#natural-language-linux-management

[ follow ]
#linux
Gadgets
fromThe Verge
13 hours ago

After three months on Linux, I don't miss Windows at all

Transitioning to Linux as a main operating system has been smoother and more satisfying than expected, with minimal issues encountered.
Software development
fromZDNET
1 day ago

Zorin OS vs. Solus: I tested two great Linux distros for beginners to find out which is best

Solus has improved significantly, offering a solid desktop experience with essential preinstalled software, but Zorin OS remains the superior choice.
DevOps
fromZDNET
4 days ago

I set up this Linux 'Watchdog' and now my system auto-reboots when it locks up

Watchdog automates the rebooting of Linux systems that lock up, ensuring accessibility and reliability.
Node JS
fromZDNET
1 month ago

How this strange little distro can boost your Linux skills

Peropesis is a command-line-only Linux distribution designed for learning the CLI.
Software development
fromZDNET
1 week ago

This Linux distro offers an easy DNS switcher - but there's more to it that I like

iDealOS is a new MXLinux-based distribution offering two editions, emphasizing choice and the potential for paid Linux models.
DevOps
fromMedium
3 weeks ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
Gadgets
fromThe Verge
13 hours ago

After three months on Linux, I don't miss Windows at all

Transitioning to Linux as a main operating system has been smoother and more satisfying than expected, with minimal issues encountered.
Software development
fromZDNET
1 day ago

Zorin OS vs. Solus: I tested two great Linux distros for beginners to find out which is best

Solus has improved significantly, offering a solid desktop experience with essential preinstalled software, but Zorin OS remains the superior choice.
DevOps
fromZDNET
4 days ago

I set up this Linux 'Watchdog' and now my system auto-reboots when it locks up

Watchdog automates the rebooting of Linux systems that lock up, ensuring accessibility and reliability.
Node JS
fromZDNET
1 month ago

How this strange little distro can boost your Linux skills

Peropesis is a command-line-only Linux distribution designed for learning the CLI.
Software development
fromZDNET
1 week ago

This Linux distro offers an easy DNS switcher - but there's more to it that I like

iDealOS is a new MXLinux-based distribution offering two editions, emphasizing choice and the potential for paid Linux models.
DevOps
fromMedium
3 weeks ago

I Asked This Linux Question in Every Interview-And Here's the Catch

Linux knowledge is crucial for DevOps roles, impacting job performance and work-life balance.
#open-source
fromYcombinator
1 week ago
Information security

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

DevOps
fromTheregister
2 days ago

Open source models can find bugs as well as Mythos

Open source models can effectively find bugs comparable to Anthropic's Mythos, according to Ari Herbert-Voss, emphasizing the importance of human expertise in their orchestration.
Information security
fromYcombinator
1 week ago

Show HN: OpenParallax: OS-level privilege separation for AI agent execution | Hacker News

An open-source AI agent was developed with a secure, sandboxed architecture to prevent data exfiltration and unauthorized actions.
#ubuntu
Web frameworks
fromTheregister
2 days ago

Ubuntu Resolute Raccoon drops Xorg, keeps X11 apps alive

Ubuntu 26.04 'Resolute Raccoon' features GNOME 50, Linux kernel 7.0, and is now Wayland-only, dropping Xorg support.
DevOps
fromZDNET
3 days ago

Built for a hostile internet: Canonical VP of Engineering on Ubuntu 26.04 LTS

Ubuntu 26.04 LTS focuses on resilience, safety, and AI tool improvements for diverse users.
Web frameworks
fromTheregister
2 days ago

Ubuntu Resolute Raccoon drops Xorg, keeps X11 apps alive

Ubuntu 26.04 'Resolute Raccoon' features GNOME 50, Linux kernel 7.0, and is now Wayland-only, dropping Xorg support.
DevOps
fromZDNET
3 days ago

Built for a hostile internet: Canonical VP of Engineering on Ubuntu 26.04 LTS

Ubuntu 26.04 LTS focuses on resilience, safety, and AI tool improvements for diverse users.
fromTechzine Global
2 days ago

Microsoft offers IT admins a way to remove Copilot

The Copilot app cannot be removed arbitrarily. Three cumulative conditions apply: Microsoft 365 Copilot must also be installed on the device, the Copilot app must not have been installed by the user themselves, and the app must not have been launched in the past 28 days.
Privacy technologies
#github
Privacy professionals
fromTheregister
4 days ago

