Language Selection

English French German Italian Portuguese Spanish

June 2009

Reinstalling Ubuntu vs Vista

Filed under
Microsoft
Ubuntu

profarius.com: I run Ubuntu. I recently upgraded to 9.10 and then decided to drop back to stable. This involves reinstalling. My sister complained about her system being incredibly slow. I decided to reinstall both at the same time to compare the time it takes to do them at the same time.

Control your bandwidth with Trickle

Filed under
Software
HowTos

tuxradar.com: With Trickle you can control the upload and download speeds for applications such that no single application hogs all the bandwidth. This gives you the power to ensure that downloads from Firefox don't interfere with your attempts to download a file through FTP.

Deluge: For All Your Torrent Needs

Filed under
Software

softpedia.com: Using torrents has become quite an everyday routine for most of us. Residing in the "Internet" category, Deluge is quick to launch and provides a perfectly integrated GTK+ interface.

100 Compiler Options and You are Out

Filed under
Software

daveshields.wordpress: California, along with Major League Baseball, is among the institutions that have a policy of “Three Strikes and You are Out.” I suggest the same rule should apply to compiler writers.

On Debian and Mono

Filed under
Software
  • On Debian and Mono

  • Ubuntu’s Position on Mono Revealed
  • As It Stands, Ubuntu Has No Issues With Mono
  • Will Stallman C# warning fall flat?

Firefox add-ons: Which work in 3.5?

Filed under
Moz/FF
  • Firefox add-ons: Which work in 3.5?

  • Firefox 3.5 released, more than 1.1M downloads already
  • Firefox 3.5: Big Gains May Be in the Future
  • What's new in Firefox 3.5
  • Where Can I Get Firefox 3.5 for Ubuntu?
  • Firefox 3.5: Back on top… for now

Sabayon Linux Gnome 4.2 Released

Filed under
Linux

wgo.wolf911.us: Sabayon 4.2 will catch you: just the best of the Out-Of-The-Box, GNOME, multimedia applications and nothing more than what you need for your daily tasks, but what about your free time? We’ve got it.

Puppy Linux 4.2 Quick Review

Filed under
Linux

techexposures.com: We reviewed the June 2009 release v.4.2 of Puppy Linux, which comes in a 110 MB file download from their website, or from accepted mirrors. The iso file is then burnt to CD and runs as a Live CD.

PCLinuxOS Quarterly ISO updates available

Filed under
PCLOS

Firefox 3.5 Available Now!

Filed under
Moz/FF
  • Firefox 3.5 Available Now!

  • Firefox 3.5 is now available for download
  • about:mozilla – Firefox 3.5 launch edition!
  • Firefox 3.5 and Privacy
  • Whats new in firefox 3.5
  • First look: Firefox 3.5 released, ready to "upgrade" the Web
  • Firefox 3.5 vs. Chrome 3 Showdown, Round 1
  • Download Firefox 3.5: Three Times Faster?

More in Tux Machines

today's howtos

Security Leftovers

  • Security updates for Monday

    Security updates have been issued by Debian (pillow, ruby-kramdown, wpa, and xrdp), Fedora (ark and rpki-client), Gentoo (apache, ark, global, gthumb, and iproute2), openSUSE (chromium, grub2, java-11-openjdk, libX11, and opera), Red Hat (bind, chromium-browser, java-1.7.1-ibm, java-1.8.0-ibm, and libvncserver), SUSE (LibVNCServer, perl-XML-Twig, thunderbird, and xen), and Ubuntu (samba).

  • Have I Been Pwned to release code base to the open source community

    Members of the general public can submit their email addresses into the Have I Been Pwned search engine to find out if they have been "pwned," and if their emails have been linked to a data breach, each one and a summary of what happened is displayed -- as well as what information has been exposed. Since its launch in 2013, Hunt has poured more resources, including time and energy, into managing the search engine over time, expanding the service to include domain monitoring and breach alerts. At the heart, one main operator isn't enough to ensure future scalability or sustainability, and with this in mind, Hunt previously attempted to find a buyer to help expand his life's work. Unfortunately, the merger and/or acquisition process failed, and so Hunt has decided to pursue another alternative -- opening up the Have I Been Pwned code base to the open source community.

