Chrome OS to Get Version 75

New Chrome OS 75 build is available for most current Chromebooks
27 June 2019   561

Google introduced the release of the Chrome OS 75 operating system, based on the Linux kernel, the upstart system manager, ebuild / portage assembly tools, open components and the Chrome 75 web browser. The Chrome OS user environment is limited to a web browser. apps, however, Chrome OS includes a full multi-window interface, desktop and taskbar. Chrome OS 75 build is available for most current Chromebooks. Enthusiasts have formed informal assemblies for ordinary computers with x86, x86_64, and ARM processors. The source code is distributed under the free Apache 2.0 license.

These are some of the features:

  • Feature to let parents grant more time to their kids on Chrome OS devices
  • Enabling kid friendly Assistant for child accounts
  • Linux (Beta) can now access Android devices over USB
  • Files app support for 3rd party file provider apps implementing Android DocumentsProvider APIs
  • Add support for PIN code with native printers for managed devices

Get more info at official blog.  

Suricata 5.0 to be Available

Suricata is a cybersecurity solution, an intrusion detection system and intrusion prevention system with opened source code
16 October 2019   115

OISF (Open Information Security Foundation) has published the release of Suricata 5.0, a network intrusion detection and prevention system that provides inspection tools for various types of traffic. In Suricata configurations, it is permissible to use the signature database developed by the Snort project, as well as the Emerging Threats and Emerging Threats Pro rule sets. The source code for the project is distributed under the GPLv2 license.

Some of the major changes:

  • New log parsing and logging modules for RDP, SNMP and SIP protocols written in Rust are introduced;
  • In addition to support for the JA3 TLS client authentication method that appeared in the previous release, support for the JA3S method is added, which allows to determine which software is used to establish the connection based on the connection negotiation features and parameters that are set (for example, it allows you to determine the use of Tor and other typical applications);
  • An experimental ability to compare with a selection from large data sets has been added, implemented using the new dataset and datarep operations. For example, the feature is applicable for searching masks in large blacklists with millions of entries;

Get more info at official website.