Po 9 týdnech vývoje od vydání Linuxu 6.14 oznámil Linus Torvalds vydání Linuxu 6.15. Přehled novinek a vylepšení na LWN.net: první a druhá polovina začleňovacího okna a Linux Kernel Newbies.
plwm je nový, poměrně minimalistický správce oken pro X11. Podporuje dynamické dláždění okny, plochy, pravidla pro okna atd. Zvláštností je, že je napsaný v logickém programovacím jazyce Prolog. Používá implementaci SWI-Prolog.
Na čem aktuálně pracují vývojáři GNOME a KDE Plasma? Pravidelný přehled novinek v Týden v GNOME a Týden v KDE Plasma.
Sean Heelan se na svém blogu rozepsal o tom, jak pomocí OpenAI o3 nalezl vzdálenou zranitelnost nultého dne CVE-2025-37899 v Linuxu v implementaci SMB.
Jiří Eischmann v příspěvku na svém blogu představuje typy, jak lépe chránit své soukromí na mobilním telefonu: "Asi dnes neexistuje způsob, jak se sledování vyhnout úplně. Minimálně ne způsob, který by byl kompatibilní s tím, jak lidé technologie běžně používají. Soukromí ovšem není binární věc, ale škála. Absolutního soukromí je dnes na Internetu dost dobře nedosažitelné, ale jen posun na škále blíže k němu se počítá. Čím méně dat se o vás posbírá, tím nepřesnější budou vaše profily a tím méně budou zneužitelné proti vám."
Byla vydána nová stabilní verze 25.05 linuxové distribuce NixOS (Wikipedie). Její kódové označení je Warbler. Podrobný přehled novinek v poznámkách k vydání. O balíčky se v NixOS stará správce balíčků Nix.
Multiplatformní open source spouštěč her Heroic Games Launcher byl vydán v nové stabilní verzi 2.17.0 Franky (Mastodon, 𝕏). Přehled novinek na GitHubu. Instalovat lze také z Flathubu.
Organizace Apache Software Foundation (ASF) vydala verzi 26 integrovaného vývojového prostředí a vývojové platformy napsané v Javě NetBeans (Wikipedie). Přehled novinek na GitHubu. Instalovat lze také ze Snapcraftu a Flathubu.
Klávesnice IBM Enhanced Keyboard, známá také jako Model M, byla poprvé představena v roce 1985, tzn. před 40 lety, s počítači IBM 7531/7532 Industrial Computer a 3161/3163 ASCII Display Station. Výročí připomíná článek na zevrubném sběratelském webu Admiral Shark's Keyboards. Rozložení kláves IBM Enhanced Keyboard se stalo průmyslovým standardem.
Vyšlo Pharo 13 s vylepšenou podporou HiDPI či objektovým Transcriptem. Pharo je programovací jazyk a vývojové prostředí s řadou pokročilých vlastností.
Hello Mirek, >> Hi, i would like to send donation (about 100 - 1000 euro) on madwifi >> project to fully implement DFS and TPC futures, but i dont know what is >> missing, or what is not working corectly and i dont know specifications >> of DFS and TPC futures. Can you tell me what is missing, or what need to >> be done to fully support those futures? Well, a simple question, but a difficult answer. An 802.11h compliant client has to implement - Dynamic Frequency Control - TPC (Power Control) - Radar Detction The behaviour of a client differs from that of an AP. And the Network has to be managed on 5 GHz (not "AD-HOC" -> a card in this regulatory domain must not allow to be set to AD-HOC mode). DFC: When an AP is powered on, it has to choose a channel (randomly - for e.g. not starting every time with "1"). It should chect for radar. The time before he uses this channel (transmitting, broadcasting it's SSID) is specified. The AP has to scan ervery 24h for N seconds for a new channel (and no radar should be detected - it has to wait 1 min, if i remember correctly). Ideally it should find a channel which currently is not in use. Problem: The specification insisists in waiting if there's radar. Thus a Link which is up 24h/day, has a downtime by spec of 365 minutes a year(!). RD: if radar is detected, the AP should "shut down" the channel immediately. Thus it has to find a new channel. The channel where radar is detected, should be marked persistantely for no-use for n hours (i think it was 1 hour). Persistantly means, the mark should be honourd even after reboot / powercycle. Problem: DOS Attack. If every channel is marked, the Link is dead. A client searches for / follows the AP. Ideally the client does not probe actively (MAC layer protocol), this means, it is silent until it has seen "his" AP. Imagine you have a link, not with AP and client, but with two APs and WDS. And both APs have to do RadioRetection. Well, how they'll find each other? How they both signalize that they've detected radar? RD of a client: i do not remember exactly. I think it's a should, but not a must. If a client detects RD and the AP honours: -> possible DOS attack by a random client.. TPC: A client should to TPC. If not, the EIRP should be, if i remember correctly, 3dB lesser than regulatory maximum. But TPC should not be difficult to implement. 1W EIRP in Europe on 5GHz is interesting, because it's better than 100mW on 2.4GHz (even when considering FreeSpaceLoss). For our link we've built, we first thought to use two WRAP Boards running linux. But imhow, MadWifi does not match the requirements. Finaly, i decided to buy a licensed 802.11h AP, and use the WRAP board as client. With the half the max. EIRP (TPC for a client conforming to the spec); RD is tested (but i do not know if it response "in time", due to the spec, and there's a potential problem because it do not know if the client could tell the AP that he had to shut down the channel. Fortunately, it did not happen since the few weeks the link is already up). As far as i think, a madwifi card could not be used as 802.11h AP, because too much is missing. For all those things (TPC, DFC, RD and some more) there are detailed requirements in the spec. A fully compliant driver has to be conform to them. The regulations are a pain. Unfortunately, here in europe the 5GHz band is in military use. And they are pedantic with everything.. Furthermore, this band is in use for Plane->Airport radar (the main reason why RD is specified); thus it's understandable, why they insist on this mechanism. The spec we're talking about is http://webapp.etsi.org/action/OP/OP20050729/en_301893v010301o.pdf Our authority (BeNetzA (previously RegTP)) refers to this spec (which is nerby still a draft) for further details. I think the development should go in these steps: - implement all the 802.11h client specs - ideally: certify them with a decent card (for e.g. atheros wistron cm9, which is widely in use) - implement the 802.11h AP specs - certify this one too - think about WDS Btw, A great problem i personaly had, was that it's not easy to make messurements in this band. I configured the card to use n mW, and tried to interprete the result with a wlan sniffer. A card which may be certified for madwifi should be calibrated to the power settings as well. And now, is it what you liked to hear? ;) Regards, - Thomas
Tiskni
Sdílej: