Windows 10 will soon ship with a full, open source, GPLed Linux kernel

Earlier today, we wrote that Microsoft was going to add some big new features to the Windows Subsystem for Linux, including native support for Docker containers. It turns out that that ain't the half of it.

The current Windows Subsystem for Linux uses a Microsoft-authored kernel component that provided the same kernel API as the Linux kernel but written from scratch by Microsoft. Essentially, it translated from Linux APIs to Windows NT kernel APIs. That worked pretty well, but the current subsystem had a few shortcomings: there was no ability to use Linux drivers, in particular file system drivers. Its file system performance, layered on top of Windows' own NTFS, was often 20 times slower than a real Linux kernel. It was also a relatively old version of the kernel; it offered approximately the set of APIs that Linux 4.4 did, and that was released in 2016. Some APIs aren't implemented at all, and others are only partially implemented to meet the needs of specific applications.

All is changing with Windows Subsystem for Linux 2. Instead of emulating the Linux kernel APIs on the NT kernel, WSL 2 is going to run a full Linux kernel in a lightweight virtual machine. This kernel will be trimmed down and tailored to this particular use case, with stripped-down hardware support (since it will defer to the host Windows OS for that) and faster booting.

The Linux kernel is GPLed open source; the GPL license requires that any modifications made to the code must be published and made available under the GPL license. Microsoft will duly comply with this, publishing the patches and modifications it makes to the kernel. WSL 2 will also use a similar split as the current WSL does: the kernel component will be shipped with Windows while "personalities" as provided by the various Linux distributions can be installed from the Microsoft Store.

By using the Linux kernel itself, Microsoft gets all of Linux's features for free. This is why WSL 2 will support Docker containers: all the underlying infrastructure, such as cgroups, is already in the Linux kernel, and Microsoft won't need to implement the features itself. The embedded kernel will be serviced and updated by Windows Update.

This also provides a big bump to performance. File system-heavy operations such as extracting a tarball can be up to 20 times faster; other activities (such as cloning source code repositories in Git) will be perhaps five times faster.

WSL has already been warmly embraced by developers, as it gives a solid Linux-like development environment. WSL 2 will take that to a new level and all but eliminate the compatibility issues that WSL 1 has.

The first preview of WSL 2 is due to ship in June.

Read Original Article...

Brace yourself, FlySafair is selling tickets for R5 on Tuesday

Every year FlySafair holds a sale where flights on the airline are discounted to ridiculous rates.
This year the same holds true as the airline intends to host a sale where tickets will cost just R5. FlySafair has 45 000 seats to sell for R5 and the sale goes live at 9:00 on Tuesday 7th May.
Now, we can’t talk about a FlySafair sale without talking about the absolute disaster that is the airline’s website during the sale.
Time outs, outright crashes and an inability to even access the website are all common occurrences but this year the airline says things will run a bit smoother.
“Learning from the first year’s website issues, FlySafair implemented what it calls a “Waiting Room” in year two. This is effectively a holding area that allows a random selection of users onto the site every five minutes in order to avoid the website from being overwhelmed,” the airline said.
The waiting room is still in effect this year but things will be a bit different. Buyers will be randomly selected from the waiting room and be granted access to the website.
Once on the website, buyers will have to complete their purchase immediately or the session will expire.
Buyers have been asked to remain in the waiting room as if they aren’t selected the first time around they can be still be randomly selected.
As a way to keep folks busy while they wait, FlySafair will host three competitions in the waiting room.
Free2Fly competition – win a card that lets you fly on any FlySafair flight for free, for 12 months
Jive for R5  – win one of five tickets by uploading a video of you “jiving” for tickets
R5 Madness – win an online shopping voucher for uploading a photo of you in the waiting room.
The airline advises buyers log into the waiting room with multiple devices and be attentive so as not to miss their chance to purchase ticket when the time comes.Will FlySafair get it right this time around? We’ll have to see tomorrow.


