Language Selection

English French German Italian Portuguese Spanish

Linux Today

Syndicate content
Updated: 2 hours 19 min ago

A Beginner’s Guide To Playing Games On Linux, Part 1: Enjoying Your Steam Library

Friday 4th of October 2019 02:00:00 AM

Rule #1: You Can’t Play Everything Under The Sun

How to use tee and script commands to capture output and errors to file

Thursday 3rd of October 2019 10:00:00 PM

Need help troubleshooting your bash scripts? Give tee and script a go.

IBM and Canonical work together in financial services

Thursday 3rd of October 2019 09:00:00 PM

ZDnet: Just because IBM owns Red Hat doesn't mean it's not working with other Linux powers such as Ubuntu Linux.

Why GatsbyJS' corporate success is really about the individual developer experience

Thursday 3rd of October 2019 08:00:00 PM

GatsbyJS is booming thanks to its focus on the individual developer's first experience.

Samba 4.12 Bringing Much Faster Encryption Performance With GnuTLS

Thursday 3rd of October 2019 07:00:00 PM

Phoronix: Samba 4.12 for SMB3 file transfers with encryption will be an order of 4~6 times faster than current performance levels

Writing Comments in Bash Scripts

Thursday 3rd of October 2019 06:00:00 PM

In Bash, everything after the hash mark (#) and until the end of the line is considered to be a comment.

5 Best Security Tools to Have on Your Linux PC

Thursday 3rd of October 2019 05:00:00 PM

Everyone hails Linux for its built-in security.

How to Install Atom Editor on Ubuntu

Thursday 3rd of October 2019 04:00:00 PM

Atom is a free and open-source text editor that is modern, approachable, and hackable to the core.

How To Count The Number Of Files And Directories in a Directory on Linux

Thursday 3rd of October 2019 03:00:00 PM

 Learn how to count files and directories recursively on a Linux system.

How To Use tar Command Through Network Over SSH Session

Thursday 3rd of October 2019 02:00:00 PM

One can use the tar command over ssh sessions to transfer archives, files, backups and hard drive images securely

Red Hat Enterprise Linux 6 and CentOS 6 Receive Important Kernel Security Update

Thursday 3rd of October 2019 01:00:00 PM

Marked by the Red Hat Product Security as having a security impact of "Important," the new Linux kernel security patch addresses a buffer overflow flaw

Linux 'tree Command' Usage Examples for Beginners

Wednesday 2nd of October 2019 10:00:00 PM

The tree is a tiny, cross-platform command-line program used to recursively list or display the content of a directory in a tree-like format

How To Adjust Monitor Brightness From Command Line In Linux

Wednesday 2nd of October 2019 09:00:00 PM

 What can't you do from the command line?

Linux Kernel 5.4 to Have Kernel Lockdown and ExFAT Support

Wednesday 2nd of October 2019 08:00:00 PM

 itsFOSS: Linux Kernel 5.4 will be the last major stable kernel release of the year.

No Matter What You've Heard, the Docker Container Ship Is Not Sinking

Wednesday 2nd of October 2019 07:00:00 PM

 Rumors of Docker's demise might be a little premature.

Linux Mint Debian Edition 4 to Be Dubbed "Debbie," New Linux Mint Logo Unveiled

Wednesday 2nd of October 2019 06:00:00 PM

Clement Lefebvre has revealed today the codename of the upcoming LMDE (Linux Mint Debian Edition) 4 operating system series as "Debbie,"

Getting Started with Nano. via #EnableSysadmin by @spotzz_

Wednesday 2nd of October 2019 05:00:00 PM

Need a simple, lightweight text editor? Read on.

How To Check Laptop Battery Status In Terminal In Linux

Wednesday 2nd of October 2019 04:00:00 PM

Five different ways to check Laptop battery level and status from commandline in Linux.

How to Manipulate Filenames Having Spaces and Special Characters in Linux

Wednesday 2nd of October 2019 03:00:00 PM

 Some files are trickier to manage than others...

How to Write to Windows Partition In Linux

Wednesday 2nd of October 2019 02:00:00 PM

If you've mounted your Windows partition in Linux, you may find that you are not able to write to it.

More in Tux Machines

today's howtos

today's leftovers

  • openSUSE.Asia Summit 2019

    This year, openSUSE.Asia summit 2019 host in Indonesia again.

  • Why Taking Responsibility for Our Carbon Emissions Means Promoting the Right to Repair

    In our global system of production, consumption and premature disposal, using products for longer should be considered a pillar of global climate justice, and in an even broader sense, environmental justice.Saturday 19 October 2019 marks the third International Repair Day, and the theme this year is “Repair for Future”. | By Janet Gunter

  • The Most Important Right-to-Repair Hearing Yet Is on Monday

    The Massachusetts state legislature is holding a three-hour hearing on the Digital Right to Repair act, a bill that would require electronics manufacturers to sell repair parts and tools, make repair guides available, and would prevent them from using software to artificially prevent repair.

    So far this year, 19 other states have considered similar legislation. It hasn’t passed in any of them. But Massachusetts is one of the most likely states to pass the legislation, for a few different reasons. Most notably, the legislation is modeled on a law passed unanimously in Massachusetts in 2012 that won independent auto shops the right to repair, meaning lawmakers there are familiar with the legislation and the benefits that it has had for auto repair shops not just in Massachusetts but around the country.

