Dec 022014
 

natronWorking on Linux but searching for some good software for your work ?

Now you have a new and powerful tool available for linux: Natron.

Natron is a free and open source video compositing software, similar in functionality to Adobe After Effects or Nuke by The Foundry.

The project is a free (Mozillla Public License v2) node-based compositor that relies on OpenColorIO for color management, OpenImageIO for file formats support, and Qt for user interface. It also works with 32bit float per channel precision and supports OFX plugins, both free and commercial.

Natron was started last year at Inria, a public science and technology institution that unites several research centres in France. Alexandre Gauthier, the lead developer of Natron, got the required funding from the institution, and last December he additionally won a “Boost Your Code” contest at Inria that offered him 12 months of paid development. In May this year, Alexandre presented the project at Libre Graphics Meeting in Leipzig.

Continue reading »

flattr this!

Oct 122014
 

Article by Mikko Ohtamaa first posted on his blog

Often you want to automatize something using shell scripting. In a perfect world your script robot works for you without getting tired, without hick-ups, and you can just sit at the front of your desk and sip coffee.

31451391

Then we enter the real world: Your network is disconnected. DNS goes downs. Your HTTP hooks and downloads stall. Interprocess communication hangs. Effectively this means that even if your script is running correctly from the point of operating system it won’t finish its work before you finish your cup of coffee.

Continue reading »

flattr this!

Oct 092014
 

Article by Charles McColm first published on FullCircle, issue 88

Physical media is cumbersome.
If you own a lot of DVDs, Blueray discs, VHS, or, gasp!, Discovision (circa 1978), you know how ugly it looks stored in your living room by your entertainment system. Digital media is hot for its portability between devices. Ripping DVDs is a fairly simple process and there are lots of guides around that show how to install and rip movie DVDs using Handbrake. But what about those multi-movie DVDs or DVDs with multiple episodes of a television show? Handbrake can rip those too and the process is fairly simple.

Continue reading »

flattr this!

Sep 302014
 

tux-terminal.jpg
Article by Daniel Miessler first posted on his blog

lsof is the sysadmin/security über-tool. I use it most for getting network connection related information from a system, but that’s just the beginning for this powerful and too-little-known application. The tool is aptly called lsof because it “lists openfiles“. And remember, in UNIX just about everything (including a network socket) is a file.

Interestingly, lsof is also the Linux/Unix command with the most switches. It has so many it has to use both minuses andpluses.

usage: [-?abhlnNoOPRstUvV] [+|-c c] [+|-d s] [+D D] [+|-f[cgG]]
 [-F [f]] [-g [s]] [-i [i]] [+|-L [l]] [+|-M] [-o [o]]
 [-p s] [+|-r [t]] [-S [t]] [-T [t]] [-u s] [+|-w] [-x [fl]] [--] [names]

As you can see, lsof has a truly staggering number of options. You can use it to get information about devices on your system, what a given user is touching at any given point, or even what files or network connectivity a process is using.

For me, lsof replaces both netstat and ps entirely. It has everything I get from those tools and much, much more. So let’s look at some of its primary capabilities:

Continue reading »

flattr this!

Sep 292014
 

The most new and dangerous bug around it’s the one called “shellshock”, this is a security bug in the widely used Unix Bash shell which was disclosed on 24 September 2014. Many Internet daemons, such as web servers, use Bash to process certain commands, allowing an attacker to cause vulnerable versions of Bash to execute arbitrary commands. This can allow an attacker to gain unauthorized access to a computer system.

The bug causes Bash to unintentionally execute commands when they are stored in specially crafted environment variables. Within days, a series of further related vulnerabilities in Bash were found, leading to the need for further patches.

By 25 September, botnets based on computers compromised with this exploit were being used by attackers for distributed denial-of-service attacks and vulnerability scanning, source wikipedia

Let’s see how to check if your computer or server is vulnerable.
Continue reading »

flattr this!