Arch Linux review: Is it worth installing?

In today's open source roundup: DistroWatch reviews Arch Linux. Plus: SuperTux 0.4.0 has been released. And how to hack Linux with the backspace key

1 2 Page 2
Page 2 of 2

SuperTux 0.4.0 released

SuperTux has long been a popular clone of Super Mario Brothers for Linux gamers. Version 0.4.0 of SuperTux has just been released. This update brings lots of improvements and fixes for the game, and should please many Linux gamers.

Marius Nestor reports for Softpedia:

Max Teufel had the great pleasure of announcing this past weekend the immediate availability for download of a new major update for his awesome SuperTux arcade/adventure game, a clone of Super Mario Bros. featuring Tux the penguin, for GNU/Linux, Mac OS X, and Windows operating systems.

SuperTux 0.4.0 is here after more than ten years in development, bringing a great number of improvements and bugfixes, such as a completely rewritten game engine that has been based on the OpenGL, OpenAL and SDL2 libraries, support for language translations, along with an in-game download manager for translations and add-ons.

Furthermore, SuperTux 0.4.0 includes a bonus Island III level, a final boss in the Icy Island level, a Forest Island level (currently incomplete), development levels for Incubator Island, better sound effects, a much-improved soundtrack, new bad guys, power-ups, and bonuses, as well as a Halloween tilemap.

More at Softpedia

How to hack Linux with the backspace key

Linux has a reputation for top-notch security, but even the best operating system has its share of unexpected bugs. The latest one involves using the backspace key to hack Linux computers.

Charlie Osborne reports for ZDNet:

If you press the backspace key 28 times on a locked-down Linux machine you want to access, a Grub2 bootloader flaw will allow you to break through password protection and wreck havoc in the system.

Researchers Hector Marco and Ismael Ripoll from the Cybersecurity Group at Universitat Politècnica de València recently discovered the vulnerability within GRUB, the bootloader used by most Linux distros.

The researchers discovered the flaw within GRUB2, of which versions 1.98 to 2.02 are affected. These versions were released between 2009 and today, which makes the vulnerability a long-standing and serious problem.

Exploiting the flaw -- and checking if you are vulnerable -- is simple. When the bootloader asks for a username, simply press the backspace button 28 times. If vulnerable, the machine will reboot or you will encounter a Grub rescue shell.

More at ZDNet

Did you miss a roundup? Check the Eye On Open home page to get caught up with the latest news about open source and Linux.

Related:

Copyright © 2015 IDG Communications, Inc.

1 2 Page 2
Page 2 of 2
How to choose a low-code development platform