GitHub CLI begins collecting client-side user telemetry

GitHub's CLI now collects pseudonymous telemetry by default to improve features and user experience, raising privacy concerns among users.
Privacy professionals
fromTheregister
4 days ago

GitHub CLI begins collecting client-side user telemetry

GitHub's CLI now collects pseudonymous telemetry by default to improve features and user experience, raising privacy concerns among users.
fromSecuritymagazine
4 days ago

Operationally Ineffective: Putting CVEs in a Chokehold with Privilege Disruption

A Common Vulnerability Exposure (CVE) that cannot reach the privilege plane is operationally ineffective - even at a CVSS Score of 10. This should be a core philosophy that is embedded into the fabric of software engineering.
Information security
DevOps
fromDevOps.com
3 days ago

How to Manage Operations in DevOps Using Modern Technology - DevOps.com

Operations in DevOps now involves supporting faster releases, managing cloud-native environments, improving security, and ensuring reliability at scale.
Information security
fromArs Technica
4 days ago

Microsoft issues emergency update for macOS and Linux ASP.NET threat

Microsoft released an emergency patch for ASP.NET Core to fix a high-severity vulnerability allowing unauthenticated attackers to gain SYSTEM privileges.
Information security
fromTheregister
4 days ago

Another npm supply chain worm hits dev environments

A new npm supply-chain attack targets developer workflows, compromising multiple packages and stealing sensitive data, with similarities to previous CanisterWorm infections.
DevOps
fromInfoQ
4 days ago

How Observability and Telemetry Can Enhance the Practice of Software Engineering

Observability must adapt to modern serverless and event-driven architectures, utilizing OpenTelemetry for effective telemetry and improved system understanding.
Software development
fromInfoWorld
3 days ago

Microsoft taps Anthropic's Mythos to strengthen secure software development

Mythos can enhance the security of Microsoft products, benefiting enterprises without direct access.
#malware
fromInfoWorld
4 days ago
Information security

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
fromTheregister
1 week ago
Information security

Fake Linux Foundation leader using Slack to phish devs

A malware campaign targets open source developers via Slack, impersonating a Linux Foundation official to steal credentials and compromise systems.
Information security
fromInfoWorld
4 days ago

Malicious pgserve, automagik developer tools found in npm registry

Malicious npm packages aim to steal sensitive data and credentials, potentially leading to complete organizational takeovers.
Information security
fromTheregister
1 week ago

Fake Linux Foundation leader using Slack to phish devs

A malware campaign targets open source developers via Slack, impersonating a Linux Foundation official to steal credentials and compromise systems.
DevOps
fromTechzine Global
3 days ago

AWS Bedrock AgentCore gets managed harness and CLI for AI agents

AWS expands Amazon Bedrock AgentCore, enabling developers to create AI agents with just 3 API calls, streamlining the setup process significantly.
DevOps
fromDevOps.com
4 days ago

SUSE Extends AI Agent Reach via MCP Server Integration - DevOps.com

SUSE collaborates with AI providers to enhance IT infrastructure management through the Model Context Protocol (MCP) server integration.
#cybersecurity
Information security
fromThe Hacker News
4 days ago

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Harvester has deployed a new Linux version of its GoGra backdoor targeting entities in South Asia using Microsoft Graph API for covert operations.
Information security
fromDevOps.com
5 days ago

Critical Microsoft GitHub Flaw Highlights Dangers to CI/CD Pipelines: Tenable - DevOps.com

A critical vulnerability in a Microsoft GitHub repository allows attackers to exploit CI/CD infrastructure and run arbitrary code.
Information security
fromThe Hacker News
4 days ago

Harvester Deploys Linux GoGra Backdoor in South Asia Using Microsoft Graph API

Harvester has deployed a new Linux version of its GoGra backdoor targeting entities in South Asia using Microsoft Graph API for covert operations.
Information security
fromDevOps.com
5 days ago

Critical Microsoft GitHub Flaw Highlights Dangers to CI/CD Pipelines: Tenable - DevOps.com

A critical vulnerability in a Microsoft GitHub repository allows attackers to exploit CI/CD infrastructure and run arbitrary code.
Software development
fromDevOps.com
1 week ago

Waydev Adds Ability to Track How Much AI Code Winds Up in Production - DevOps.com

Waydev's platform enhances DevOps by tracking AI coding tool impacts on workflows and ROI for software engineering teams.
Information security
fromDeveloper Tech News
4 days ago

Check Point: AI coding assistants are leaking API keys

AI coding assistants are unintentionally leaking sensitive internal data, including API keys, by ingesting entire workspaces without recognizing sensitive files.
DevOps
fromMedium
5 days ago

Practical AgentOps: Getting Started with MLflow 3

MLflow 3.0 enhances generative AI support while ensuring compatibility with traditional ML workflows.
Information security
fromComputerWeekly.com
4 days ago

A tsunami of flaws: When frontier AI and Patch Tuesday collide | Computer Weekly

April 2025 Patch Tuesday update was the second-largest in history, addressing over 160 vulnerabilities, with AI tools potentially driving the increase.
DevOps
fromDevOps.com
1 week ago

From Code to Cloud: How Full-Stack Developers are Taking Over DevOps - DevOps.com

Full-stack engineers now integrate DevOps practices, managing the entire software process from code to cloud, emphasizing early testing and automation.
fromInfoQ
1 week ago

Engineering Stable, Secure and Scalable Platforms: A Conversation with Matthew Liste

I was always a tinkerer, I guess. I grew up in the age where computers were not ubiquitous or common. An experience as a kid was instrumental in how my career happened.
DevOps
Information security
fromTNW | Next-Featured
5 days ago

Lovable security crisis: 48 days of exposed projects, closed bug reports, & the structural failure of vibe coding security

Lovable's security incidents expose vulnerabilities in AI-generated code and highlight a market focus on growth over security.
#linux-kernel
Software development
fromTheregister
2 weeks ago

Linux 7.0 debuts as Linus Torvalds ponders AI's impact

Version 7.0 of the Linux kernel features small fixes, AI tool integration, official Rust support, and enhancements for various processors and filesystems.
Software development
fromTheregister
2 weeks ago

Linux 7.0 debuts as Linus Torvalds ponders AI's impact

Version 7.0 of the Linux kernel features small fixes, AI tool integration, official Rust support, and enhancements for various processors and filesystems.
Information security
fromSecuritymagazine
1 week ago

58% of Organizations Spend Over 10 Hours a Month Securing AI-generated Code

31% of organizations using AI-generated code spend 10 hours or less per month on validation and auditing, raising security concerns.
DevOps
fromMedium
2 weeks ago

Set it up once, test it properly, and let the system handle the rest.

Automating SSL certificate renewal prevents production outages and reduces stress during incidents.
Information security
fromDevOps.com
1 week ago

The Open Source Trap: Why Trust Isn't a Security Strategy - DevOps.com

The software supply chain is vulnerable due to reliance on under-resourced open source maintainers, requiring active organizational support for security.
Information security
fromSecurityWeek
1 week ago

Exploited Vulnerability Exposes Nginx Servers to Hacking

A critical vulnerability in Nginx UI allows attackers to take full control of servers, affecting numerous deployments worldwide.
Information security
fromInfoQ
1 week ago

Claude Code Used to Find Remotely Exploitable Linux Kernel Vulnerability Hidden for 23 Years

Claude Code identified multiple security vulnerabilities in the Linux kernel, including a long-standing heap buffer overflow, with minimal oversight required.
DevOps
fromDevOps.com
3 weeks ago

Survey Surfaces Increased Reliance on Open Source Software to Build Apps - DevOps.com

Open source software adoption is prevalent, with 49% of IT professionals reporting increased usage, primarily due to cost savings and avoiding vendor lock-in.
Software development
fromMedium
3 weeks ago

Running your life from terminal is peak 2026 - and that's not the flex you think it is

Claude Code transforms personal and professional workflows through automation and task management, enabling users to save time and prioritize effectively.
DevOps
fromDevOps.com
3 weeks ago

How AI is Shaping Modern DevOps and DevSecOps - DevOps.com

AI is transforming software delivery, with significant adoption expected by 2028, enhancing efficiency across the software development lifecycle.
Privacy technologies
fromTheregister
1 month ago

Nanny state vs. Linux: show us your ID, kid

Multiple US states now require operating system vendors to collect and store user age or date of birth, with similar laws emerging globally and threatening open-source platforms' user freedom principles.
Gadgets
fromTheregister
2 months ago

Help! Does anyone on the bus know Linux?

A bus-mounted digital signage system failed to boot, displaying a GRUB rescue prompt that requires Linux expertise and input access to repair.
DevOps
fromApp Developer Magazine
3 weeks ago

Lens Launches MCP Server to Connect AI Coding Assistants with Kubernetes

Lens by Mirantis integrates a Model Context Protocol server, simplifying AI coding assistants' access to Kubernetes clusters.
fromTechzine Global
1 month ago

Red Hat makes Ansible the execution layer for agentic AI systems

In order to use agents or in order to use AI in IT operations, all of your systems need to be interconnected and what interconnects all of your systems is an automation platform. Interconnecting systems is only a piece of the puzzle though. There is also some well-founded concern about the autonomous AI systems we are moving towards. AI agents may make decisions and inferences, but enterprises remain hesitant to allow direct execution on production systems.
Tech industry
#cups
Information security
fromTheregister
2 weeks ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
Information security
fromTheregister
2 weeks ago

AI agents found vulns in this Linux and Unix print server

Two vulnerabilities in CUPS allow unauthenticated remote code execution and root file overwrite, posing significant security risks in networked environments.
Software development
fromTheregister
1 month ago

Linux kernel czar says AI bug reports aren't slop anymore

AI-driven activity around Linux security and code review has significantly improved, leading to better quality reports and increased collaboration among open source projects.
fromDevOps.com
2 weeks ago

Is Your AI Agent Secure? The DevOps Case for Adversarial QA Testing - DevOps.com

The most dangerous assumption in quality engineering right now is that you can validate an autonomous testing agent the same way you validated a deterministic application. When your systems can reason, adapt, and make decisions on their own, that linear validation model collapses.
Information security
Information security
fromThe Hacker News
3 weeks ago

Microsoft Details Cookie-Controlled PHP Web Shells Persisting via Cron on Linux Servers

Threat actors exploit HTTP cookies for PHP web shells on Linux servers, enabling remote code execution with stealthy control mechanisms.
Software development
fromTheregister
1 month ago

Systemd 260 kills SysV, tells AI not to misbehave

Systemd 260 removes System V init script support and introduces AI-assisted code review capabilities, marking significant architectural changes to the widely-used Linux init system.
fromZDNET
2 months ago

8 Linux distros I always recommend first to developers - and why

For the longest time, Linux was considered to be geared specifically for developers and computer scientists. Modern distributions are far more general purpose now -- but that doesn't mean there aren't certain distros that are also ideal platforms for developers. What makes a distribution right for developers? Although I consider app compatibility, stability, and flexibility to be essential attributes for most any Linux distribution, developers also need the right tools
Software development
Software development
fromZDNET
1 month ago

8 powerful Apt commands I use to unlock hidden features - and why they're so handy

The Debian/Ubuntu apt package manager offers advanced commands beyond basic install and remove functions for more powerful system management.
fromZDNET
2 months ago

I found the best Linux server distros for your home lab

I've had several incarnations of the self-hosted home lab for decades. At one point, I had a small server farm of various machines that were either too old to serve as desktops or that people simply no longer wanted. I'd grab those machines, install Linux on them, and use them for various server purposes. Here are two questions you should ask yourself:
DevOps
Software development
fromTheregister
1 month ago

AI has made the CLI more important and powerful

Command line interfaces are resurging because graphical user interfaces poorly accommodate autonomous agents, threatening software design and development practices.
fromZDNET
2 months ago

The latest Linux kernel release closes out the 6.x era - and it's a gift to cloud admins

Ring the bells, sound the trumpet, the Linux 6.19 kernel has arrived. Linus Torvalds announced that "6.19 is out as expected -- just as the US prepares to come to a complete standstill later today, watching the latest batch of televised commercials." Because while the big news in Linux circles might be a new Linux release, Torvalds recognizes that for many people, the "big news [was] some random sporting event." American football, what can you do?
Software development
DevOps
fromAnarc
2 months ago

Kernel-only network configuration on Linux

The Linux kernel ip= boot parameter configures network interfaces at boot without userland tools, working across distributions and dating to early kernels.
fromZDNET
2 months ago

