Language Selection

English French German Italian Portuguese Spanish

October 2012

Luninux - The Quest For Freedom

Filed under
Linux

darkduck.com: I downloaded Luninux a couple of weeks ago at the same time that I downloaded Fuduntu. I wrote a review about Fuduntu last week and I was really impressed.

XStreamOS: An Illumos Kernel Based Operating System

Filed under
Linux
Interviews

unixmen.com: The project is led by Garbriele Bulfon through his company, Sonicle, a company which he co-founded with business partner Raffaele Fullone. Sonicle specializes in Infrastructure, Cloud and Web Development technologies. Gabriele gave me a brief run-down of what Sonicle is all about:

Torvalds on laptops: Make higher-def resolution standard

Filed under
Linux
Hardware

computerworld.com.au: The outspoken creator of Linux, Linus Torvalds, called for laptop makers to follow the tablet world's lead in using the highest-resolution displays possible on mobile devices, in a post on Google Plus.

Windows 8, the post-PC world, and Linux: Microsoft will prevail

Filed under
Microsoft
Ubuntu

arstechnica.com: Since the very first reveal of Windows 8, some critics have called the operating system a fatal move for Microsoft. They call it a blunder so large in its abandonment of Windows' heritage that it has created an opportunity for other operating systems to rise up.

Interface tricks could be a Linux treat

Filed under
KDE
Software

itworld.com: I miss the days when I would get excited about the latest desktop interface to come from the GNOME or KDE projects, or downloading and installing the umpteenth Linux distribution on the continuing quest to find Linux nirvana.

Red Hat Linux Born on Halloween and Still Scaring the Pants off Proprietary Operating Systems

Filed under
Linux

internetnews.com: In October of 1994, on All Hallow's Eve, Marc Ewing released the first publicly available distribution of Red Hat Linux. It's a release that has become known as the Halloween release.

today's leftovers:

Filed under
News
Microsoft
Ubuntu
HowTos
  • Mark Shuttleworth and the secrecy of Ubuntu
  • Video Editor ‘Lightworks’ Linux Release Limited to Select Few
  • Osmos Arcade Game Added to Steam for Linux Database
  • Ext4 bug - No need to panic
  • Geeky Halloween Pics
  • Precise Puppy - Linux Perfected
  • How to become an rsync power user with Grsync
  • Ubuntu Plans To Stick To "Stable GNOME"
  • Booting into Linux on Windows 8 Secure Boot-equipped hardware
  • Ethiopian kids hack OLPCs in 5 months with zero instruction
  • An overview of our Secure Boot implementation
  • Getting started with UEFI development
  • The Ripple Effect of Windows 8
  • Howto GNOME 3 in Ubuntu
  • Widgets Are Coming To The Unity Desktop
  • BackBox Linux 3 Review
  • linux kernel monkey: Help Wanted
  • Make a game on Raspberry Pi
  • GCC 4.8 Compiler On AMD's Eight-Core Piledriver

Is Valve Planning A Linux-based gaming console?

Filed under
Hardware
Gaming

davestechsupport.com: Recently, Valve made an announcement that it will be porting Steam to Linux (with official support for Ubuntu Linux in particular) and is entering the Beta Testing phase as I write this. I believe Valve’s long term goal is to use Ubuntu as the basis for a new console system, similar to the Xbox.

Linux Mint Makes Money with Minty Merchandise

Filed under
Linux

ostatic.com: Linux Mint founder, Clement Lefebvre, has done an amazing job monitizing his Ubuntu offshoot. Now Lefebvre has announced yet another partnership and the ribbon-cutting of his Minty fresh store.

Will XP Users Shun Windows 8 in Favor of Ubuntu?

Filed under
Microsoft
Ubuntu

datamation.com: Historically, Windows hasn't been tremendously effective in the area of backwards compatibility. On the flipside, the idea that Windows 8 will drive Windows users to Ubuntu in droves is unlikely.

More in Tux Machines

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud