Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Learning Resources»How Questing Quokka (25.10) Ushers a New Era of Rust-Based Tools

    How Questing Quokka (25.10) Ushers a New Era of Rust-Based Tools

    June 26, 2025
    How Questing Quokka (25.10) Ushers a New Era of Rust-Based Tools
    by George Whittaker

    Introduction: A New Chapter for Ubuntu

    Ubuntu 25.10, affectionately codenamed Questing Quokka, represents more than just the latest iteration of Canonical’s flagship Linux distribution. It marks a decisive step towards modernizing the foundation of Ubuntu by integrating Rust, a systems programming language renowned for its safety, performance, and modern design. This bold move signals Canonical’s commitment to security, reliability, and future-proofing its desktop and server operating systems.

    The release of Questing Quokka aligns with a growing trend across the Linux ecosystem: embracing Rust as a key technology for building low-level components. But what does this mean for Ubuntu users and developers? Let’s explore the significance of this change, what tools are being rewritten or introduced in Rust, and how this positions Ubuntu for the future.

    Why Rust? The Language of Safety and Speed

    The Need for Safer Code

    For decades, core components of Linux distributions—including Ubuntu—have been written predominantly in C. While C offers unmatched control and performance, it also exposes developers to a range of memory-related errors: buffer overflows, use-after-free bugs, and data races, to name a few. These flaws are among the leading causes of vulnerabilities that compromise system security.

    Rust was designed specifically to address these issues. It offers:

    • Memory safety without garbage collection: Rust’s ownership model and borrow checker ensure that memory errors are caught at compile time.

    • Fearless concurrency: Developers can write multithreaded code that’s safe by default.

    • Modern tooling and ecosystem: A robust package manager (Cargo), modern build tooling, and vibrant community support.

    Linux and Rust: A Growing Bond

    Ubuntu is not alone in recognizing Rust’s advantages. The Linux kernel itself has started to accept Rust code, with drivers and modules being prototyped in Rust to enhance safety. Projects like GNOME, System76’s COSMIC desktop, and various networking utilities have already begun leveraging Rust.

    By adopting Rust-based tools, Canonical is aligning Ubuntu with this broader movement—ushering in a future where critical system software is both fast and secure.

    Go to Full Article

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleVeeam Patches CVE-2025-23121: Critical RCE Bug Rated 9.9 CVSS in Backup & Replication
    Next Article tRPC vs GraphQL vs REST: Choosing the right API design for modern web applications

    Related Posts

    News & Updates

    A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

    July 22, 2025
    News & Updates

    “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-29906: Finit’s Bundled Getty Flaw Allows Authentication Bypass on Linux Systems

    Security

    CVE-2025-5833 – Pioneer DMH-WT7600NEX Root Filesystem Authentication Bypass

    Common Vulnerabilities and Exposures (CVEs)

    Firefox 141 Finally Brings WebGPU Support on Windows

    Operating Systems

    CVE-2025-32717 – Microsoft Office Word Heap-based Buffer Overflow Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Highlights

    CVE-2025-47866 – Trend Micro Apex Central Unrestricted File Upload Vulnerability

    June 17, 2025

    CVE ID : CVE-2025-47866

    Published : June 17, 2025, 6:15 p.m. | 2 hours, 15 minutes ago

    Description : An unrestricted file upload vulnerability in a Trend Micro Apex Central widget below version 8.0.6955 could allow an attacker to upload arbitrary files on affected installations.

    Severity: 4.3 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Biophysical Brain Models Get a 2000× Speed Boost: Researchers from NUS, UPenn, and UPF Introduce DELSSOME to Replace Numerical Integration with Deep Learning Without Sacrificing Accuracy

    April 16, 2025

    CVE-2025-3358 – CVE-2022-36337 Oracle WebLogic Server Cross-Site Scripting

    April 30, 2025

    I thought my favorite browser blocked trackers but this free privacy tool proved me wrong

    May 21, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.