| |
LU9DCE > LINUX 09.03.22 12:36l 111 Lines 3851 Bytes #999 (0) @ WW
BID : 4238_LU9DCE
Read: GUEST
Subj: LINUX TODAY 09-MAR22
Path: IZ3LSV<IQ2LB<IR2UFV<N3HYM<KA3BVJ<VE3CGR<LU9DCE
Sent: 220309/1131Z 4238@LU9DCE.TOR.BA.ARG.SOAM BPQK6.0.22
__ _ _ ___ ____ ___ ____ ____ ____ ____
( ) / )( \/ _ \( \ / __)( __) ( _ \( _ \/ ___)
/ (_/\) \/ (\__ )) D (( (__ ) _) ) _ ( ) _ (\___ \
\____/\____/(___/(____/ \___)(____) (____/(____/(____/
ESTACION DE PACKET RADIO - BUENOS AIRES (GF05OM)
BOLETINES INFORMATIVOS PROGRAMADOS (BIP)
Copyright 2021 Eduardo A. Castillo
+----------------------------------------------------------------------------+
=#=#=#=#=#=#=#=#=
Top Nitrux Applications (Maui) Everyone Should Try
This article showcases some of the top Nitrux applications (Maui)
that come as default in the Nitrux OS Linux distribution. Learn more
here.
=#=#=#=#=#=#=#=#=
The March 2022 Issue of the PCLinuxOS Magazine
The PCLinuxOS Magazine staff is pleased to announce the release
of the March 2022 issue. With the exception of a brief period in
2009, The PCLinuxOS Magazine has been published on a monthly basis
since September, 2006. The PCLinuxOS Magazine is a product of the
PCLinuxOS community, published by volunteers from the community. The
magazine
=#=#=#=#=#=#=#=#=
How to Use SUID and SGID in Linux with Examples
Regular permissioncan be overridden by special permissions like
SUID,SGID, andstickybit. When you use the special permissions on a
file, then only the owner of the file or group owner can manipulate
the file. In some cases where you just want only theownerorgroupcan
executethe file thenSUIDandSGIDare the best way.
=#=#=#=#=#=#=#=#=
Widely Used UPS Devices can be Hijacked and Destroyed Remotely
Three vulnerabilities in ubiquitous APC Smart-UPS
(uninterruptible power supply) devices could allow remote attackers
to use them as an attack vector, disable or completely destroy them,
Armis researchers have discovered. The vulnerable devices, developed
by Schneider Electric subsidiary APC, are used all around the globe
to provide emergency backup power for critical physical
infrastructure (industrial
=#=#=#=#=#=#=#=#=
More on the Easily Exploitable Linux Bug that Gives Root Access
to Attackers (CVE-2022-0847)
An easily exploitable vulnerability (CVE-2022-0847) in the Linux
kernel can be used by local unprivileged users to gain root
privileges on vulnerable systems by taking advantage of already
public exploits. Discovered by security researcher Max Kellermann,
the flaw – which he dubbed Dirty Pipe, due to its similarity to the
Dirty Cow flaw – has
=#=#=#=#=#=#=#=#=
Dirty Pipeline Is an Awful Linux Mess
Blast! This is about as bad a Linux security problem as
I’ve seen in years.
=#=#=#=#=#=#=#=#=
Firefox 98 Arrives with a New Optimized Download Flow
Firefox is a fast, free, and open-source web browser that
provides you with a highly customizable interface. Mozilla releases
Firefox 98, a new major version of the browser. The most notable
change is the new optimized download flow.
=#=#=#=#=#=#=#=#=
Open-Source Zone Grinds Away at Patent Trolls
United Patents, Microsoft, the Linux Foundation, and the Open
Invention Network are beating back open-source patent trolls.
=#=#=#=#=#=#=#=#=
Mozilla Fixes Firefox Zero-Days Exploited in the Wild
(CVE-2022-26485, CVE-2022-26486)
Mozilla has released an out-of-band security update for Firefox,
Firefox Focus, and Thunderbird, fixing two critical vulnerabilities
(CVE-2022-26485, CVE-2022-26486) exploited by attackers in the wild.
=#=#=#=#=#=#=#=#=
How to Install Puppet Server and Agent on Debian 11
Puppet is a centralized configuration management and automation
tool. Learn how to install the Puppet server and agent on Debian 11
here.
+-------------------------------- POWERSHELL --------------------------------+
Read previous mail | Read next mail
| |