Security experts have discovered a critical vulnerability in OpenSSH which affects versions from 5.4 to 7.1 and it allows attackers to steal encrypted private keys.
A new OpenSSH version has been released to patch this vulnerability, so it is strongly recommended to update to this new release. Another option is to deactivate the vulnerable code adding “UseRoaming no” option in ssh_config file.
During the last weeks, the most read topics in our blog have been our list of Linux predictions for 2016, the video which shows the deployment of virtual desktops with UDS Enterprise & Nutanix Acropolis and the reasons to adopt desktop virtualization this year.
Find below the links to the posts on these topics just in case you haven’t read them yet:
Operating System patching and virtualization deployment, among other things, may change the virtual desktops configuration set by the administrator.
In a Windows environments, these configuration drifts may be detected using Microsoft System Center Configuration Manager (SCCM) to create a configuration baseline featuring groups of different configuration items and apply this baseline to a virtual desktop deployment.
Desktop virtualization is a mature technology which provides huge benefits to companies; above all to those challenging cost control, constant changes and users willing to access information and corporate tools anytime, anywhere and using any device.
Therefore, the beginning of 2016 is the perfect time to consider VDI adoption. Find below five more reasons why this technology may become your best ally:
Linux has changed a lot in 2015. We have seen, for example, how Microsoft now loves Linux and they have created their own distribution. The first Ubuntu smartphone and the first smartwatch running Tizen have been launched. In the enterprise, Linux has become more powerful with tecnhologies like OpenStack, Docker and Cloud Foundry.
This new year which is about to start is going to bring also great changes for Linux. CIO magazine has published some interesting predictions. You can have a look at them below:
Have you bought all your Chistmas gifts? If you’re planning to give electronics, the Free Software Foundation (FSF) asks us to give some thought before buying something that could take more than it gives, since it requires, for example, to pay some license in order to use it.
They also advice us to avoid giving products with harsh rules about copying and sharing, or those which perform remote deletion of files without asking users.
To offer the best experiences, we use technologies such as cookies to store and/or access device information. Consent to these technologies will allow us to process data such as browsing behavior or unique identifications on this site. Not consenting or withdrawing consent may negatively affect certain features and functions.
Functional
Always active
The storage or technical access is strictly necessary for the legitimate purpose of allowing the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication through an electronic communications network.
Preferencias
El almacenamiento o acceso técnico es necesario para la finalidad legítima de almacenar preferencias no solicitadas por el abonado o usuario.
Statistics
Storage or technical access that is used exclusively for anonymous statistical purposes.El almacenamiento o acceso técnico que se utiliza exclusivamente con fines estadísticos anónimos. Sin un requerimiento, el cumplimiento voluntario por parte de tu Proveedor de servicios de Internet, o los registros adicionales de un tercero, la información almacenada o recuperada sólo para este propósito no se puede utilizar para identificarte.
Marketing
Storage or technical access is necessary to create user profiles to deliver advertising, or to track the user across one or multiple websites for similar marketing purposes.