How to write Linux bash scripts on your Android - and why you'd want to

Bash scripts are a great way to automate all sorts of repetitive tasks -- you can run backups, clear temporary files/logs, rename or batch-rename files, install or update software, and much more. Although writing such scripts isn't nearly as hard as you might think, it does take some time to learn the ins and outs of bash scripting. Also: 6 hidden Android features that are seriously useful (and how they made my life easier) Good news: If you have an Android device, you can enable the Linux terminal, which means you can create or practice your bash scripting on the go.
Software development
fromTechzine Global
1 month ago

Linux security layer extremely vulnerable: 12.6 million systems affected

The vulnerabilities exploit a confused deputy attack. An unauthorized user can manipulate a privileged process to perform actions on their behalf, without having the necessary rights themselves. Specifically, attackers abuse tools such as Sudo or Postfix to modify AppArmor profiles via pseudo-files such as /sys/kernel/security/apparmor/.load and .replace.
Information security
fromZDNET
2 months ago

Need to manage virtual machines on Linux? I found an easier way

I recently wrote about my migration away from VirtualBox to KVM/Virt-Machine for my virtual machine needs. I've found those tools to be far superior (albeit with a bit more of a learning curve) than VirtualBox. Since then, however, I've found another method of working with KVM (the Linux kernel virtual machine technology), one that not only allows me to create and manage virtual machines on my local computer, but also from any machine on my LAN. That tool is Cockpit, which makes managing your Linux machines considerably easier.
DevOps
fromZDNET
2 months ago

Want to self-host for free? This server OS makes it easy - here's how to get started

Because of that, you need to be very familiar and comfortable with the command line. Or you can install a desktop environment. In my opinion, this is the single easiest way to make Ubuntu Server easier, especially if you're relatively new to Linux. Having a GUI desktop will strip away the fear of having to use the command line, because you'll have plenty of apps to use (such as the file manager, user manager, GUI app store, and much more).
DevOps
fromTheregister
2 months ago

Sudo's maintainer needs resources to keep utility updated

Sudo, for those not familiar with Unix systems, is a command-line utility that allows authorized users to run specific commands as another user, typically the superuser, under tightly controlled policy rules. It is a foundational component of Unix and Linux systems: without tools like sudo, administrators would be forced to rely more heavily on direct root logins or broader privilege escalation mechanisms, increasing both operational risk and attack surface.
Information security
Software development
fromZDNET
2 months ago

This Linux distro has one of the smartest security features I've seen (and I've tested dozens)

iDeal OS is a user-friendly, Debian-based rolling-release distribution featuring KDE Plasma, two editions (Emerald and Diamond), and a DNS switcher for enhanced security.
Information security
fromSecurityWeek
2 months ago

Organizations Warned of Exploited Linux Vulnerabilities

Critical GNU Inetutils telnetd authentication bypass (CVE-2026-24061) enables remote root via crafted Telnet USER variable, and kernel integer overflow (CVE-2018-14634) permits privilege escalation.
fromThe Hacker News
2 months ago

SSHStalker Botnet Uses IRC C2 to Control Linux Systems via Legacy Kernel Exploits

"The toolset blends stealth helpers with legacy-era Linux exploitation: Alongside log cleaners (utmp/wtmp/lastlog tampering) and rootkit-class artifacts, the actor keeps a large back-catalog of Linux 2.6.x-era exploits (2009-2010 CVEs)," cybersecurity company Flare said. "These are low value against modern stacks, but remain effective against 'forgotten' infrastructure and long-tail legacy environments." SSHStalker combines IRC botnet mechanics with an automated mass-compromise operation that uses an SSH scanner and other readily available scanners to co-opt susceptible systems into a network and enroll them in IRC channels.
Information security
fromMedium
3 months ago

Linux Permissions Unleashed: A Deep Dive into Access Control Lists (ACLs)

We have already discussed in the previous two articles about file and folder permissions along with special permissions that are supported in linux. The permissions are effective for many scenarios. But what happens when you need more granularity? How do you grant write access to a file to just one specific user who isn't the owner and isn't in the owning group? How do you allow two different groups read access, but only one of them write access?
Information security
fromZDNET
2 months ago

Kali Linux vs. Parrot OS: Which security-forward distro is right for you?

Kali Linux and Parrot OS are free, Debian-based distributions focused on penetration testing; Parrot OS also offers a general-purpose edition.
[ Load more ]