Environmental licence for SKA phase one gets green light

The Integrated Environmental Management Plan (IEMP), which gives licence to construct phase one of the Square Kilometre Array (SKA), has been adopted.

This is according to the Department of Science and Technology (DST), which confirmed environmental affairs minister Nomvula Mokonyane gazetted the IEMP.

In terms of SKA development, the environmental affairs department, together with the DST and the South African Radio Astronomy Observatory, consulted communities from towns surrounding the project site in the Northern Cape, and the IEMP is part of that procedure.

The IEMP covers the environmental principles to be followed in the construction and operation of SKA phase one, the environmental monitoring and control activities to be undertaken, as well as the long-term research monitoring programmes to be implemented at the SKA site.

This is the first time an environmental instrument of this kind has been adopted at national level in SA, reveals the DST.

"The department is very pleased with the conclusion of this process that has granted the environmental licence for the construction of SKA phase one to proceed in the Northern Cape," says the DST's acting chief director for astronomy, Takalani Nemaungani.

See also

SA locks in deal to establish SKA Observatory

SKA team completes key infrastructure designs

"I would like to thank these communities and the municipalities, as well as the stakeholders in various sectors affected by the project, for actively participating in the meetings and workshop held by the Council for Scientific and Industrial Research (CSIR), who served as the facilitators," he adds.

The SKA project is an international effort to build the world's largest radio telescope, led by the SKA Organisation. It will be built in two main phases in SA and Australia, with a later expansion in both countries and into other African countries.

The CSIR was appointed to undertake the environmental assessment for SKA phase one. The study, which took three years to complete, covered an area of approximately 628 200 hectares in the Karoo.

The study, states the department, assessed the impacts the construction and operation of phase one of the SKA project might have on local agriculture, heritage, archaeology, visual landscape, terrestrial ecology and biodiversity, as well as local socio-economic aspects.

Further aspects of sensitivity in terms of aviation, defence, telecommunications, weather services, mining, water use, waste management, noise and traffic effects were also investigated.

Dr Rob Adam, MD of the South African Radio Astronomy Observatory, says: "The development of the IEMP for the first phase of the SKA, and the gazetting of its adoption by minister Mokonyane, is yet another milestone towards the realisation of the SKA mid-frequency array in South Africa."

Read Original Article... 

Here's the List of ~600 MAC Addresses Targeted in Recent ASUS Hack

EXCLUSIVE — While revealing details of a massive supply chain cyber attack against ASUS customers, Russian security firm Kaspersky last week didn't release the full list all MAC addresses that hackers hardcoded into their malware to surgically target a specific pool of users.

Instead, Kaspersky released a dedicated offline tool and launched an online web page where ASUS PC users can search for their MAC addresses to check whether they were in the hit list.

However, many believe it is not a convenient way for large enterprises with hundreds of thousands of systems to know if they were targeted or not.

List of MAC Addresses Targeted in ASUS Supply Chain Attack

To solve this and help other cybersecurity experts continue their hunt for related hacking campaigns, Australian security firm Skylight's CTO Shahar Zini contacted The Hacker News and provided the full list of nearly 583 MAC addresses targeted in the ASUS breach.

"If information regarding targets exists, it should be made publicly available to the security community so we can better protect ourselves," Skylight said in a post shared with The Hacker News.

"So, we thought it would be a good idea to extract the list and make it public so that every security practitioner would be able to bulk compare them to known machines in their domain."

Skylight researchers retrieved the list of targeted MAC addresses with the help of the offline tool Kaspersky released, which contains the full list of 619 MAC addresses within the executable, but protected using a salted hash algorithm.

They used a powerful Amazon server and a modified version of HashCat password cracking tool to brute force 583 MAC addresses in less than an hour.

"Enter Amazon's AWS p3.16xlarge instance. These beasts carry eight (you read correctly) of NVIDIA's V100 Tesla 16GB GPUs. The entire set of 1300 prefixes was brute-forced in less than an hour."

