LWN.net's Journal
[Most Recent Entries]
[Calendar View]
Tuesday, August 4th, 2015
Time |
Event |
1:53p |
Announcing the shutdown of the Ada Initiative The Ada Initiative has announced that it is shutting down in mid-October. In the four years since it was founded, the organization has accomplished a lot to help create a less hostile environment for women in open technology and open culture. " We are proud of what we accomplished with the support of many thousands of volunteers, sponsors, and donors, and we expect all of our programs to continue on in some form without the Ada Initiative." Essentially, the organization found it hard to find others with the same " experiences, skills, strengths and passions" as co-founders Valerie Aurora and Mary Gardiner when they wanted to change roles within the initiative. " The Ada Initiative will shut down in approximately mid-October after using our remaining funds to complete our current obligations and do the tasks necessary to shut down the organization properly. We have several Ally Skills Workshops booked or in the process of being booked during our remaining months of operation. (We will not be booking additional Ally Skills Workshops through the Ada Initiative, but we will refer clients to other people who are teaching the Ally Skills Workshop.) We will teach Impostor Syndrome training classes in Sydney and Oakland in August, and release the materials under the Creative Commons Attribution Sharealike license. We will do the work to keep the Ada Initiative's web content online and available after the Ada Initiative shuts down." | 5:00p |
Tuesday's security advisories Debian has updated squid3
(security bypass) and wordpress (multiple vulnerabilities).
Fedora has updated quassel (F21: denial of service).
Mageia has updated ipython
(MG4,5: two vulnerabilities), moodle (MG5:
vulnerabilities), pdns (MG4,5: denial of
service), and php (MG5: multiple vulnerabilities).
openSUSE has updated gpsm (13.1:
code execution from 2013).
Scientific Linux has updated autofs (SL6: privilege escalation), curl (SL6: multiple vulnerabilities), freeradius (SL6: denial of service), gnutls (SL6: multiple vulnerabilities), grep (SL6: two vulnerabilities), hivex (SL6: privilege escalation), httpd (SL6: access restriction bypass), ipa (SL6: cross-site scripting), java-1.6.0-openjdk (SL6: multiple
vulnerabilities), kernel (SL6: multiple
vulnerabilities), libreoffice (SL6: code
execution), libxml2 (SL6: denial of
service), mailman (SL6: two
vulnerabilities), net-snmp (SL6: denial of
service), ntp (SL6: multiple
vulnerabilities), pacemaker (SL6: privilege
escalation), pki-core (SL6: cross-site
scripting), python (SL6: multiple
vulnerabilities), sudo (SL6: information
disclosure), wireshark (SL6: multiple
vulnerabilities), and wpa_supplicant (SL6: denial of service). | 7:50p |
Coalition Announces New ‘Do Not Track’ Standard for Web Browsing The Electronic Frontier Foundation (EFF), privacy company Disconnect and a coalition of Internet companies have announced a stronger “Do Not Track” (DNT) setting for Web browsing—" a new policy standard that, coupled with privacy software, will better protect users from sites that try to secretly follow and record their Internet activity, and incentivize advertisers and data collection companies to respect a user’s choice not to be tracked online." |
|