  • Researcher Demonstrates Several Zoom Vulnerabilities at DEF CON 28

    Popular video conferencing app Zoom has addressed several security vulnerabilities, two of which affect its Linux client that could have allowed an attacker with access to a compromised system to read and exfiltrate Zoom user data—and even run stealthy malware as a sub-process of a trusted application. According to cybersecurity researcher Mazin Ahmed, who presented his findings at DEF CON 2020 yesterday, the company also left a misconfigured development instance exposed that wasn't updated since September 2019, indicating the server could be susceptible to flaws that were left unpatched.

Red Hat/Fedora Leftovers

  • Fedora Nest 2020

    This year Flock did not happen due to COVID-19, and in its place, Fedora Nest happened. After many events I’ve seen going virtual in the last few months, I was skeptical. I was yet to see an acceptable online platform to run events. I was wrong on the platform. Fedora Nest used Hopin , which is by far the best platform for events I’ve seen so far. Don’t get your expectations too high, though, because when I say the best one I’ve seen so far, only means that it is usable, and it does not mean in any way that is on par of real conferences. I might be a weird being, but I find traveling relaxing, so I usually add to the joy of the conference the pleasure of traveling. In addition to this, at conferences, I find myself to connect with people - sometimes briefly, sometimes more deeply - and this does not occur in online events. For those reasons, I really hope we will be able to soon go back to in-person conferences.

  • Miroslav Suchý: Nest 2020 - my notes

    This year, we had Nest conference instead of traditional Flock, which has been canceled due to COVID. The conference happened purely remotely over the Hopin video conference. This was good and bad. The good is that we saved a lot on traveling and that it happened at all. It would be bad if it was canceled. The bad part was that I found it hard to focus on the conference. There are too many distractions at home. It was much harder to socialize. And a lot of people had issues either with microphone or internet upload. It was sometimes hard to follow. The conference was organized mostly for US folks, and therefore some sessions were very late in my timezone.

  • Btrfs by default status updates, 2020-08-09
  • Fedora Btrfs Activity Continues - New Options To Control Discard, Compression

    Fedora developers continue embracing the work on making the Btrfs file-system the default for F33 desktop variants. Their latest progress report indicates new installation options being wired up for the Btrfs support. A new Anaconda Kickstart install configuration knob is being added for setting the async discard behavior for solid-state drives. This configuration option will simply set the Btrfs DISCARD option to be enabled by default per the /etc/fstab options. They are still weighing whether to make it the default or more than likely that default transition would be next year for Fedora 34.

  • “To be, or not to be,” vulnerable… How customers and partners can understand and track Red Hat security vulnerabilities

    That is the question. Yes, I believe William Shakespeare was thinking about container security when he began Act 3 of Hamlet. He probably scanned his Red Hat Universal Base Image (UBI) 8 container with multiple vulnerability scanners, and with "the heart-ache and the thousand natural shocks", noticed each report told him something different. One report said his container had a vulnerability, another indicated the vulnerability was patched, and another didn’t even show the vulnerability. As Hamlet contemplates his fate, it’s no wonder he says: "With this regard their currents turn awry, And lose the name of action." In other words, he rips up the reports and does nothing! In many ways our customers are experiencing the same vulnerability inconsistencies as Hamlet. But unlike our hero’s tragic fate, there is some good news: Red Hat is working with independent software vendors (ISVs) to help drive vulnerability consistency for both Red Hat and our partners.

  • Kubernetes and the hybrid cloud with Skupper

    DevNation Tech Talks are hosted by the Red Hat technologists who create our products. These sessions include real solutions plus code and sample projects to help you get started. In this talk, you’ll learn about Kubernetes and the hybrid cloud with Skupper from Ted Ross and Burr Sutter.

today's howtos