Weekly IT Security News Bulletin, 2020-W12 16 March 2020 – 22 March 2020

Total Page:16

File Type:pdf, Size:1020Kb

Weekly IT Security News Bulletin, 2020-W12 16 March 2020 – 22 March 2020 Weekly IT Security News Bulletin, 2020-W12 16 March 2020 – 22 March 2020 Headlines Ransomware deployment trends By looking into tens of ransomware incidents from 2017 to 2019, a cyber intelligence company analysed several ransomware deployment trends including the initial infection vectors, dwell time and time of day of deployment. The incidents under research impacted organisations in various business sectors across different regions including North America, Europe, Asia Pacific and the Middle East. Most ransomware victims were initially infected via Remote Desktop Protocol (RDP), phishing with web links or email attachments, and drive-by-downloads from compromised websites. The attackers in 75% of the incidents waited for three days to deploy the ransomware after gaining access into an organisation’s network, buying time to locate valuable systems for more effective attacks. Early detection, containment and remediation of initial intrusions or infections could therefore be more likely to break the kill chains of most ransomware attacks. The researchers also found that in 76% of the incidents ransomware was executed outside office hours, possibly with an intent to defer discovery. As a trend, the attackers were expected to do more harm on their victims by combining the ransomware execution with data theft, demanding higher ransom payments, targeting on critical systems, and provoking higher urgency for victims’ payments. Advice Restrict RDP access and deploy strong authentication for the access, especially for Internet-facing systems. Educate end users to avoid risks of phishing and drive-by-downloads when they read emails and browse websites, and take offline backup of important data regularly. Deploy automatic intrusion detection or protection solutions to monitor and alert for intrusions round the clock. Sources FireEye ZDNet GovCERT.HK Weekly IT Security News Bulletin 2020-W12 1 Mind the risks of virtual meetings In the shadow of the Coronavirus-disease outbreak, the United States National Institute of Standards and Technology (NIST) advised organisations to exercise precautions when arranging virtual meetings for their home or remote office workers. Security measures were suggested to prevent information leakage and secure privacy in that remote and collective mode of communication. Users of conference calls and web meetings were warned of the risk of eavesdropping if their virtual meetings were not set up properly. In particular, reusing the same access code for multiple virtual meetings might lead to inadvertent disclosure of sensitive conversations in a meeting to attendees of another meeting. The NIST suggested that users should consider the sensitivity of topics to be discussed and follow their organisations’ security policies for holding virtual meetings. They should make use of built-in security functions of virtual meeting services such as multi-factor authentication to secure access, and dashboards to monitor attendees, if any. Recordings of a meeting should be encrypted and removed from the service provider’s storage after the meeting. Attendees should use end devices issued by their organisations to participate in the meetings and on-screen sharing of sensitive information should be avoided. Advice Follow your organisation’s security policy and assess the security risks, especially in information confidentiality, before adopting virtual meeting services. Avoid reusing access codes, adopt multi-factor authentication, and monitor attendees with a dashboard, as far as possible when holding virtual meetings. Do not record meetings if not essential; encrypt the recordings and delete them from the service provider’s storage after the