version 4.8.x (including libraries: libgcc_s1 (5.3.1), libgcc_s1-32bit(5.3.1)) flex (2.5.37) bison (2.7) php5-zlib (5.5.14 including zlib-devel 1.2.8) libpcap1 (1.8.1 including libpcap-devel 1.8.1) (versions must match) libpcre1 (8.39 including pcre-devel 8.39 and libpcre1-32bit 8.39) (versions must match) libdnet1 (1.12 including libdnet-devel 1.12) (versions must match) tcpdump (4.5.1).
  • Integrating New Major Components on Fast and Slow Moving Distributions

    Integrating New Major Components on Fast and Slow Moving Distributions

    IntegratingIntegrating newnew majormajor componentscomponents onon fastfast andand slowslow movingmoving distributionsdistributions How latest GNOME desktop was integrated into latest SUSE / openSUSE releases Frédéric Crozat <[email protected]> SUSE Linux Enterprise Release Manager What we don’t do What we do DistributionDistribution deliverydelivery stylesstyles 4 Three distributions styles ● Rolling: – Bleeding edge – Release as soon as possible – Example: openSUSE Tumbleweed, ArchLinux, Gentoo ● Regular: – Release one to twice a year – Update their entire stack for each release – Example: Ubuntu, Fedora, Debian ● LTS / Enterprise: – Slow cadence (yearly or even less than that) – Very few things move between sub-releases – Example: openSUSE Leap, Ubuntu LTS, SLES/SLED, RHEL 5 openSUSE/SUSE terminology ● OBS = OpenBuildService ● SLE = SUSE Linux Enterprise (Server / Desktop) – Enterprise distribution, developed by SUSE ● openSUSE Tumbleweed: – openSUSE Rolling release, by openSUSE, using only Factory packages, tested by openQA ● openSUSE Factory: – Development repository for Tumbleweed ● openSUSE Leap: – openSUSE Stable release, based on SLE common code + Packages from Factory (or specific repository) 6 IntegrationIntegration processprocess 7 OBS and Devel project ● On OBS, every source package is handled in a project which can build several packages together ● openSUSE Tumbleweed uses devel project per “topic” (KDE, GNOME, X11, …) ● Changes (patch, version update) are done in Devel projects and then, pushed to “main” distribution for
  • Introduction to Fmxlinux Delphi's Firemonkey For

    Introduction to Fmxlinux Delphi's Firemonkey For

    Introduction to FmxLinux Delphi’s FireMonkey for Linux Solution Jim McKeeth Embarcadero Technologies [email protected] Chief Developer Advocate & Engineer For quality purposes, all lines except the presenter are muted IT’S OK TO ASK QUESTIONS! Use the Q&A Panel on the Right This webinar is being recorded for future playback. Recordings will be available on Embarcadero’s YouTube channel Your Presenter: Jim McKeeth Embarcadero Technologies [email protected] | @JimMcKeeth Chief Developer Advocate & Engineer Agenda • Overview • Installation • Supported platforms • PAServer • SDK & Packages • Usage • UI Elements • Samples • Database Access FireDAC • Migrating from Windows VCL • midaconverter.com • 3rd Party Support • Broadway Web Why FMX on Linux? • Education - Save money on Windows licenses • Kiosk or Point of Sale - Single purpose computers with locked down user interfaces • Security - Linux offers more security options • IoT & Industrial Automation - Add user interfaces for integrated systems • Federal Government - Many govt systems require Linux support • Choice - Now you can, so might as well! Delphi for Linux History • 1999 Kylix: aka Delphi for Linux, introduced • It was a port of the IDE to Linux • Linux x86 32-bit compiler • Used the Trolltech QT widget library • 2002 Kylix 3 was the last update to Kylix • 2017 Delphi 10.2 “Tokyo” introduced Delphi for x86 64-bit Linux • IDE runs on Windows, cross compiles to Linux via the PAServer • Designed for server side development - no desktop widget GUI library • 2017 Eugene
  • Linux Networking Cookbook.Pdf

    Linux Networking Cookbook.Pdf

    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.