I've been playing around with the Raspberry Pi Zero W lately and having so much fun on the command line. For those uninitiated it's a tiny Arm computer running Raspbian, a derivative of Debian. It has a 1 GHz processor that had the ability to be overclocked and 512 MB of RAM, in addition to wireless g and bluetooth.
Mike Rapoport from IBM launched a bid to implement address space isolation in the Linux
kernel. Address space isolation emanates from the idea of virtual memory—where the
system maps all its hardware devices' memory addresses into a clean virtual space so
that they all appear to be one smooth range of available RAM. A system that implements
virtual memory also can create isolated address spaces that are available only to part
of the system or to certain processes.
The proliferation of inexpensive IoT boards means the time has come to
gain control not only of applications but also the entire software platform.
So, how do you build a custom distribution with cross-compiled applications
targeted for a specific purpose? As Michael J. Hammel explains here, it's not as hard as you might think.
Slack is an incredible communication tool
for groups of any size (see my
recent piece on it). At the company I work for during the day,
Slack has become more widely used than email or instant messaging. It
truly has become the hub of company communication.
2016: a Long Year
I know you're expecting a sarcastic comment about an election year in the
US making it seem longer than normal, but no, 2016 is literally a longer
year than most.
Editor's Note: Shawn will be revisiting his birdcam in the December issue of Linux Journal, so here's the original article in the series to refresh your memory.
When it comes to public key cryptography, most systems today are still stuck in
the 1970s. On December 14, 1977, two events occurred that would change the
world: Paramount Pictures released Saturday Night
Fever, and MIT filed the
patent for RSA.
Computing environments may revolve around heavy usage of NFS
infrastructure. Network areas are hosted and provided by storage file
servers, with compute servers mounting the exported areas into their
directory tree. Periodically, the mounts expire when not in use and are
removed from the directory tree on local machines.
If you work for a company with an online presence long enough, you'll deal with it eventually. Someone, out of malice, boredom, pathology, or some combination of all three, will target your company's online presence and resources for attack.