Language Selection

English French German Italian Portuguese Spanish

original content

This began as a list of original articles found on tuxmachines.org, either by me or someone else, but it has since morphed into a list of original articles found on tuxmachines.org and the articles I've had published elsewhere.

  1. Linux Tycoon: Design and Manage Your Own Distribution - March 31, 2012
  2. Ubuntu 12.04 Beta 2 Arrives for Testing - March 29, 2012
  3. GNOME 3.4 Released with Lots of Improvement - March 28, 2012
  4. Greg K-H Updates Tumbleweed Status - March 27, 2012
  5. LibreOffice 3.4.6 Released - March 22, 2012
  6. openSUSE 12.2 M2, Better Late than Never - March 21, 2012
  7. Mitchell Baker Says H.264 is About User Experience - March 19, 2012
  8. LibreOffice 3.5.1 Released with Fixes - March 18, 2012
  9. Mageia 2 Beta 2, Still No Live Images - March 16, 2012
  10. KDE Spark Tablet Renamed to Honor Classical Composer - March 15, 2012
  11. Final Debian 5 Update Released - March 13, 2012
  12. Arch Turns Ten - Mar 12, 2012
  13. Raspberry Pi Orders Now Being Accepted - Feb 29, 2012
  14. Upcoming GNOME 3.4 Previewed - Feb 28, 2012
  15. Fedora's Beefy Miracle Sizzling with Alpha 1 - Feb 28, 2012
  16. Amnesia, Scariest Game Ever, to Get Sequel - Feb 24, 2012
  17. Intel Joins TDF, Adds LibreOffice to AppUp Center - Feb 23, 2012
  18. Red Hat Enterprise Linux 5.7 to 5.8 Risk Report - Feb 21, 2012
  19. The Document Foundation Incorporated in Germany - Feb 20, 2012
  20. KDE Spark Tablet Pre-Order Registration Open - Feb 16, 2012
  21. LibreOffice 3.5 Released - Feb 14, 2012
  22. Debian GNU/Linux 5.0 Reaches End of Life - Feb 10, 2012
  23. Pardus Future Uncertain, Fork Probable - Feb 07, 2012
  24. PCLinuxOS 2012.2 Released - Feb 02, 2012
  25. openSUSE has a Dream - Jan 31, 2012
  26. Mandriva Bankruptcy Crisis Averted, For Now - Jan 30, 2012
  27. GhostBSD 2.5 - Now with an Easy Graphic Installer - Jan 26, 2012
  28. Gentoo-based Toorox Releases 01.2012 GNOME Edition - Jan 25, 2012
  29. Mandriva Decision Delayed Again - Jan 23, 2012
  30. Xfce's Early April Fool's Joke - Jan 20, 2012
  31. KDE 4.9 to get a New Widgets Explorer - Jan 19, 2012
  32. Meet Bodhi's Bulky Brother: Bloathi - Jan 18, 2012
  33. Mandriva Delays Bankruptcy Decision - Jan 17, 2012
  34. LibreOffice 3.4.5 Released - Jan 16, 2012
  35. Fedora Running Beefy Contest - Jan 13, 2012
  36. Mageia 2 Inches Along with Another Alpha - Jan 12, 2012
  37. Linux Mint 12 KDE Almost Ready - Jan 11, 2012
  38. Greg KH Posts Status of Kernel Tree - Jan 10, 2012
  39. Unused LibreOffice Code Expunged - Jan 9, 2012
  40. Is Mandriva Finished This Time? - Jan 5, 2012
  41. New aptosid Fork, siduction 11.1 Released - Jan 4, 2012
  42. Lefebvre Introduces GNOME 3 Fork - Jan 3, 2012
  43. Gentoo Gets New Year's Release - Jan 2, 2012










More in Tux Machines

Australian Securities Exchange completes Red Hat migration

The Australian Securities Exchange (ASX) has completed the migration of "mission-critical" legacy applications to the Red Hat JBoss Enterprise Application Platform (JBoss EAP). ASX first deployed JBoss EAP in 2011 to modernise its legacy technologies and to facilitate the introduction of new web applications after it realised its legacy application server platform was becoming increasingly inconsistent, unstable, and expensive. After the initial ASX Online Company migration was complete in 2012, ASX used JBoss EAP to build the ASX.com API, as well as its Sharemarket Game, which gives players the opportunity to learn how the share market works. Read more

