Bienvenue sur Lilotux !
Webmail Galerie MiKael Xavier Stephane


Le Monde

Le milliardaire russe Sergueï Pougatchev recherché par Interpol
Accusé de détournement de fonds et d'escroquerie à grande échelle, le propriétaire de l'épicerie fine française Hédiard a été placé sur la liste rouge.
Au Pakistan, 4 vaccinateurs contre la polio abattus en une journée
Ces travailleurs sont généralement dans le viseur des talibans et des imams, qui estiment que leur vaccin contient du porc ou vise à anéantir la population musulmane.
Mascotte de l’Euro 2016 : le retour de Superdupont
La mascotte officielle prend le parti d'un compromis entre les invariants historiques et les tendances de l'époque.
Les causes du viol vues par la police de Hongrie
Un clip de prévention des forces de l'ordre, diffusé il y a quelques jours sur Internet, a provoqué un tollé auprès des femmes et des associations de défenses des droits civils.
En Corée du Nord, la sœur de Kim Jong-un prend du galon
Pour la première fois, les médias officiels ont évoqué les fonctions de Kim Yo-jong au sein de l'appareil d'Etat.
Les images de la mort de Tamir Rice, 12 ans, tué par la police de Cleveland
Un enregistrement d'une caméra de surveillance a été diffusé par la police, à la demande de la famille de la victime.
Le président égyptien Sissi à Paris
M. Sissi, qui arrive d'Italie, effectue sa première tournée en Europe depuis sa prise de pouvoir. Au cœur des discussions : la question libyenne.
Un classement des prix des locations parisiennes proposées sur Airbnb
Le journaliste et blogueur Yann Guégan propose sur son site un classement des arrondissements selon les prix des locations sur la plateforme de location de logements entre particuliers Airbnb à Paris.
Démission de la ministre de la santé espagnole, citée dans une affaire de corruption
Cette affaire de corruption, dite « affaire Gürtel » empoisonne le parti du premier ministre Mariano Rajoy depuis 2009.
Le dernier siècle de l’ours polaire
Selon une étude canadienne, la fonte des glaces pourrait faire disparaître l’espèce d’ici à 2100.

Linux Weekly News

Mapping the world with open source (Opensource.com)
Opensource.com talks with Paul Ramsey, senior strategist at the open source company Boundless. "Boundless is the “Red Hat of geospatial”, which says a bit about our business model, but doesn’t really explain our technology. GIS professionals and IT professionals (and, really, anyone with a custom mapping problem) use our tools to store their data, in a spatial SQL database (PostGIS), publish maps and data over the web (GeoServer), and view or edit data in web browsers (OpenLayers) or on the desktop (QGIS). Basically, our tools let developers build web applications that understand and can attractively visualize location. We help people take spatial data out of the GIS department and use it to improve workflows and make decisions anywhere in the organization. This is part of what we see as a move towards what we call Spatial IT, where spatial data is used to empower decision-making across an enterprise."
Security advisories for Wednesday
Debian has updated wireshark (multiple vulnerabilities).
Mageia has updated clamav (two vulnerabilities) and perl- Plack (information disclosure).
Mandriva has updated libvncserver (multiple vulnerabilities) and phpmyadmin (multiple vulnerabilities).
openSUSE has updated rubygem-sprockets-2_1 (directory traversal), rubygem-sprockets-2_2 (directory traversal), and wireshark (multiple vulnerabilities).
Red Hat has updated RHOSE (two vulnerabilities).
Ubuntu has updated squid3 (14.10, 14.04: denial of service).
Tuesday's security updates
CentOS has updated libXfont (C5: multiple vulnerabilities).
Fedora has updated kde-runtime (F20: code execution) and moodle (F20: multiple vulnerabilities).
Mageia has updated chromium-browser- stable (multiple vulnerabilities) and graphicsmagick (denial of service).
Mandriva has updated ffmpeg (multiple vulnerabilities), imagemagick (multiple vulnerabilities), and ruby (multiple vulnerabilities).
openSUSE has updated ImageMagick (13.2, 13.1, 12.3: denial of service) and zeromq (13.2: man-in-the- middle attack).
Oracle has updated libXfont (OL5: multiple vulnerabilities).
Red Hat has updated chromium-browser (RHEL6: multiple vulnerabilities) and libXfont (RHEL5: multiple vulnerabilities).
Scientific Linux has updated libXfont (SL5: multiple vulnerabilities).
SUSE has updated firefox (SLES10 SP4: multiple vulnerabilities).
Ubuntu has updated EC2 kernel (10.04: two vulnerabilities), kde-runtime (12.04: code execution), kernel (10.04; 12.04; 14.04; 14.10: multiple vulnerabilities), linux-lts-trusty (12.04: multiple vulnerabilities), and linux-ti-omap4 (12.04: multiple vulnerabilities).
[$] Some 3.18 development statistics
As of the 3.18-rc6 release, 11,186 non-merge changesets have been pulled into the mainline repository for the 3.18 development cycle. That makes this release about 1,000 changesets smaller than its immediate predecessors, but still not a slow development cycle by any means. Since this cycle is getting close to its end, it's a good time to look at where the code that came into the mainline during this cycle came from.
Four-year-old comment security bug affects 86 percent of WordPress sites (Ars Technica)
Ars Technica reports on a recently discovered bug in WordPress 3 sites that could be used to launch malicious script-based attacks on site visitors’ browsers.
"The vulnerability, discovered by Jouko Pynnonen of Klikki Oy, allows an attacker to craft a comment on a blog post that includes malicious JavaScript code. On sites that allow comments without authentication—the default setting for WordPress—this could allow anyone to post malicious scripts within comments that could target site visitors or administrators. A proof of concept attack developed by Klikki Oy was able to hijack a WordPress site administrator’s session and create a new WordPress administrative account with a known password, change the current administrative password, and launch malicious PHP code on the server. That means an attacker could essentially lock the existing site administrator out and hijack the WordPress installation for malicious purposes." WordPress 4.0 is not vulnerable to the attack.
Valid CSS! Valid HTML 4.01!