meetings if it is required to do so. Sources NIST BleepingComputer GovCERT.HK Weekly IT Security News Bulletin 2020-W12 2 Product Vulnerability Notes & Security Updates 1. Cisco SD-WAN Solution vManage https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200318-vmanage- cypher-inject https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200318-vmanage-xss https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwanbo-QKcABnS2 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwclici-cvrQpH9v https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwpresc-ySJGvE9 2. Debian https://www.debian.org/security/2020/dsa-4640 https://www.debian.org/security/2020/dsa-4641 3. Delta Electronics Industrial Automation CNCSoft ScreenEditor https://www.us-cert.gov/ics/advisories/icsa-20-077-01 4. Gentoo Linux https://security.gentoo.org/glsa/202003-09 https://security.gentoo.org/glsa/202003-11 https://security.gentoo.org/glsa/202003-12 https://security.gentoo.org/glsa/202003-13 https://security.gentoo.org/glsa/202003-14 https://security.gentoo.org/glsa/202003-15 https://security.gentoo.org/glsa/202003-16 https://security.gentoo.org/glsa/202003-17 https://security.gentoo.org/glsa/202003-18 https://security.gentoo.org/glsa/202003-19 https://security.gentoo.org/glsa/202003-20 https://security.gentoo.org/glsa/202003-21 https://security.gentoo.org/glsa/202003-22 https://security.gentoo.org/glsa/202003-23 https://security.gentoo.org/glsa/202003-24 https://security.gentoo.org/glsa/202003-25 https://security.gentoo.org/glsa/202003-26 https://security.gentoo.org/glsa/202003-27 https://security.gentoo.org/glsa/202003-28 https://security.gentoo.org/glsa/202003-29 https://security.gentoo.org/glsa/202003-30 https://security.gentoo.org/glsa/202003-31 https://security.gentoo.org/glsa/202003-32 https://security.gentoo.org/glsa/202003-33 https://security.gentoo.org/glsa/202003-34 https://security.gentoo.org/glsa/202003-35 https://security.gentoo.org/glsa/202003-36 https://security.gentoo.org/glsa/202003-37 https://security.gentoo.org/glsa/202003-38 https://security.gentoo.org/glsa/202003-39 GovCERT.HK Weekly IT Security News Bulletin 2020-W12 3 https://security.gentoo.org/glsa/202003-40 https://security.gentoo.org/glsa/202003-41 https://security.gentoo.org/glsa/202003-42 https://security.gentoo.org/glsa/202003-43 https://security.gentoo.org/glsa/202003-44 https://security.gentoo.org/glsa/202003-45 https://security.gentoo.org/glsa/202003-46 5. Google Chrome https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html 6. McAfee Products https://kc.mcafee.com/corporate/index?page=content&id=SB10310 7. OpenSSL https://www.openssl.org/news/cl111.txt 8. openSUSE https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00024.html https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00026.html https://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html 9. Oracle Linux https://linux.oracle.com/errata/ELSA-2020-0815.html https://linux.oracle.com/errata/ELSA-2020-0820.html https://linux.oracle.com/errata/ELSA-2020-0834.html https://linux.oracle.com/errata/ELSA-2020-0850.html https://linux.oracle.com/errata/ELSA-2020-0851.html https://linux.oracle.com/errata/ELSA-2020-0853.html https://linux.oracle.com/errata/ELSA-2020-0892.html https://linux.oracle.com/errata/ELSA-2020-0896.html https://linux.oracle.com/errata/ELSA-2020-0897.html https://linux.oracle.com/errata/ELSA-2020-0898.html https://linux.oracle.com/errata/ELSA-2020-0902.html https://linux.oracle.com/errata/ELSA-2020-0903.html https://linux.oracle.com/errata/ELSA-2020-5569.html https://linux.oracle.com/errata/ELSA-2020-5576.html 10. PHP https://www.php.net/ChangeLog-7.php#7.2.29 https://www.php.net/ChangeLog-7.php#7.3.16 GovCERT.HK Weekly IT Security News Bulletin 2020-W12 4 11. Red Hat https://access.redhat.com/errata/RHSA-2020:0795 https://access.redhat.com/errata/RHSA-2020:0796 