Tuesday, February 3, 2015

BitTorrent on the iPad and iPhone? It's possible using ProPopulo

IDG Contributor Network: BitTorrent on the iPad and iPhone? It's possible using ProPopulo | Developers begin work on LibreOffice for Android

ITworld Linux and Open Source Strategies

Google Plus LinkedIn Facebook Twitter


The top 10 rookie open source projects
Black Duck presents its Open Source Rookies of the Year -- the 10 most exciting, active new projects germinated by the global open source community. Read More


WHITE PAPER: Apperian

Choose an Enterprise App Store Strategy
In this research report Gartner outlines how organizations can optimally secure, distribute, and manage mobile applications for employees and contracted workers. Learn More

WHITE PAPER: Akamai

Improving DDoS Protection
A recent survey reveals a significant disconnect between companies' concerns and their preparedness when it comes to potential DDoS attacks. This survey looks at the high level of concern about the impacts of DDoS attacks and the "always-on" solution to help identify and mitigate attacks. Learn More

IDG Contributor Network: BitTorrent on the iPad and iPhone? It's possible using ProPopulo
Building on a technique discovered by Stefan Svartling, we learn how to turn an app named ProPopulo into a BitTorrent client for the iPhone and iPad. Read More

Developers begin work on LibreOffice for Android
Two companies have started working on a full-featured version of the free office suite LibreOffice for Android. They hope to have a beta version available in March.It's too soon to say what features will be included in the beta version, said Italo Vignoli, spokesman at the Document Foundation, which leads the development. A series of beta builds with increasing advanced functionality will then be released over time. The foundation didn't say when it expected LibreOffice for Android to become generally available.U.K. open source software company Collabora and Spanish Free Software consultancy Igalia have been handed the task of developing the technical framework, following a tender that was presented in September.To read this article in full or to leave a comment, please click here Read More

IDG Contributor Network: Should Linux users worry about no-cost Windows 10 for Raspberry Pi?
The tables have turned, the magnetic poles have reversed, Microsoft is desperate. Read More

LibreOffice gets a streamlined makeover, native alternatives for major Microsoft fonts
LibreOffice is a great productivity suite and version 4.4 gives the suite an improved interface and new fonts to replace two popular choices from Microsoft. Read More


WHITE PAPER: Akamai

The Importance of Improving and Adapting Web Security
With so much depending on web site availability, Chief Security Officers are considering new ways to be cost-effectively proactive and vigilant. This paper looks at the challenges and options to web security deployment. Learn More

IDG Contributor Network: The 5 best open source email clients for Linux
Simply the bestImage by Tom Page/FlickrWindows users have Outlook; Mac users have Mail. What options are there for Linux users? As it turns out, Linux land is rich with email clients. I have chosen five of the best, fully open source email clients (with two exceptions) for Linux users.To read this article in full or to leave a comment, please click here Read More

Flash Player plagued by third zero-day flaw in a month, updates coming
Adobe Systems warned users that hackers are exploiting another unpatched vulnerability in Flash Player—the third one in the past month—to infect computers with malware.There are reports that the vulnerability is being actively exploited in drive-by-download attacks that target systems running Flash Player under Internet Explorer or Mozilla Firefox on Windows 8.1 and below, Adobe said in a security advisory published Monday.The company plans to release Flash Player updates that will address the flaw later this week.The vulnerability, which is tracked as CVE-2015-0313 in the Common Vulnerabilities and Exposures database, affects Flash Player on all supported platforms: Adobe Flash Player 16.0.0.296 and earlier versions for Windows and Mac OS X; Adobe Flash Player 13.0.0.264 and earlier 13.x versions; and Adobe Flash Player 11.2.202.440 and earlier versions for Linux.To read this article in full or to leave a comment, please click here Read More

Ghost Linux vulnerability can be exploited through WordPress, other PHP apps
A critical vulnerability in glibc, a core Linux library, can be exploited remotely through WordPress and likely other PHP applications to compromise Web servers.The buffer overflow vulnerability, dubbed Ghost, was reported Tuesday by researchers from security vendor Qualys. It is identified as CVE-2015-0235 in the Common Vulnerabilities and Exposures database.The bug is located in the gethostbyname*() functions of the glibc (GNU C Library) version 2.17 and older. It was fixed in glibc-2.18, released in May 2013, but it wasn't flagged as a security vulnerability at the time.To read this article in full or to leave a comment, please click here Read More

INSIDER
Zero Touch Provisioning can help the network world catch up to server advances
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.While the term Zero Touch Provisioning (ZTP) might be increasingly more common to networking, the concept of automation has existed for years in IT. At its core, ZTP is an automation solution that's designed to reduce errors and save time when IT needs to bring new infrastructure online.This is particularly useful for data center servers, where scale and configuration similarities across systems make automation a necessity. In the server world, for example, Linux has revolutionized on boarding and provisioning. Rather than using command-line interfaces (CLI) to configure systems one at a time, administrators can use automation tools to roll out the operating system software, patches and packages on new servers with a single command, or the click of a mouse.To read this article in full or to leave a comment, please click here(Insider Story) Read More


FOR INSIDERS ONLY

Get exclusive access to premium content from ITworld, CIO magazine, Computerworld, InfoWorld, Network World, and CSO -- the best publications in the business.

- Review: The big 4 Java IDEs compared

- 15 ways to screw up a job interview

- 12 tips to tune your Wi-Fi network

- Container wars: Interesting times ahead for Docker and its competitors

- 6 things every IT person should know

- IT Resume Makeover: How (and when) to break the rules

What are you waiting for? Sign up today!


Get more peer perspective online
Google+ | LinkedIn | Facebook | Twitter

You are currently subscribed to itworld_linux as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

When accessing content promoted in this email, you are providing consent for your information to be shared with the sponsors of the content. Please see our Privacy Policy for more information.

To contact ITworld, please send an e-mail to online@itworld.com.

Copyright (C) 2015 ITworld, 492 Old Connecticut Path, Framingham, MA 01701.

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@itworld.com.


No comments:

Post a Comment

Note: Only a member of this blog may post a comment.