Programming/Development: GAPID 1.0 and Atom 1.23

  • Diagnose and understand your app's GPU behavior with GAPID
  • GAPID 1.0 Released As Google's Cross-Platform Vulkan Debugger
    Back in March we wrote about GAPID as a new Google-developed Vulkan debugger in its early stages. Fast forward to today, GAPID 1.0 has been released for debugging Vulkan apps/games on Linux/Windows/Android as well as OpenGL ES on Android. GAPID is short for the Graphics API Debugger and allows for analyzing rendering and performance issues with ease using its GUI interface. GAPID also allows for easily experimenting with code changes to see their rendering impact and allows for offline debugging. GAPID has its own format and capturetrace utility for capturing traces of Vulkan (or GLES on Android too) programs for replaying later on with GAPID.
  • Hackable Text Editor Atom 1.23 Adds Better Compatibility for External Git Tools
    GitHub released Atom 1.23, the monthly update of the open-source and cross-platform hackable text editor application loved by numerous developers all over the world. Including a month's worth of enhancements, Atom 1.23 comes with the ability for packages to register URI handler functions, which can be invoked whenever the user visits a URI that starts with "atom://package-name/," and a new option to hide certain commands in the command palette when registering them via "atom.commands.add." Atom 1.23 also improves the compatibility with external Git tools, as well as the performance of the editor by modifying the behavior of several APIs to no longer make callbacks more than once in a text buffer transaction. Along with Atom 1.23, GitHub also released Teletype 0.4.0, a tool that allows developers to collaborate simultaneously on multiple files.

Red Hat GNU/Linux and More

Security: VLC Bug Bounty, Avast Tools, Intel ME

  • European Commission Kicks Off Open-Source Bug Bounty
    The European Commission has announced its first-ever bug bounty program, and is calling on hackers to find vulnerabilities in VLC, a popular open-source multimedia player loaded on every workstation at the Commission. The program has kicked off with a three-week, invitation-only session, after which it will be open to the public. Rewards include a minimum of $2,000 for critical severity bugs, especially remote code execution. High severity bugs such as code execution without user intervention, will start at $750. Medium severity bugs will start at a minimum of $300; these include code execution with user intervention, high-impact crashes and infinite loops. Low-severity bugs, like information leaks, crashes and the like, will pay out starting at $100.
  • Avast launches open-source decompiler for machine code
    Keeping up with the latest malware and virus threats is a daunting task, even for industry professionals. Any device connected to the Internet is a target for being infected and abused. In order to stop attacks from happening, there needs to be an understanding of how they work so that a prevention method can be developed. To help with the reverse engineering of malware, Avast has released an open-source version of its machine-code decompiler, RetDec, that has been under development for over seven years. RetDec supports a variety of architectures aside from those used on traditional desktops including ARM, PIC32, PowerPC and MIPS.
  • Avast makes 'RetDec' machine-code decompiler open source on GitHub
    Today, popular anti-virus and security company, Avast, announces that it too is contributing to the open source community. You see, it is releasing the code for its machine-code decompiler on GitHub. Called "RetDec," the decompiler had been under development since 2011, originally by AVG -- a company Avast bought in 2016.
  • The Intel ME vulnerabilities are a big deal for some people, harmless for most
    (Note: all discussion here is based on publicly disclosed information, and I am not speaking on behalf of my employers) I wrote about the potential impact of the most recent Intel ME vulnerabilities a couple of weeks ago. The details of the vulnerability were released last week, and it's not absolutely the worst case scenario but it's still pretty bad. The short version is that one of the (signed) pieces of early bringup code for the ME reads an unsigned file from flash and parses it. Providing a malformed file could result in a buffer overflow, and a moderately complicated exploit chain could be built that allowed the ME's exploit mitigation features to be bypassed, resulting in arbitrary code execution on the ME. Getting this file into flash in the first place is the difficult bit. The ME region shouldn't be writable at OS runtime, so the most practical way for an attacker to achieve this is to physically disassemble the machine and directly reprogram it. The AMT management interface may provide a vector for a remote attacker to achieve this - for this to be possible, AMT must be enabled and provisioned and the attacker must have valid credentials[1]. Most systems don't have provisioned AMT, so most users don't have to worry about this.