https://access.redhat.com/errata/RHSA-2020:0798 https://access.redhat.com/errata/RHSA-2020:0799 https://access.redhat.com/errata/RHSA-2020:0800 https://access.redhat.com/errata/RHSA-2020:0801 https://access.redhat.com/errata/RHSA-2020:0802 https://access.redhat.com/errata/RHSA-2020:0803 https://access.redhat.com/errata/RHSA-2020:0815 https://access.redhat.com/errata/RHSA-2020:0816 https://access.redhat.com/errata/RHSA-2020:0819 https://access.redhat.com/errata/RHSA-2020:0820 https://access.redhat.com/errata/RHSA-2020:0824 https://access.redhat.com/errata/RHSA-2020:0831 https://access.redhat.com/errata/RHSA-2020:0839 https://access.redhat.com/errata/RHSA-2020:0850 https://access.redhat.com/errata/RHSA-2020:0856 https://access.redhat.com/errata/RHSA-2020:0860 https://access.redhat.com/errata/RHSA-2020:0861 https://access.redhat.com/errata/RHSA-2020:0870 https://access.redhat.com/errata/RHSA-2020:0889 https://access.redhat.com/errata/RHSA-2020:0892 https://access.redhat.com/errata/RHSA-2020:0895 https://access.redhat.com/errata/RHSA-2020:0896 https://access.redhat.com/errata/RHSA-2020:0897 https://access.redhat.com/errata/RHSA-2020:0898 https://access.redhat.com/errata/RHSA-2020:0899 https://access.redhat.com/errata/RHSA-2020:0901 https://access.redhat.com/errata/RHSA-2020:0902 https://access.redhat.com/errata/RHSA-2020:0903 12. SUSE https://www.suse.com/support/update/announcement/2020/suse-su-20200667-1/ https://www.suse.com/support/update/announcement/2020/suse-su-20200668-1/ https://www.suse.com/support/update/announcement/2020/suse-su-20200670-1/
Recommended publications
  • Linux and Electronics
    Linux and Electronics Urs Lindegger Linux and Electronics Urs Lindegger Copyright © 2019-11-25 Urs Lindegger Table of Contents 1. Introduction .......................................................................................................... 1 Note ................................................................................................................ 1 2. Printed Circuits ...................................................................................................... 2 Printed Circuit Board design ................................................................................ 2 Kicad ....................................................................................................... 2 Eagle ..................................................................................................... 13 Simulation ...................................................................................................... 13 Spice ..................................................................................................... 13 Digital simulation .................................................................................... 18 Wings 3D ....................................................................................................... 18 User interface .......................................................................................... 19 Modeling ................................................................................................ 19 Making holes in Wings 3D .......................................................................
    [Show full text]
  • An User & Developer Perspective on Immutable Oses
    An User & Developer Perspective on Dario Faggioli Virtualization SW. Eng. @ SUSE Immutable OSes [email protected] dariof @DarioFaggioli https://dariofaggioli.wordpress.com/ https://about.me/dario.faggioli About Me What I do ● Virtualization Specialist Sw. Eng. @ SUSE since 2018, working on Xen, KVM, QEMU, mostly about performance related stuff ● Daily activities ⇒ how and what for I use my workstation ○ Read and send emails (Evolution, git-send-email, stg mail, ...) ○ Write, build & test code (Xen, KVM, Libvirt, QEMU) ○ Work with the Open Build Service (OBS) ○ Browse Web ○ Test OSes in VMs ○ Meetings / Video calls / Online conferences ○ Chat, work and personal ○ Some 3D Printing ○ Occasionally play games ○ Occasional video-editing ○ Maybe scan / print some document 2 ● Can all of the above be done with an immutable OS ? Immutable OS: What ? Either: ● An OS that you cannot modify Or, at least: ● An OS that you will have an hard time modifying What do you mean “modify” ? ● E.g., installing packages ● ⇒ An OS on which you cannot install packages ● ⇒ An OS on which you will have an hard time installing packages 3 Immutable OS: What ? Seriously? 