  • [Older] GNS Technical Specification Milestone 1/4

    We are happy to announce the completion of the first milestone for the GNS Specification. The objective is to provide a detailed and comprehensive guide for implementors of the GNU Name System. The initial milestone consists of documenting the cryptographic principles of GNS data structures. This includes the specification of the GNS record wire and serialization formats as well as internationalization.

  • GNUnet project invited to ICANN66

    We are delighted to announce that ICANN has invited the GNUnet project to speak at the next ICANN Annual General Meeting. We have been invited to join a panel discussion on Emerging Internet Identifier Technologies in order to share our ideas and work on the GNU Name System (GNS). ICANN generously offered to cover travel and accomodation. The meeting will take place in Montreal between 2 - 7 November. The panel will tentatively be help on November 6th.

  • AWS Dangles Free Credits to Lure Open Source Developers

    Amazon Web Services is taking steps to improve its relations with open source software developers, offering them free service credits and sponsoring a popular programming language.

  • Opmantek Expands IT Audit Capabilities With Open-AudIT Cloud
  • Help! They’re about to obliterate us!

    Don’t let Yahoo fool you, with what they say, “Oh, just click here and download your content.” It’s not that simple. They have been breaking things to prevent us from leaving for years, and they are not making it easy now either. We live in a broken interface, and rescuing our content, especially quickly, is not at all easy.

  • USB-C Has Finally Come Into Its Own

    Even so, the road has been bumpy. Just because USB-C can do all these things doesn’t mean that it always does. Take charging. While the body that governs USB protocol, the USB Implementers Forum, sets a Power Delivery standard, manufacturers have come up with their own unique implementations as well. Qualcomm has Quick Charge, Samsung has Adaptive Fast Charging, and so on. The result, as nicely detailed by Android Authority earlier this year, is a landscape where you’re never quite sure what you’re going to get, especially once you reach for a third-party cable. Your phone will still charge, just not as fast as advertised if all of the involved components aren’t built for the same spec. And in extreme cases, some dodgy cables have been capable of frying devices altogether by drawing too much power for a specific task.

Security Leftovers

  • 6 top OSINT tools: Find sensitive public info before hackers do

    The same OSINT tactics used for spycraft can now be applied to cybersecurity. Most organizations have vast, public-facing infrastructures that span many networks, technologies, hosting services and namespaces. Information can be stored on employee desktops, in legacy on-prem servers, with employee-owned BYOD devices, in the cloud, embedded inside devices like webcams, or even hidden in the source code of active apps and programs.

  • 3 steps toward improving container security

    As developers increasingly make use of containers, securing them becomes more and more important. Gartner has named container security one of its top 10 concerns for this year in this report, which isn’t surprising given their popularity in producing lightweight and reusable code and lowering app dev costs. In this article, I’ll look at the three basic steps involved in container security: securing the build environment, securing the underlying container hosts, and securing the actual content that runs inside each container. To be successful at mastering container security means paying attention to all three of these elements. If you step back a moment, container security isn’t all that different from ordinary application security. If you replace the appropriate words in the above paragraph, you could have written this post 10, 20, or even 30 years ago with a few other modifications. But containers do have a few oddities and new twists that are worth highlighting. To get started, I suggest you listen to the recorded talk by Red Hat’s Dan Walsh about general container security considerations.

  • Good guy, Microsoft: Multi-factor auth outage gives cloudy Office, Azure users a surprise three-day weekend

    Microsoft is battling to fix its knackered multi-factor authentication system that today blocked customers from logging into their Microsoft 365 and Azure services. The Redmond giant confirmed on Friday an unspecified glitch prevented customers in North America from receiving the multi-factor auth (MFA) codes they need to sign into their cloud-based accounts. Obviously, those not using MFA are not affected. Though Azure and Microsoft 365 MFA users initially were locked out, by mid-day US Pacific Time, Azure was said to be working again, leaving 365 subscribers trying to log in high and dry. "We've taken multiple actions to mitigate impact and are working to validate service restoration," Microsoft told Microsoft 365 aka Office 365 customers. "In parallel, we're continuing to review system logs and service telemetry to better understand the underlying root cause."

  • Update Warning Issued For Millions Of Microsoft Windows 10 Users

    At this stage, it isn’t clear what is the cause with users citing BSOD failures with cldflt.sys, Affinity applications and more but all have found that uninstalling KB4517389 fixes the problem, which pins the source squarely on this already troubled update. Needless to say, the problem with a BSOD bug is you may not be lucky enough to get back to your desktop to do this. If you are, then navigate to Control Panel > Programs > Programs and Features > Installed updates > KB4517389 > Uninstall KB4517389 has already rolled out to millions of users but for hundreds of millions who have not received it yet, use Microsoft’s Show or Hide updates tool to block it from installing on your PC.

LibreOffice: Continuous Endnotes in Writer and AutoCorrect Dialog

  • Continuous endnotes in Writer

    What you can see is that endnotes unconditionally start after the end of the document content in Word, while endnotes are unconditionally on separate endnote pages in Writer. The new ContinuousEndnotes layout compatibility flag in Writer allows rendering endnotes the Word way. This new flag is enabled by default for DOC files, disabled otherwise. All this is available in LibreOffice master (towards 6.4), so you can try it out right now, if interested.

  • [LibreOffice] AutoCorrect Dialog

    In addition to an better placement the Word Completion Tab should be now easier to understood.