Language Selection

English French German Italian Portuguese Spanish

June 2008

Linux Popularity Contest: Facebook Has Spoken

Filed under
Linux

jonathancarter.co.za: Ubuntu has been quite popular on DistroWatch for a long time now. Currently it is at the number 1 position for hits per day on the site over the last six months. There’s a nice little Facebook app that builds stats of which distributions and desktop environments people use.

Xandros Acquires Linspire Assets in Seceret Backroom Deal

Filed under
Linux

kevincarmony.blogspot: Today, as a Linspire shareholder, I received the below "memorandum" from Linspire. I have confirmed with several other Linspire shareholders that they too received this notice.

Ext4 is now the primary filesystem on my laptop

Filed under
Linux

thunk.org/tytso: Over the weekend, I converted my laptop to use the ext4 filesystem. So far so good! So far I’ve found one bug as a result of my using ext4 in production.

A Symphony For Viola: Parsix 1.5r0 Review

Filed under
Linux

reddevil62-techhead: REGULAR readers of this blog will know I'm a huge fan of Parsix, the Debian-based Linux distribution created by a small team in Iran. For the first time Parsix Viola officially supports Compiz-Fusion, VirtualBox-OSE and GNU Flash Player

Top 10 Linux financial tools

Filed under
Software

blogs.techrepublic.com: Many people don’t realize the wealth of applications available for Linux — and that includes financial software. Jack Wallen introduces 10 Linux apps that will meet your financial needs, whether you just want a digital replacement for your checkbook.

11 Popular Video Players for Linux

Filed under
Linux

vivapinkfloyd.blogspot: Review of 11 most popular video players for Linux, like VLC, SMPlayer, Kaffeine, Totem and several more.

USB ADSL Modem Manager: Annoying window

Filed under
Software

Big Buck Bunny builds a better Blender

Filed under
Software

linux.com: Big Buck Bunny is the colorful product of the Peach open movie project: an animated short released online and on DVD. But in addition to the 'toon itself, Peach has produced an altogether different yield: improvements to the Blender 3-D modeling application.

Audio/Visual Synthesis For Linux: The New Art, Part 1

Filed under
Software

linuxjournal.com: The Linux Journal recently published an article I wrote on Jean-Pierre Lemoine's AVSynthesis, a program designed for artists working with the computer as a medium for the synthesis of image and sound. I'm fascinated by that program, so I decided to research the existence of similar software. This article presents the current findings from that research.

some howtos:

Filed under
HowTos
  • Backing up Large Files

  • HowTo: Reset KDE to Previous Configuration State
  • Install SecondLife 1.19.1.4 on Ubuntu 8.04
  • Moving Thunderbird Emails
  • wlan0_rename issue
  • Using SSH as an Ad-Hoc VPN
  • (gtk applications with qt style)
  • Music server via Samba
  • Install a 3D transition effect plug-in for OpenOffice.org

More in Tux Machines

today's howtos

Security Leftovers

  • Security updates for Monday

    Security updates have been issued by Debian (pillow, ruby-kramdown, wpa, and xrdp), Fedora (ark and rpki-client), Gentoo (apache, ark, global, gthumb, and iproute2), openSUSE (chromium, grub2, java-11-openjdk, libX11, and opera), Red Hat (bind, chromium-browser, java-1.7.1-ibm, java-1.8.0-ibm, and libvncserver), SUSE (LibVNCServer, perl-XML-Twig, thunderbird, and xen), and Ubuntu (samba).

  • Have I Been Pwned to release code base to the open source community

    Members of the general public can submit their email addresses into the Have I Been Pwned search engine to find out if they have been "pwned," and if their emails have been linked to a data breach, each one and a summary of what happened is displayed -- as well as what information has been exposed. Since its launch in 2013, Hunt has poured more resources, including time and energy, into managing the search engine over time, expanding the service to include domain monitoring and breach alerts. At the heart, one main operator isn't enough to ensure future scalability or sustainability, and with this in mind, Hunt previously attempted to find a buyer to help expand his life's work. Unfortunately, the merger and/or acquisition process failed, and so Hunt has decided to pursue another alternative -- opening up the Have I Been Pwned code base to the open source community.

  • Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28

    Popular video conferencing app Zoom has addressed several security vulnerabilities, two of which affect its Linux client that could have allowed an attacker with access to a compromised system to read and exfiltrate Zoom user data—and even run stealthy malware as a sub-process of a trusted application. According to cybersecurity researcher Mazin Ahmed, who presented his findings at DEF CON 2020 yesterday, the company also left a misconfigured development instance exposed that wasn't updated since September 2019, indicating the server could be susceptible to flaws that were left unpatched.

Red Hat/Fedora Leftovers

  • Fedora Nest 2020

    This year Flock did not happen due to COVID-19, and in its place, Fedora Nest happened. After many events I’ve seen going virtual in the last few months, I was skeptical. I was yet to see an acceptable online platform to run events. I was wrong on the platform. Fedora Nest used Hopin , which is by far the best platform for events I’ve seen so far. Don’t get your expectations too high, though, because when I say the best one I’ve seen so far, only means that it is usable, and it does not mean in any way that is on par of real conferences. I might be a weird being, but I find traveling relaxing, so I usually add to the joy of the conference the pleasure of traveling. In addition to this, at conferences, I find myself to connect with people - sometimes briefly, sometimes more deeply - and this does not occur in online events. For those reasons, I really hope we will be able to soon go back to in-person conferences.

  • Miroslav Suchý: Nest 2020 - my notes

    This year, we had Nest conference instead of traditional Flock, which has been canceled due to COVID. The conference happened purely remotely over the Hopin video conference. This was good and bad. The good is that we saved a lot on traveling and that it happened at all. It would be bad if it was canceled. The bad part was that I found it hard to focus on the conference. There are too many distractions at home. It was much harder to socialize. And a lot of people had issues either with microphone or internet upload. It was sometimes hard to follow. The conference was organized mostly for US folks, and therefore some sessions were very late in my timezone.

  • Btrfs by default status updates, 2020-08-09
  • Fedora Btrfs Activity Continues - New Options To Control Discard, Compression

    Fedora developers continue embracing the work on making the Btrfs file-system the default for F33 desktop variants. Their latest progress report indicates new installation options being wired up for the Btrfs support. A new Anaconda Kickstart install configuration knob is being added for setting the async discard behavior for solid-state drives. This configuration option will simply set the Btrfs DISCARD option to be enabled by default per the /etc/fstab options. They are still weighing whether to make it the default or more than likely that default transition would be next year for Fedora 34.

  • “To be, or not to be,” vulnerable… How customers and partners can understand and track Red Hat security vulnerabilities

    That is the question. Yes, I believe William Shakespeare was thinking about container security when he began Act 3 of Hamlet. He probably scanned his Red Hat Universal Base Image (UBI) 8 container with multiple vulnerability scanners, and with "the heart-ache and the thousand natural shocks", noticed each report told him something different. One report said his container had a vulnerability, another indicated the vulnerability was patched, and another didn’t even show the vulnerability. As Hamlet contemplates his fate, it’s no wonder he says: "With this regard their currents turn awry, And lose the name of action." In other words, he rips up the reports and does nothing! In many ways our customers are experiencing the same vulnerability inconsistencies as Hamlet. But unlike our hero’s tragic fate, there is some good news: Red Hat is working with independent software vendors (ISVs) to help drive vulnerability consistency for both Red Hat and our partners.

  • Kubernetes and the hybrid cloud with Skupper

    DevNation Tech Talks are hosted by the Red Hat technologists who create our products. These sessions include real solutions plus code and sample projects to help you get started. In this talk, you’ll learn about Kubernetes and the hybrid cloud with Skupper from Ted Ross and Burr Sutter.

today's howtos