4 Immutable OS: Why ? Because it will stay clean and hard to break ● Does this sound familiar? ○ Let’s install foo, and it’s dependency, libfoobar_1 ○ Let’s install bar (depends from libfoobar_1, we have it already) ○ Actually, let’s add an external repo. It has libfoobar_2 that makes foo work better! ○ Oh no... libfoobar_2 would break bar!! ● Yeah. It happens. Even in the best families distros
    [Show full text]
  • The BIG Change for Opensuse Leap 15.3 About Me
    The BIG Change for openSUSE Leap 15.3 About Me openSUSE Manager Hobbies ● Marketing/PR ● Fantasy Sports ● Event Organizer ● Mining ● Coordinate Event ● Series Binge Watcher Sponsorship Interesting Fact Education Christopher Reeve was ● MBA - Business to blame for me breaking my arm ● BA - Education Douglas DeMaio (Superman 1978) V International GNU Health Conference - Nov. 20 - 21, online event - #GHCon2020 The Way to openSUSE Leap 15.3 bout Me !losing the Leap Gap What is it & why does it matter. Jump 15.&.1 Leap 15.3 The efforts to change What to expect with in how a distribution is coming releases of this built openSUSE distribution What is openSUSE Leap Leap is trying to bridge “Community and Enterprise” the distribution is based on the latest version of SUSE Linux Enterprise available to the date, typically with a 12 months release cycle. Leap 15.2 Retrospective told us that users value most the installer, stability, seamless migrations, and YaST. These would be then our strengths according to users! The distribution is often profiled as the more stable one and easy to use as there should be no radical or disruptive changes in between minor updates. Some users say It’s the KDE distribution. Box says “The Linux Distribution for Beginners and Pros” !"osing the Leap Gap ● CtLG is a SUSE driven effort to bring Leap closer to SUSE Linux Enterprise than ever before. This brings quite some challenges but also open some new opportunities. ● Unification of openSUSE Leap and SUSE Linux Enterprise 15 code streams and feature set. ● Concept of building a community distribution by combining rpms from openSUSE Backports (community part) and SUSE signed SLE rpms (Enterprise part).
    [Show full text]
  • Zypper Cheat Sheet Or Type M an Zypper on a Terminal
    More Information: Page 1 Zypper Cheat Sheet https://en.opensuse.org/SDB:Zypper_usage or type m an zypper on a terminal For Zypper version 1.0.9 Package Management Source Packages and Build Dependencies Basic Help Selecting Packages zypper source-install or zypper si Examples: zypper #list the available global options and commands By capability name: zypper si zypper zypper help [command] #Print help for a specific command zypper in 'perl(Log::Log4perl)' Install only the source package zypper shell or zypper sh #Open a zypper shell session zypper in qt zypper in -D zypper By capability name and/or architecture and/or version Install only the build dependencies zypper in 'zypper<0.12.10' Repository Management zypper in -d zypper zypper in zypper.i586=0.12.11 Listing Defined Repositories By exact package name (--name) Updating Packages zypper in -n ftp zypper repos or zypper lr By exact package name and repository (implies --name) zypper update or zypper up Examples: zypper in factory:zypper Examples: zypper lr -u #include repo URI on the table By package name using wildcards zypper up #update all installed packages zypper lr -P #include repo priority and sort by it zypper in yast*ftp* with newer version as far as possible By specifying a .rpm file to install zypper up libzypp zypper #update libzypp Refreshing Repositories zypper in skype-2.0.0.72-suse.i586.rpm and zypper zypper refresh or zypper ref zypper in sqlite3 #update sqlite3 or install Installing Packages Examples: if not yet installed zypper ref packman main #specify repos to be