ASUS Hack: Operation ShadowHammer

It was revealed last week that a group of state-sponsored hackers managed to hijack ASUS Live automatic software update server last year and pushed malicious updates to over one million Windows computers worldwide in order to infect them with backdoors.

The security company then informed ASUS about the ongoing supply chain attack campaign on Jan 31, 2019.

After analyzing more than 200 samples of the malicious updates, researchers learned that the hackers, who are not yet attributed to any APT group, only wanted to target a specific list of users identified by their unique MAC addresses, which were hardcoded into the malware.

Though the second stage malware was only pushed to nearly 600 targeted users, it doesn't mean that millions of ASUS computers which received the malicious software update are not compromised.

How to Check if Your ASUS Laptop Has Been Hacked?

After admitting that an unknown group of hackers hacked its servers between June and November 2018, ASUS this week released a new clean version of its LIVE Update application (version 3.6.8) and also promised to add "multiple security verification mechanisms" to reduce the chances of further attacks.

However, you should know that just installing the clean version of the software update over the malicious package would not remove the malware code from the infected systems.

So, to help its customers know if they were a victim of the attack, ASUS also released a diagnostic toolusing which you can check whether your ASUS system was affected by the malicious update.

If you find your computer MAC address in the list, it means your computer has been backdoored by the malicious update, and ASUS recommends you perform a factory reset to wipe up the entire system.

The identity of hackers and their intentions are still unknown.

Read Original Article...

Family locator app leaked real-time location data of 238,000 individuals

We normally consider family locator app as a blessing because we are able to track our family members conveniently through them. But, what if your private data collected or shared on such an app gets misused by cybercriminals because the app fails to secure it properly? It would instantly become a

The same has happened in the case of Australian software house React Apps’ Family Locator app. According to security researcher Sanyam Jain’s latest findings, this app has so far leaked sensitive data including real-time location information of about 238,000 individuals.See: Hackers leave ransom note after wiping out MongoDB in 13 seconds

The data exposure has been occurring for several weeks because of the fact that the database wasn’t properly configured to keep the data protected from landing into wrong hands.

The location data exposure is a real issue of concern here because the app has leaked people’s positions from the distance of a few feet and even displayed the names of geofenced areas that are particularly used to alert or notify family members.

Reportedly, the app’s developer didn’t secure the server with a password due to which the data leak occurred. For your information the app allows registered members to track their family members like spouse or children in real-time. With the app’s FollowMe feature, members are able to receive alerts about the current status of their family members such as whether the child has reached school or the spouse has reached the workplace, etc.

The main culprit behind such a massive data leakage is a poorly protected MongoDB database that was hosted on a Cloud server. The database was storing location data in an unencrypted format, so anyone who finds the database through services like Shodan can check the members’ real-time location as well as their profile photos, email IDs, full name, and login credentials including passwords.

This definitely puts members’ families at great risk since the geofenced locations data is also included in the leaked information.

Jain, who is associated with the GDI Foundation, notified TechCrunch about the unsecure database. TechCrunch has verified the information available on the database after downloading the app and registering with a fake email ID. As soon as the signing up process ended, their real-time location appeared on the database with exact location coordinates.

The company contacted one of the registered members chosen randomly and the user was naturally shocked by the findings. The unnamed user also confirmed that the location information about his workplace and his child’s school was completely accurate.

See: Google collects Android location data even if location service is off

TechCrunch’s Zack Whittaker tried to contact React Apps but the company didn’t respond. TechCrunch then contacted the Australian Securities & Investments Commission to get the company’s business records that provided information about React App’s owner Sandip Mann Singh. However, the owner’s contact number wasn’t listed.

Then TechCrunch informed Microsoft, the company responsible for hosting the MongoDB database on its Azure Cloud server. Microsoft tried to contact the developer after which the database was taken offline. It is currently unclear the duration for which the database remained exposed.

Read Original Article...
Apple Repairs and Service
Member of the Internet Defense League
Internet Cafe available

BitcoinCash Accepted