Feed aggregator
Armbian 25.5 Released with Support for Banana Pi M2+ and BeagleBone AI-64 SBCs
Coming three months after Armbian 25.2, this release introduces support for new single-board computers, such as the Banana Pi M2+, BeagleBone AI-64, BeaglePlay, TI SK-AM69, Mediatek Genio Family, Radxa NIO 12L, Qualcomm Robotics RB5, Radxa Cubie A5E, SMART AM40, and PocketBeagle2.
The post Armbian 25.5 Released with Support for Banana Pi M2+ and BeagleBone AI-64 SBCs appeared first on Linux Today.
GNU Linux-Libre 6.15 Kernel Is Out for Those Who Seek 100% Freedom for Their PCs
Based on the just-released Linux 6.15 kernel series, the GNU Linux-libre 6.15 kernel is here to clean up Nova Core GPU, Qualcomm iris v4l2, Airoha NPU, Tehuti Networks TN40xx 10G Ethernet, Realtek 8814A Wi-Fi, Apple Silicon SoC touchscreen, Renesas UFS hooks, and aw88166 audio drivers.
The post GNU Linux-Libre 6.15 Kernel Is Out for Those Who Seek 100% Freedom for Their PCs appeared first on Linux Today.
PanVK reaches Vulkan 1.2 conformance on Mali-G610
Just about 6 weeks after Collabora announced Vulkan 1.1 conformance for PanVK on G610 GPUs, Vulkan 1.2 is now also checked off the list!
The post PanVK reaches Vulkan 1.2 conformance on Mali-G610 appeared first on Linux Today.
next-20250604: linux-next
Understanding dev null: The Linux and Unix Data Black Hole
In the world of Linux and Unix, dev-null is a unique and powerful feature often referred to as a data sink or “black hole”. It’s technically a character special file that silently discards all data written to it.
When you redirect output to dev-null, the system simply throws it away, making it especially useful during script debugging or when you want to suppress command outputs. For a broader context on Linux security, including recent threats like ClickFix attacks, you can read this article.
Understanding how and when to use dev-null can improve your workflow, especially when dealing with verbose programs or background scripts. It’s often used to keep terminal outputs clean, redirect errors for analysis, or even mute logs in automated scripts.
Familiarity with output redirection also ties into important security practices, such as those discussed in this article about a critical SMB module vulnerability or the privacy features in Brave’s private window with Tor.
The post Understanding dev null: The Linux and Unix Data Black Hole appeared first on Linux Today.
How to Manually Create a User in Linux and Unix (Step-by-Step Guide)
Creating users manually in Linux or Unix is a valuable skill that provides a deeper understanding of how user management works under the hood. While the useradd command offers a quick way to add users, doing it by hand teaches you what changes are made behind the scenes. This method can be particularly useful in minimal environments or custom configurations. For a broader look at foundational commands that help you navigate the terminal more effectively, check out this list of 15 basic Linux commands.
Let’s walk through how to manually create a new user called DarthVader. This process includes editing essential system files such as passwd, shadow, and group, all of which are located in the /etc folder. We’ll also set up a home directory and assign the proper permissions. If you’re also interested in path manipulations or retrieving system info via CLI, refer to this guide on basename and dirname or this article on gathering computer information.
The post How to Manually Create a User in Linux and Unix (Step-by-Step Guide) appeared first on Linux Today.
[$] Safety certification for open-source systems
This year's Linaro Connect in Lisbon, Portugal featured a number of talks about the use of open-source components in safety-critical systems. Kate Stewart gave a keynote on the topic on the first day of the conference. In it, she highlighted several projects that have been working to pursue safety certification and spoke about the importance of being able to trace software's origins to safety. In a talk on the second day, Roberto Bagnara shared his experience with working on one of those projects, the Xen hypervisor, to conform to a formal set of rules for safety-critical code.
Linux Kernel 6.15 Officially Released, This Is What’s New
Highlights of Linux 6.15 include Rust support for hrtimer and ARMv7, a new setcpuid= boot parameter for x86 CPUs, support for sched_ext to count and report internal events, x86 Intel and AMD PMU enhancements, nested virtualization support for VGICv3 on ARM, and support for emulating FEAT_PMUv3 on Apple Silicon.
The post Linux Kernel 6.15 Officially Released, This Is What’s New appeared first on Linux Today.
Linuxiac Weekly Wrap-Up: Week 21 (May 19 – 25, 2025)
Catch up on the latest Linux news: RHEL 10, NixOS 25.05, AlmaLinux 9.6, Microsoft open sources WSL, Fedora 43 drops GNOME X11 support, and more.
The post Linuxiac Weekly Wrap-Up: Week 21 (May 19 – 25, 2025) appeared first on Linux Today.
13 Common Linux Myths Debunked (With Real Facts)
Tired of outdated ideas about Linux? We debunk the most common Linux myths and misconceptions, revealing the truth about the Linux OS.
The post 13 Common Linux Myths Debunked (With Real Facts) appeared first on Linux Today.