    [Show full text]
  • Introduction to Gentoo Linux
    Introduction to Gentoo Linux Ulrich Müller Developer and Council member, Gentoo Linux <[email protected]> Institut für Kernphysik, Universität Mainz <[email protected]> Seminar “Learn Linux the hard way”, Mainz, 2012-10-23 Ulrich Müller (Gentoo Linux) Introduction to Gentoo Linux Mainz 2012 1 / 35 Table of contents 1 History 2 Why Gentoo? 3 Compile everything? – Differences to other distros 4 Gentoo features 5 Gentoo as metadistribution 6 Organisation of the Gentoo project 7 Example of developer’s work Ulrich Müller (Gentoo Linux) Introduction to Gentoo Linux Mainz 2012 2 / 35 /"dZEntu:/ Pygoscelis papua Fastest swimming penguin Source: Wikimedia Commons License: CC-BY-SA-2.5, Attribution: Stan Shebs Ulrich Müller (Gentoo Linux) Introduction to Gentoo Linux Mainz 2012 3 / 35 How I came to Gentoo UNIX since 1987 (V7 on Perkin-Elmer 3220, later Ultrix, OSF/1, etc.) GNU/Linux since 1995 (Slackware, then S.u.S.E.) Switched to Gentoo in January 2004 Developer since April 2007 Council Mai 2009–June 2010 and since July 2011 Projects: GNU Emacs, eselect, PMS, QA Ulrich Müller (Gentoo Linux) Introduction to Gentoo Linux Mainz 2012 4 / 35 Overview Based on GNU/Linux, FreeBSD, etc. Source-based metadistribution Can be optimised and customised for any purpose Extremely configurable, portable, easy-to-maintain Active all-volunteer developer community Social contract GPL, LGPL, or other OSI-approved licenses Will never depend on non-free software Is and will always remain Free Software Commitment to giving back to the FLOSS community, e.g. submit bugs
    [Show full text]
  • Snort 2.9.9.X on Opensuse Leap 42.2
    Snort Installation on openSUSE Leap 42.2 64 bits Boris A. Gómez Universidad Tecnológica de Panamá July 2017 About This Guide This guide has been tested on openSUSE Leap 42.2, 64 bits, using DAQ 2.0.6 and Snort 2.9.9.0. Software was installed in a virtual machine: Virtual Machine Manager: VirtualBox 5.1.22 or KVM 1.4.0 HOST operating system: Windows 7 or openSUSE Leap 42.2 GUEST operating system: openSUSE Leap 42.2 (Snort will be installed here) For clarity, the following color code was used: Orange – commands that the user types at the shell prompt. Blue – text inside of configuration files. Purple – text to focus your attention on. This guide is based on the document "Snort 2.9.8.x on OpenSuSE 13x" by William Parker. Network Card Configuration Run VirtualBox | KVM manager and configure the network section of the guest machine to bridge mode. KVM Manager: VirtualBox Manager: Guest Machine Start your guest machine and set its network interface card to a static IP, for example 192.168.99.10, then check settings: ifconfig eth0 Link encap:Ethernet HWaddr 08:00:27:50:CA:99 inet addr: 192.168.99.10 Bcast:192.168.99.255 Mask:255.255.255.0 Verify that you can access Internet by accessing a web page, for example: https://snort.org Before proceeding, it is advisable to update the system. Required Packages Use YAST to install the following packages: gcc version 4.8.x (including libraries: libgcc_s1 (5.3.1), libgcc_s1-32bit(5.3.1)) flex (2.5.37) bison (2.7) php5-zlib (5.5.14 including zlib-devel 1.2.8) libpcap1 (1.8.1 including libpcap-devel 1.8.1) (versions must match) libpcre1 (8.39 including pcre-devel 8.39 and libpcre1-32bit 8.39) (versions must match) libdnet1 (1.12 including libdnet-devel 1.12) (versions must match) tcpdump (4.5.1).
