There are so many reasons to use a Linux-based operating system. Most often, people tell me that they switched because of a dissatisfaction with Microsoft's Windows. The second most common reason people tell me that they use Linux is for security -- a lack of malware. While operating systems such as Ubuntu, Fedora and Debian are rock solid, no operating system is impervious to viruses or trojans. The moment you feel 100 percent safe, you have effectively let your guard down.
As we reported a few days ago, Ian Murdock, the creator of the Debian GNU/Linux distribution project, died in rather unclear circumstances last week. Until more details emerge, it seems wise to refrain from speculation about what really happened. Far better to celebrate what is not in doubt: his important contribution to free software at a critical period in its growth.
Two releases ago, Fedora 21 introduced its namesake project's "Fedora Next" plan. The goal was simple—bring the massive, sprawling entity that is Fedora into some neatly organized categories that would clearly define the project's aims. And since Next launched, Fedora has been busy doing just that. The results are impressive, and it feels like the distro has found a renewed sense of purpose.
A very interesting discussion started earlier today, October 6, on the Ubuntu Snappy Core mailing list about a method of adding kernel modules to a Snappy-based operating system.
Geoffrey J. Teale started the discussion asking Ubuntu Snappy developers if he could add Linux kernel modules to a system based on Snappy Core via a framework. The current method of adding kernel modules to an Ubuntu Snappy system would be by packaging them in a standard snap, which can be manually injected into the kernel packages using the "sudo insmod" command.
The latest release of the immensely popular Linux distribution designed for penetration testing, Kali Linux 2.0 launched at DefCon 23 in Las Vegas last week.
Kali is the successor to BackTrack, and is a Debian-based Linux distribution that includes hundreds of penetration-testing tools pre-installed and ready to go. Just boot it from a USB drive or live DVD and you’ll have a penetration-testing—or “hacking”—environment with all the tools you might want just waiting for you to fire them up.