Linux
Commodore Tells Windows 10 Users Shunned By Microsoft To Join Its Linux Sanctuary - HotHardware
Categories: Linux
LMDE 7 "Gigi" Released: Linux Mint's Debian-Based Alternative Gets Major Upgrade - It's FOSS News
Categories: Linux
Zorin OS 18 released with advanced window tiling, improved theme, and more - gHacks Technology News
Zorin OS 18 released with advanced window tiling, improved theme, and more gHacks Technology News
Categories: Linux
Zorin OS 18 Released Just in Time for Windows 10 EOL - It's FOSS News
Zorin OS 18 Released Just in Time for Windows 10 EOL It's FOSS News
Categories: Linux
I found the easiest way to transfer files to and from my Linux PC - and it's so fast - ZDNET
Categories: Linux
Ready to ditch your Windows PC? I highly recommend this mini PC that's optimized for Linux - ZDNET
Categories: Linux
Ready to ditch your Windows PC? I highly recommend this mini PC that's optimized for Linux - ZDNET
Categories: Linux
Commodore needles Microsoft over end of Windows 10, tries to lure disgruntled users to its Linux-based OS Vision 3.0 — 'Microsoft may be leaving you behind. We Won't.' - Tom's Hardware
Categories: Linux
Commodore needles Microsoft over end of Windows 10, tries to lure disgruntled users to its Linux-based OS Vision 3.0 — 'Microsoft may be leaving you behind. We Won't.' - Tom's Hardware
Categories: Linux
Intel Wildcat Lake "-march=wildcatlake" Added To GCC & LLVM Clang Compilers - Phoronix
Categories: Linux
Next-Gen Intel Nova Lake CPUs to feature Xe3P graphics – Linux Update Confirms - OC3D
Categories: Linux
Next-Gen Intel Nova Lake CPUs to feature Xe3P graphics – Linux Update Confirms - OC3D
Categories: Linux
Understanding Bash: A Guide for Linux Administrators - TechRepublic
Understanding Bash: A Guide for Linux Administrators TechRepublic
Categories: Linux
Secure Boot Bypass Risk Threatens Nearly 200,000 Linux Framework Laptops
Roughly 200,000 Linux-based Framework laptops shipped with a signed UEFI shell command (mm) that can be abused to bypass Secure Boot protections -- allowing attackers to load persistent bootkits like BlackLotus or HybridPetya. Framework has begun patching affected models, though some fixes and DBX updates are still pending. BleepingComputer reports: According to firmware security company Eclypsium, the problem stems from including a 'memory modify' (mm) command in legitimately signed UEFI shells that Framework shipped with its systems. The command provides direct read/write access to system memory and is intended for low-level diagnostics and firmware debugging. However, it can also be leveraged to break the Secure Boot trust chain by targeting the gSecurity2 variable, a critical component in the process of verifying the signatures of UEFI modules.
The mm command can be abused to overwrite gSecurity2 with NULL, effectively disabling signature verification. "This command writes zeros to the memory location containing the security handler pointer, effectively disabling signature verification for all subsequent module loads." The researchers also note that the attack can be automated via startup scripts to persist across reboots.
Read more of this story at Slashdot.
Categories: Linux
