❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

Linus Torvalds Marks Bcachefs as Now 'Externally Maintained'

By: BeauHD
29 August 2025 at 18:00
Linus Torvalds updated the kernel's MAINTAINERS file to mark Bcachefs as "externally maintained," signaling he won't accept new Bcachefs pull requests for now. "MAINTAINERS: mark bcachefs externally maintained," wrote Torvalds with the patch. "As per many long discussion threads, public and private." "The Bcachefs code is still present in the mainline Linux kernel likely to prevent users from having any immediate fall-out in Bcachefs file-systems they may already be using, but it doesn't look like Linus Torvalds will be honoring any new Bcachefs pull requests in the near future," adds Phoronix's Michael Larabel.

Read more of this story at Slashdot.

Ben’s excellent adventure with Linux

By: Ben Myers
16 June 2025 at 03:45
ISSUE 22.24 β€’ 2025-06-16 BEN’S WORKSHOP By Ben Myers Why not install and use Linux on a well-appointed laptop that does not meet Windows 11 hardware requirements? This is my adventure setting up a laptop to run a Linux distribution and to use it productively for writing. The PC in question is a really nice […]

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

By: BHIS
11 May 2023 at 10:30

moth // IntroductionΒ  One fateful night in June of 2022, Ethan sent a message to the crew: β€œAnyone know ways to foolΒ AuditdΒ on Linux?Β I’mΒ trying to figure out how to change theΒ auidΒ (audit […]

The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t appeared first on Black Hills Information Security, Inc..

Linux System Call MonitoringΒ 

13 September 2022 at 12:37

moth // I’ve been diving deep into Linux lately, with my latest kick being exploring the Linux kernel. I’ve found β€œThe Linux Programming Interface” (TLPI) by Michael Kerrisk, among others, […]

The post Linux System Call MonitoringΒ  appeared first on Black Hills Information Security, Inc..

Webcast: Linux Forensics Magical Mystery Tour With Hal Pomeranz

By: BHIS
17 June 2020 at 08:16

One of our favorite BHIS guest presenters, Hal Pomeranz, returns for more of the Linux goodness. Roll up for a magical tour through the mysteries of Linux file systems! Relative […]

The post Webcast: Linux Forensics Magical Mystery Tour With Hal Pomeranz appeared first on Black Hills Information Security, Inc..

Webcast: Linux Command Line Dojo with Hal Pomeranz

In this webcast, we have our friend Hal Pomeranz sharing his massive knowledge on Linux. If you’re new to Linux, or if you know it and just want to hear […]

The post Webcast: Linux Command Line Dojo with Hal Pomeranz appeared first on Black Hills Information Security, Inc..

πŸ’Ύ

Fixing EyeWitness Install Errors on Kali Linux

By: BHIS
24 September 2019 at 11:04

Darin Roberts // I recently had to install a new gold image as my Kali Linux testing virtual machine.Β  Almost on every test I do, I clone the gold image […]

The post Fixing EyeWitness Install Errors on Kali Linux appeared first on Black Hills Information Security, Inc..

Two Button PWNage

By: BHIS
17 November 2016 at 12:15

Logan Lembke // Step One: Power. Step Two: Enter. Step Three: ???? Step Four: Profit. In the security industry, we love our encryption. However sometimes, the complexity introduced by encryption […]

The post Two Button PWNage appeared first on Black Hills Information Security, Inc..

Lawrence’s List 090216

By: BHIS
2 September 2016 at 13:14

Lawrence Hoffmann // Election fraud is something I’ve mentioned here recently. The reality we must face here is that any time a digital system is used for voting there is […]

The post Lawrence’s List 090216 appeared first on Black Hills Information Security, Inc..

Time To Bash on Windows (Bourne Again Shell That Is)

By: BHIS
10 August 2016 at 11:32

Editor’s Note: This is another awesomeΒ guest post from our friend, Robert Schwass. If you’d like to guest post contact us here. Robert Schwass // I had heard the rumors about […]

The post Time To Bash on Windows (Bourne Again Shell That Is) appeared first on Black Hills Information Security, Inc..

Lawrence’s List 071516

By: BHIS
15 July 2016 at 13:41

Lawrence Hoffman // Hey, I’m back! Vacation was great. I spent part of last week on an Island so I was unable to scratch the keep-up-with-the-media itch. Now that I’m […]

The post Lawrence’s List 071516 appeared first on Black Hills Information Security, Inc..

Securing Your Way to Restful Sleep with Ansible Galaxy

By: BHIS
11 July 2016 at 15:03

Jordan Drysdale // Β  Life as a β€˜blue-teamer’ can often be a stressful experience. Working in an environment with a strong Linux infrastructure Β can help some, but Ansible Β can help […]

The post Securing Your Way to Restful Sleep with Ansible Galaxy appeared first on Black Hills Information Security, Inc..

SSH Config Files

By: BHIS
22 June 2016 at 10:26

Ethan Robish // Here’s a short intro for anyone not familiar with ssh config files, which are usually located at ~/.ssh/config As an example, you have ssh running on port […]

The post SSH Config Files appeared first on Black Hills Information Security, Inc..

Lawrence’s List 061316

By: BHIS
3 June 2016 at 11:33

Editor’s Note: We’ll feature Lawrence’s List every week. Β It will include interesting things he’s come across during the week as he’s an avid consumer of internet garbage and follows a […]

The post Lawrence’s List 061316 appeared first on Black Hills Information Security, Inc..

How to create a SOHO router using Ubuntu Linux

By: BHIS
4 March 2016 at 10:42

Joff Thyer // This post is cross-posted from Packet Header on 3/1/16. __________ Β  On Security Weekly Episode 452, I presented a technical segment on how to build your own […]

The post How to create a SOHO router using Ubuntu Linux appeared first on Black Hills Information Security, Inc..

❌
❌