Facebook’s open source library has grown to 9.9M lines of code

image

Facebook loves to share how much it likes open source, and the social network has followed through on that note with a status update on its activities this year.

Here’s a rundown, by the numbers:

• Launched 63 new projects since January 2014
Total active Github portfolio stands at exactly 

• 200 for projects spread across Facebook, Instagram and Parse

• Facebook’s open source projects have seen 13,000 total commits, an increase of 45 percent from the second half of 2013.

• Projects collectively have netted 20,000 forks and 95,000 followers.

• Facebook’s total open source library stands at approximately 9.9 million lines of code.

The Menlo Park, Calif.-based company highlighted a number of its more popular projects in a blog post on Friday, putting user interface Javascript library React and iOS/OS X animation engine Pop in the spotlight.

The latter has played a large role in a pair of other Facebook projects with which end users might be more familiar.

That would be the first two projects rolled out from Facebook’s Creative Labs department: digital news reader app Paper and Snapchat-competitor Slingshot.

Facebook engineers revealed Pop “spawned a host of extensions and integrations, including the iOS version of our very own Slingshot.” Pop has also grown to become Facebook’s second most popular open source project ever.

Looking forward, Facebook is following through on some of the products it unveiled to developers at F8 in San Francisco back in April. One product making its way out the door today in beta access is Display Node, Facebook’s open source asynchronous UI framework.

Source: ZD Net

10,000 Linux servers hit by malware serving tsunami of spam and exploits

image

Two-year-old Windigo may also have infected kernel.org Linux developers.

Researchers have documented an ongoing criminal operation infecting more than 10,000 Unix and Linux servers with malware that sends spam and redirects end users to malicious Web pages.

Windigo, as the attack campaign has been dubbed, has been active since 2011 and has compromised systems belonging to the Linux Foundation’s kernel.org and the developers of the cPanel Web hosting control panel, according to a detailed report published Tuesday by researchers from antivirus provider Eset. During its 36-month run, Windigo has compromised more than 25,000 servers with robust malware that sends more than 35 million spam messages a day and exposes Windows-based Web visitors to drive-by malware attacks. It also feeds people running any type of computer banner ads for porn services.

The Eset researchers, who have been instrumental in uncovering similar campaigns compromising large numbers of servers running the nginx, Lighttpd, and Apache Web servers, said the latest campaign has the potential to inflict significant harm on the Internet at large. They explained:

The number of systems affected by Operation Windigo might seem small when compared with recent malware outbreaks where millions of desktops are infected. It is important to keep in mind that, in this case, each infected system is a server. These usually offer services to numerous users and are equipped with far more resources in terms of bandwidth, storage and computation power than normal personal computers. A denial of service attack or a spam-sending operation using one thousand servers is going to be far more effective than the same operation performed with the same number of desktop computers.

For more information and the complete sorry click the source link below.

Source: Ars Technica