    [Show full text]
  • Integrating New Major Components on Fast and Slow Moving Distributions
    IntegratingIntegrating newnew majormajor componentscomponents onon fastfast andand slowslow movingmoving distributionsdistributions How latest GNOME desktop was integrated into latest SUSE / openSUSE releases Frédéric Crozat <[email protected]> SUSE Linux Enterprise Release Manager What we don’t do What we do DistributionDistribution deliverydelivery stylesstyles 4 Three distributions styles ● Rolling: – Bleeding edge – Release as soon as possible – Example: openSUSE Tumbleweed, ArchLinux, Gentoo ● Regular: – Release one to twice a year – Update their entire stack for each release – Example: Ubuntu, Fedora, Debian ● LTS / Enterprise: – Slow cadence (yearly or even less than that) – Very few things move between sub-releases – Example: openSUSE Leap, Ubuntu LTS, SLES/SLED, RHEL 5 openSUSE/SUSE terminology ● OBS = OpenBuildService ● SLE = SUSE Linux Enterprise (Server / Desktop) – Enterprise distribution, developed by SUSE ● openSUSE Tumbleweed: – openSUSE Rolling release, by openSUSE, using only Factory packages, tested by openQA ● openSUSE Factory: – Development repository for Tumbleweed ● openSUSE Leap: – openSUSE Stable release, based on SLE common code + Packages from Factory (or specific repository) 6 IntegrationIntegration processprocess 7 OBS and Devel project ● On OBS, every source package is handled in a project which can build several packages together ● openSUSE Tumbleweed uses devel project per “topic” (KDE, GNOME, X11, …) ● Changes (patch, version update) are done in Devel projects and then, pushed to “main” distribution for
    [Show full text]
  • Pacloud: Towards a Universal Cloud-Based Linux Package Manager
    Pacloud: Towards a Universal Cloud-based Linux Package Manager Olivier Bal-Pétré Pierre Varlez Fernando Perez-Tellez Technological University Dublin Technological University Dublin Technological University Dublin Dublin, Ireland Dublin, Ireland Dublin, Ireland [email protected] [email protected] [email protected] ABSTRACT or Qt framework. The LibreOffice package is built to be Package managers are a very important part of Linux distributions compatible with every user interface framework, hence heavier but we have noticed two weaknesses in them: They use pre-built than necessary: only one framework will be used for this software packages that are not optimised for specific hardware and often installation. they are too heavy for a specific need, or packages may require To optimise configuration and installation performance, source- plenty of time and resources to be compiled. In this paper, we based Linux distributions are used, one of the most famous being present a novel Linux package manager which uses cloud Gentoo Linux. computing features to compile and distribute Linux packages without impacting the end user's performance. We also show how Gentoo's package manager (Portage) builds packages from source Portage, Gentoo's package manager can be optimised for code and allows for specific compilation flags. This feature allows customisation and performance, along with the cloud computing to have packages that are optimised for a specific hardware. features to compile Linux packages more efficiently. All of this Portage also allows to build and install packages for specific resulting in a new cloud-based Linux package manager that is system requirements, with the help of USE flags [4].
    [Show full text]
  • Gentoo Guide: Installation
    Gentoo Guide: Installation Finalizing The Installation Tools MySQL Database Server Apache Web Server PHP Mail (Sendmail/SSMTP) MySQL Backup Protecting Your Web Directories With .htaccess PHPMyAdmin Webalizer TeamSpeak2 Server GenSplash Framebuffer Getting a GUI, Gentoo and X Sound, Gentoo and ALSA Window Managers IRC Server Installation Gentoo Linux is my OS of choice. It is highly customizable, has no extra bloat, and can be tailored and fine tuned to the system it is running on. If you really want to learn how to use Linux as well as what makes it tick then install Gentoo from scratch! You will be amazed at how much you will learn, not only about Gentoo and Linux, but also about the hardware inside your PC. The best way to install gentoo is to follow the handbook for your particlular arch found here. Then download the Gentoo Minimal/Install CD found here. Follow the handbook and it will get you up and running with the latest updated version of Gentoo. I use the handbook for every installation I do, it is an excellent resource. Once you are done you should have a basic Gentoo installation with a user created. When you get to page 12 "Where to go from here?" check out the links it offers then come back and check out the next section of this guide: Finalizing the Installation. Back to Top Finalizing the Installation Ok, so you followed the handbook and completed your installation. Now what? Well one of the last things the guide had you do was create a user. Here is some info about the groups that you added your user to and some others that are available.
