The First AI Computing Device Launched: Native Linux Environment, Local Training of 32 Billion Parameter Models! Build Intelligent Agents in Seven Steps, Supporting Cross-Application Scheduling!

The First AI Computing Device Launched: Native Linux Environment, Local Training of 32 Billion Parameter Models! Build Intelligent Agents in Seven Steps, Supporting Cross-Application Scheduling!

Author | Hua Wei After the release of DeepSeek, a global wave of open-source large models has emerged. Meta has just released Llama4, and tech giants like Google and Microsoft are continuously innovating in the AI field. Even OpenAI recently announced that GPT-5 will be available for free. Meanwhile, various AI application tools are emerging, … Read more

Comic Analysis: What Does the Linux Kernel Look Like?

Comic Analysis: What Does the Linux Kernel Look Like?

(Click the blue text above to quickly follow us) Source: Linux China / bestony https://linux.cn/article-8290-1.html If you have good articles to submit, please click → here for details Today, I will interpret a comic from TurnOff.us titled “InSide The Linux Kernel“. TurnOff.us is a geek comic website where the author Daniel Stori has drawn some … Read more

Step-by-Step Guide to Installing OpenSSH 10.0 on Kali GNU/Linux Roll

Step-by-Step Guide to Installing OpenSSH 10.0 on Kali GNU/Linux Roll

As of now (April 2025), OpenSSH 10.0 has been officially released. This update removes the outdated DSA signatures, enables key exchange algorithms with quantum protection by default, and improves the behavior of scp/sftp and the security of sshd. The configuration file now supports more flexible conditional matching, providing a smoother experience. In summary: more secure, … Read more

Understanding the Linux Time Command: A Must-Have Skill for Performance Tuning!

Understanding the Linux Time Command: A Must-Have Skill for Performance Tuning!

【Summary】 Sometimes you may want to analyze your program based on the following parameters: the time spent by the program in user mode, the time spent by the program in kernel mode, the average memory usage of the program, etc. On Linux, we have a utility specifically designed for this purpose called “time”. The “time” … Read more

Preventing Sleep Mode When Closing a Linux Laptop

Preventing Sleep Mode When Closing a Linux Laptop

Recently, I assembled a NAS system using an old laptop and needed to configure it so that the laptop does not enter sleep mode when the lid is closed. Here are the steps I followed: Edit the logind.conf file with the following command: vi /etc/systemd/logind.conf You will see the following content: #HandlePowerKey: Action when the … Read more

Practical Commands for Linux System Administration

Practical Commands for Linux System Administration

Practical Commands for Linux System Administration In today’s digital age, Linux, as a powerful open-source operating system, has become the preferred platform for server environments and technical professionals due to its high flexibility, security, and stability. This article provides readers with some practical commands for Linux system administration, covering network configuration, system monitoring, file operations, … Read more

Linux Kernel Bug: USB Tethering Issue on Android Phones

Linux Kernel Bug: USB Tethering Issue on Android Phones

As we all know, I usually use the ArchLinux operating system, which is a rolling release version, meaning that various software packages are updated quickly. However, I suddenly discovered that the USB tethering feature on Android phones has a bug. After some troubleshooting, I found that it was a bug caused by the Linux kernel. … Read more

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

A critical vulnerability exists in the USB audio driver of the Linux kernel that may lead to out-of-bounds memory reads. This vulnerability has been patched by Takashi Iwai from SUSE. If an attacker gains physical access to the system, they can exploit malicious USB devices to escalate privileges, tamper with system memory, or execute arbitrary … Read more

New American Luxury: A Review of the Lincoln Zephyr

New American Luxury: A Review of the Lincoln Zephyr

Author —— User: -llwcc To be honest, I do not like the ambiguous name “Lincoln Z”. For car enthusiasts like us, who are more emotional and literary, heritage and depth are seemingly ethereal yet extremely important. Clearly, the name “Zephyr” carries more meaning, which is why I prefer not to use the official generic name. … Read more