Language Selection

English French German Italian Portuguese Spanish

LXer

Syndicate content
Linux and Open Source news headlines
Updated: 55 min 22 sec ago

Games For Linux That Everyone Must Try Once

Sunday 5th of March 2017 01:09:33 AM
We all love games. Games are the thing that make us child again and everyone must agree that they always play games whenever they get a chance to play. That is why today we are going to recommend you best 5 games for this month, that you must play at least once if you are on Linux.

Tune Up Your Code with the Crankshaft Compiler

Saturday 4th of March 2017 11:15:11 PM
Safia Abdalla is an open source developer and a maintainer on a project called nteract, but her pet topic is compilers. And, in her talk at Node.js Interactive, Abdalla explained the inner workings of the V8 compiler and how it can optimize the code it gets fed.

IKEA's DIY grow room, US DoD launches Code.mil, and more open source news

Saturday 4th of March 2017 09:20:49 PM
In this edition of our open source news roundup, we take a look at IKEA's spherical garden, the US Department of Defense's Code.mil site, and more.Open source news roundup for February 19-March 4, 2017read more

Secure Android phone offers confidential and casual modes

Saturday 4th of March 2017 07:26:27 PM
Bittium has upgraded its secure, Android-based Bittium Tough Mobile phone with containerized secure and public modes and location-based analytics.

Storytelling in the 21st Century

Saturday 4th of March 2017 05:32:05 PM
Some words for thought from this week's video on nteract: "Open science isn't truly open and open source isn't truly open."

Linux Find Command Everything You Need To Know

Saturday 4th of March 2017 03:37:43 PM
We all need time to find a file that was taken on a specific date, time or name. Ever wondered how are you going to find it? Yeah! I assume you might say about the search function in nautilus, pacman or any other file manager you use, but what if you are not allowed to use it! Your file manager just freezes while searching lots of files. Well, let’s come to point. Today I am going to talk about the famous Linux Find Command. What is it? Keep reading.

Using open source APM software: InspectIT

Saturday 4th of March 2017 01:43:35 PM
In modern days, software systems are continuously becoming more complex. At the same time customer[he]#039[/he]s expectations regarding, for example, response times and availability are higher than ever before. As you know, services that perform poorly could drive customers to your competitors[he]#039[/he] offerings.

Secure Bittium Android Phone Has Split Personality

Saturday 4th of March 2017 11:49:13 AM
As everyone who watches TV and movie thrillers knows, the best way to ensure smartphone security is to tear your phone apart after making an important call and then break it into pieces and toss them into various trashcans and sewer grates. This can get expensive, however, especially if you want a nice model with 4K video and high-end cameras.

Top 10 Social Media Plugins for WordPress

Saturday 4th of March 2017 09:54:51 AM
In order to drive more social media traffic to your WordPress blog, you will love these WordPress social media plugins. These plugins will let you add a beautiful set of social share buttons on your posts which will encourage your visitors to share your content on their social networks. This will help your website get better exposure and it will increase the user engagement.

Top 5: New Raspberry Pi Zero, MySQL 8 preview, and more

Saturday 4th of March 2017 08:00:29 AM
In this week's Top 5, we highlight new Raspberry Pi hardware, programming languages for beginners, MySQL 8, and machine learning.Top 5 articles of the week5. Pi Zero Wireless out now for $10Columnist Ben Nuttall introduces a new member of the Raspberry Pi family. The Pi Zero Wireless is the same Pi Zero you've come to love, with WiFi and Bluetooth.read more

Kaby Lake-S COM offers PCIe options

Saturday 4th of March 2017 06:06:07 AM
Portwell announced a COM Express Basic Type 6 with Intel’s 7th Gen S-series CPUs, 4x SATA 3, triple displays, and 8x PCIe x1 and PCIe x16 expansion. Portwel’s 125 x 95mm “PCOM-B642VG” COM Express Basic Type 6 entry taps Intel’s higher-end quad- and dual-core S-series desktop-class models. No model details were offered, so presumably the […]

IBM is a Massive Patent Bully That Amasses Software Patents, So Invalidation or 'Sharing' of One Single Patent Misses the Point Entirely

Saturday 4th of March 2017 04:11:45 AM
IBM's patent gold rush and worldwide lobbying for software patents yield lawsuits but also draw complaints -- to the point where IBM resorts to face-saving moves and the Patent Office looks foolish for accepting bogus patent applications

Google's Chromebook Pixel lives on, but you can't buy one

Saturday 4th of March 2017 02:39:08 AM
It turns out Google is still making its own high-end Chromebook laptops. It[he]#039[/he]s just not going to sell them to customers.