Security updates for Tuesday
8 Best Free and Open Source Linux Personal Information Managers
A personal information manager (often known as a PIM tool) is a type of collaborative software that can help you manage your life by offering personal organizing functionality. We pick our favorites.
The post 8 Best Free and Open Source Linux Personal Information Managers appeared first on Linux Today.
28 Delightful Free and Open Source ASCII Art Tools
There are some weird utilities featured here, which will particularly be of interest to anyone with an affectionate nostalgia for old school computing, who want to remember the heady days of Bulletin Board Systems, telnet and other pre-WWW networks.
The post 28 Delightful Free and Open Source ASCII Art Tools appeared first on Linux Today.
How to Enable HTTPS Protocol on AlmaLinux 10
This blog post teaches you how to enable HTTPS protocol on AlmaLinux 10. HTTPS is hypertext transfer protocol secure and is the secure version of the HTTP protocol. To increase security, the HTTPS protocol sends encrypted data between web browsers and websites. This is extremely important when the user transmits sensitive data, such as logging in, storing credit card information, paying online, etc. The HTTPS uses the SSL (Secure Socket Layer) to encrypt the transmitted data and verify the server’s identity.
In the next few paragraphs, we will explain in more detail how to enable the HTTPS Protocol. Let’s get started!
The post How to Enable HTTPS Protocol on AlmaLinux 10 appeared first on Linux Today.
How to Install PostgreSQL on AlmaLinux 10
This blog post teaches you how to install PostgreSQL on AlmaLinux 10. PostgreSQL, or Postgres, is a free and open-source object relational database management system for storing data. PostgreSQL is a powerful RDBMS with various features, such as transactions with atomicity, consistency, isolation, durability, automatic updates, etc. It is compatible with multiple operating systems like Windows, macOS, FreeBSD, and Linux. In the following paragraphs, we will show you how to install the PostgreSQL database management system, manage the service, and use some basic commands.
Installing PostgreSQL on AlmaLinux is straightforward and may take up to 10 minutes. Let’s get started!
The post How to Install PostgreSQL on AlmaLinux 10 appeared first on Linux Today.
NixOS 25.05 Released with Linux 6.12 LTS and 6.14 Kernels, GNOME 48, and More
Powered by the long-term supported Linux 6.12 LTS and Linux 6.14 kernel series, NixOS 25.05 (codename Warbler) is here six months after NixOS 24.11 with support for the latest and greatest GNOME 48 desktop environment series, as well as initial support for System76’s Rust-based COSMIC desktop environment.
The post NixOS 25.05 Released with Linux 6.12 LTS and 6.14 Kernels, GNOME 48, and More appeared first on Linux Today.
Top 15 VsFTP Server Interview Questions with Detailed Answers
FTP stands for File Transfer Protocol and is one of the most widely used and standard protocols over the Internet, which works on a client-server model and is used to transfer files between a client and a server.
Originally, FTP clients were command-line based, but now most platforms come with FTP clients and servers built-in, and many third-party FTP client/server programs are available.
Here we present 15 Interview Questions based on VsFTP (Very Secure File Transfer Protocol) running on Linux servers, explained in a simple and beginner-friendly way.
The post Top 15 VsFTP Server Interview Questions with Detailed Answers appeared first on Linux Today.
Understanding the $SHELL Environment Variable in Unix and Linux
In Unix and Linux systems, the $SHELL environment variable indicates the parent shell that initiated your current session. This can be useful for understanding the runtime environment, particularly when troubleshooting or scripting. It’s important to know that this value doesn’t always reflect your default login shell—it shows the shell that started your current session.
For example, if you start a new shell within your login shell, $SHELL still shows the original one. For more system-related insights, see our guide on how to install Kernel 6.15 on Ubuntu, learn useful grep tricks for ps, or explore the Linux yes command for automating responses.
The post Understanding the $SHELL Environment Variable in Unix and Linux appeared first on Linux Today.
Beware of the Browser-in-the-Middle Attack: What It Is and How to Protect Yourself
A new security threat called the browser-in-the-middle (BITM) attack has recently been uncovered, exposing users—especially those using Apple’s Safari browser—to potential exploits that could compromise their privacy and security.
Reports from BleepingComputer and GBHackers highlight how attackers can take advantage of browser fullscreen features to trick users into revealing sensitive information.
For users interested in broader Linux security concerns, check out our coverage of a critical Linux kernel zero-day vulnerability in the SMB module and how hackers are now testing Clickjacking Fix (ClickFix) attacks on Linux systems.
The post Beware of the Browser-in-the-Middle Attack: What It Is and How to Protect Yourself appeared first on Linux Today.
ChatGPT’s o3 Model Found Remote Zeroday in Linux Kernel Code
Believe it or not, OpenAI’s o3 just uncovered a remote 0-day in the Linux kernel’s SMB code—CVE-2025-37899. A patch has already been rolled out.
The post ChatGPT’s o3 Model Found Remote Zeroday in Linux Kernel Code appeared first on Linux Today.
Pages