    [Show full text]
  • Configuration Challenges in Linux and Ecos: a Survey
    GSDLAB TECHNICAL REPORT Configuration Challenges in Linux and eCos: A Survey Arnaud Hubaux, Yingfei Xiong, Krzysztof Czarnecki GSDLAB{TR 2011{09{29 September 2011 Generative Software Development Laboratory University of Waterloo 200 University Avenue West, Waterloo, Ontario, Canada N2L 3G1 WWW page: http://gsd.uwaterloo.ca/ The GSDLAB technical reports are published as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright. These works may not be reposted without the explicit permission of the copyright holder. Configuration Challenges in Linux and eCos: A Survey Arnaud Hubaux, Yingfei Xiong, Krzysztof Czarnecki September 29, 2011 Abstract Operating systems expose sophisticated configurability to handle vari- ations in hardware platforms like desktops, servers, and mobile devices. The configuration of an operating system like Linux contains thousands of options guarded by hundreds of complex constraints. To guide users throughout the configuration activity, configurators implement various mechanisms to produce correct configurations. However, configuration still remains a difficult and challenging process. To better understand the challenges faced by users during configuration, we conducted surveys among Linux and eCos users to answer the two following questions: • What challenges do users most frequently face? • How significant is the conflict resolution problem? In this paper, we report on the results of these two surveys. 1 Linux This section focuses on the configuration tools used for the Linux kernel.
    [Show full text]
  • The Growth of Android in Embedded Systems
    THE GROWTH OF ANDROID IN EMBEDDED SYstEMS THE LINUX FOUNDATION TRAINING PUBLICATION Written by Benjamin Zores OVERVIEW Linux has continuously grown in the embedded systems market for over a decade, gaining market share from proprietary operating systems. The proliferation of embedded devices, the explosion of open source development, the inherent hardware support, the incredible networking capabilities and the royalty-free economic model have all helped propel use of the Linux kernel into one of the best choices for the design of new embedded systems. While the success of Linux in the embedded market can not be denied, its notoriety was once confined to mostly technical professionals. That changed in 2008 with Google’s release of the Android mobile phone operating system, based on the Linux kernel. Thus began the tremendous growth of Linux in the consumer world, with over one million Android devices being activated every day in 2012 and predictions of total Android devices shipped reaching one billion in 2013. THE GROWTH OF ANDROID 1 IN EMBEDDED SYstEMS of Android in THE GROWTH Embedded Systems In a recent The Android Operating System survey, 34% Android’s success was no accident and was the result of a long-term strategy and loads of investment from Google. The early development of the OS came from within Android Inc. of embedded in the early 2000’s; it was purchased by Google in 2005. The original system relied on a Java framework for its application layer and was not based on the Linux kernel. Only after engineers are several years of development at Google labs, and after an architecture revamping, the first Android-based smart-phone (the HTC G1) was released and based on the very first version considering of the Android software development kit (SDK).
    [Show full text]
  • Nvidia Cuda Installation Guide for Linux
    NVIDIA CUDA INSTALLATION GUIDE FOR LINUX DU-05347-001_v9.1 | April 2018 Installation and Verification on Linux Systems TABLE OF CONTENTS Chapter 1. Introduction.........................................................................................1 1.1. System Requirements.................................................................................... 1 1.2. About This Document.................................................................................... 2 Chapter 2. Pre-installation Actions...........................................................................3 2.1. Verify You Have a CUDA-Capable GPU................................................................ 3 2.2. Verify You Have a Supported Version of Linux.......................................................4 2.3. Verify the System Has gcc Installed................................................................... 4 2.4. Verify the System has the Correct Kernel Headers and Development Packages Installed.... 4 2.5. Choose an Installation Method......................................................................... 6 2.6. Download the NVIDIA CUDA Toolkit....................................................................6 2.7. Handle Conflicting Installation Methods.............................................................. 6 Chapter 3. Package Manager Installation....................................................................8 3.1. Overview................................................................................................... 8 3.2. Redhat/CentOS...........................................................................................
    [Show full text]