Try the Raspberry PIXEL Platform on Your Desktop

Saturday 4th of March 2017 12:44:46 AM
Anyone familiar with Linux likely has some knowledge of the Raspberry Pi. That may not necessarily equate to having experienced one of the greatest embedded platforms on the planet.

PlayStation 1 and 2 on Linux

Friday 3rd of March 2017 11:24:42 PM
There are basically three main gaming consoles on the market. These are the Playstation, Xbox and the Wii. Each of these have different varieties or versions. The PlayStation has a version 1, 2, 3, and 4. In a previous article about RecalboxOS I covered an Operating System (OS) which included a Playstation 1 emulator (the OS is for the Raspberry Pi). In this article I want to cover the emulators for the Playstation 1 and 2 for a standard Linux system.

Failing to secure DNS is 'savage ignorance': Geoff Huston

Friday 3rd of March 2017 10:04:39 PM
Not only has the DNS become the standard but lazy way to serve out domain-related information for other purposes and protocols, DNSSEC is now relatively easy to implement.

Program LEGO Mindstorms robots over WiFi with BrickPi

Friday 3rd of March 2017 08:44:36 PM
For the past year, I've been teaching students how to build and program robots using the LEGO Mindstorms EV3 platform. From the outset, I wanted to find a way to use Scratch and other open source programming languages to extend the capabilities of the platform. That search led me to BrickPi, a Raspberry Pi add-on board from Dexter Industries that easily interfaces with Mindstorms sensors and motors.read more

16 Linux server monitoring commands you really need to know

Friday 3rd of March 2017 07:24:33 PM
If you want to know what's going on with your Linux server, start with these Linux monitoring commands.

PCLinuxOS 2017.03 KDE Edition Lands with KDE Plasma 5.8.6 LTS, Linux Kernel 4.9

Friday 3rd of March 2017 06:16:44 PM
The developers of the PCLinuxOS distribution announced the release of PCLinuxOS 2017.03 KDE Edition, an updated install medium that ships with all the latest KDE technologies and applications.

Master efficient typing with Ibus typing booster

Friday 3rd of March 2017 04:56:41 PM
The Ibus typing booster is a predictive text input method. The project goal is to empower existing keyboard layouts with predictions to allow users to boost their typing speed without compromising on data accuracy. This project started in 2010 with... Continue Reading →

More in Tux Machines

Security Leftovers

  • Security updates for Thursday
  • Security Tips for Installing Linux on Your SysAdmin Workstation
    Once you’ve chosen a Linux distro that meets all the security guidelines set out in our last article, you’ll need to install the distro on your workstation.
  • Fedora 26 crypto policy Test Day today (2017-03-30)!
  • Open-source developers targeted in sophisticated malware attack
    For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs. The emails had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.
  • A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense
    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems (CSCO.O) swung into action. The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping. Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity.
  • NTPsec: a Secure, Hardened NTP Implementation
    Network time synchronization—aligning your computer's clock to the same Universal Coordinated Time (UTC) that everyone else is using—is both necessary and a hard problem. Many internet protocols rely on being able to exchange UTC timestamps accurate to small tolerances, but the clock crystal in your computer drifts (its frequency varies by temperature), so it needs occasional adjustments. That's where life gets complicated. Sure, you can get another computer to tell you what time it thinks it is, but if you don't know how long that packet took to get to you, the report isn't very useful. On top of that, its clock might be broken—or lying. To get anywhere, you need to exchange packets with several computers that allow you to compare your notion of UTC with theirs, estimate network delays, apply statistical cluster analysis to the resulting inputs to get a plausible approximation of real UTC, and then adjust your local clock to it. Generally speaking, you can get sustained accuracy to on the close order of 10 milliseconds this way, although asymmetrical routing delays can make it much worse if you're in a bad neighborhood of the internet.
  • Zelda Coatings
    I assume that every permutation of scams will eventually be tried; it is interesting that the initial ones preyed on people's avarice and dishonesty: "I will transfer millions to your bank account, then you share with me" - with subsequent scams appealing to another demographic: "I want to donate a large sum to your religious charity" - to perhaps capture a more virtuous but still credulous lot. Where will it end ?

Tizen and Android

Linux and Linux Foundation

Mesa and Intel Graphics