POPULARITY
This week we discuss the DLN community's take on must-have software, Ubuntu Touch on the Raspberry PI, concerns over proprietary software from Flathub appearing in the Software Center on Fedora, Bitwarden software spotlight, and DLN's first charity FreeGeek. Please stop by the DLN Discourse, Telegram, Mumble and Discord to continue the discussion. We know you are busy and appreciate you taking time out of your day to listen to our podcast. Thank you!
We can all agree that technology is a powerful tool in the classroom and this week’s guests are passionate about using technology in the special education classroom. Max Leaf from Mesa High and Jayme Leaf as a Special Education Instructional Coach see and understand the power of transforming learning through technology in the special education classroom. They share different programs and resources they use with their students from OneNote with several accommodations already built in to immersive readers to communication programs. This is an important conversation and one you do not want to miss. Show Notes Creating inclusive classroom with the help of OneNote Using Technology to Empower Students with Special Needs SymbolWorld - provides picture supported text in the areas of current events, science, sports, functional tasks, etc. Chat Editor Resources - Chat Editor is located in the Software Center for MPS Teachers
We hear from George about Windows and printers. Roger and Gord also comment on printers. Many questions as always, and a report of problems installing the Software Center. Episode 365 Time Stamps 00:00 Going Linux #365 · Listener Feedback 00:15 Introduction 00:59 Bill tries even more distros 09:01 Our official new community and chat room is MeWe 13:05 Donations 16:40 George from Tulsa: More Windows tales 20:05 Carl: A question for the wise minions and the masters 30:15 Roger: Ubuntu MATE and printer paperweights 33:23 George: Suggested Linux printer 39:01 Gord: More comments on printers 40:48 Tony H from the MintCast: Quality podcast audio 44:02 NZ17: Help for a hero 49:40 Michael: Problems installing the Software Center 54:22 MX Linux 54:53 Podnutz 57:21 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 58:43 End
We hear from George about Windows and printers. Roger and Gord also comment on printers. Many questions as always, and a report of problems installing the Software Center. Episode 365 Time Stamps 00:00 Going Linux #365 · Listener Feedback 00:15 Introduction 00:59 Bill tries even more distros 09:01 Our official new community and chat room is MeWe 13:05 Donations 16:40 George from Tulsa: More Windows tales 20:05 Carl: A question for the wise minions and the masters 30:15 Roger: Ubuntu MATE and printer paperweights 33:23 George: Suggested Linux printer 39:01 Gord: More comments on printers 40:48 Tony H from the MintCast: Quality podcast audio 44:02 NZ17: Help for a hero 49:40 Michael: Problems installing the Software Center 54:22 MX Linux 54:53 Podnutz 57:21 goinglinux.com, goinglinux@gmail.com, +1-904-468-7889, @goinglinux, feedback, listen, subscribe 58:43 End
I just want to make sure you have known this news and updated your Cisco ASA OS already.Cisco announced a "critical" vulnerability of Cisco ASA OS and released patched OS for them at the same time. Hackers could make use of this vulnerability to gain control of your Cisco ASA.The first fixed version of ASA OS to fix this problem.Screen captured on Cisco's web site.Vulnerable ProductsCisco ASA Software is affected by this vulnerability if the system is configured to terminate IKEv1 or IKEv2 VPN connections.This includes the following:LAN-to-LAN IPsec VPNRemote access VPN using the IPsec VPN clientLayer 2 Tunneling Protocol (L2TP)-over-IPsec VPN connectionsIKEv2 AnyConnectCisco ASA Software can be downloaded from the Software Center on Cisco.com by visitinghttp://www.cisco.com/cisco/software/navigator.html.The full details about this vulnerability and patched OS is on Cisco's official web site:Cisco ASA Software IKEv1 and IKEv2 Buffer Overflow Vulnerability (CVE-2016-1287)One more thing...I have learned one lesson several years ago. Around 2003, I secretly installed a SQL server right in my house. I thought I was the only one who knew I have installed that SQL server, and I was the only one who knew my public IP address. I put that server at public Internet side so I can get back to it any time I want.However, I was wrong. Within just 12 hours, hackers found and broke into my SQL server.The key lesson I have learned is, if I tried again to put some hardware or software with vulnerability unfixed at public Internet, the survival time for it would be far less than 12 hours. Remember, it was only year 2003.Go patch up your Cisco ASA OS ASAP!
In dieser Folge spreche ich über die Rundfunkgebühren, Kommandozeilen auf Geldautomaten, Android Malware und Canonicals Planung ohne Software Center für Ubuntu 16.04 sowie weitere Themen. Themen: Rundfunkbeitrag für alle auch Firmen (Sixt geht in dritte Instanz) Geld abheben mit Hilfe der Kommandozeile Android Malware erreicht neue Dimension Canonical schmeißt Software Center weg Distro der Woche: Fedora 23 Sailfish der Woche: Battery Log Wie immer wünsche ich viel Spaß beim reinhören ;)
Sendung mit dem Pinguin: #8 Software-Center
Sendung mit dem Pinguin: #8 Software-Center
Sendung mit dem Pinguin: #8 Software-Center