Language Selection

English French German Italian Portuguese Spanish

original content

This began as a list of original articles found on tuxmachines.org, either by me or someone else, but it has since morphed into a list of original articles found on tuxmachines.org and the articles I've had published elsewhere.

  1. Linux Tycoon: Design and Manage Your Own Distribution - March 31, 2012
  2. Ubuntu 12.04 Beta 2 Arrives for Testing - March 29, 2012
  3. GNOME 3.4 Released with Lots of Improvement - March 28, 2012
  4. Greg K-H Updates Tumbleweed Status - March 27, 2012
  5. LibreOffice 3.4.6 Released - March 22, 2012
  6. openSUSE 12.2 M2, Better Late than Never - March 21, 2012
  7. Mitchell Baker Says H.264 is About User Experience - March 19, 2012
  8. LibreOffice 3.5.1 Released with Fixes - March 18, 2012
  9. Mageia 2 Beta 2, Still No Live Images - March 16, 2012
  10. KDE Spark Tablet Renamed to Honor Classical Composer - March 15, 2012
  11. Final Debian 5 Update Released - March 13, 2012
  12. Arch Turns Ten - Mar 12, 2012
  13. Raspberry Pi Orders Now Being Accepted - Feb 29, 2012
  14. Upcoming GNOME 3.4 Previewed - Feb 28, 2012
  15. Fedora's Beefy Miracle Sizzling with Alpha 1 - Feb 28, 2012
  16. Amnesia, Scariest Game Ever, to Get Sequel - Feb 24, 2012
  17. Intel Joins TDF, Adds LibreOffice to AppUp Center - Feb 23, 2012
  18. Red Hat Enterprise Linux 5.7 to 5.8 Risk Report - Feb 21, 2012
  19. The Document Foundation Incorporated in Germany - Feb 20, 2012
  20. KDE Spark Tablet Pre-Order Registration Open - Feb 16, 2012
  21. LibreOffice 3.5 Released - Feb 14, 2012
  22. Debian GNU/Linux 5.0 Reaches End of Life - Feb 10, 2012
  23. Pardus Future Uncertain, Fork Probable - Feb 07, 2012
  24. PCLinuxOS 2012.2 Released - Feb 02, 2012
  25. openSUSE has a Dream - Jan 31, 2012
  26. Mandriva Bankruptcy Crisis Averted, For Now - Jan 30, 2012
  27. GhostBSD 2.5 - Now with an Easy Graphic Installer - Jan 26, 2012
  28. Gentoo-based Toorox Releases 01.2012 GNOME Edition - Jan 25, 2012
  29. Mandriva Decision Delayed Again - Jan 23, 2012
  30. Xfce's Early April Fool's Joke - Jan 20, 2012
  31. KDE 4.9 to get a New Widgets Explorer - Jan 19, 2012
  32. Meet Bodhi's Bulky Brother: Bloathi - Jan 18, 2012
  33. Mandriva Delays Bankruptcy Decision - Jan 17, 2012
  34. LibreOffice 3.4.5 Released - Jan 16, 2012
  35. Fedora Running Beefy Contest - Jan 13, 2012
  36. Mageia 2 Inches Along with Another Alpha - Jan 12, 2012
  37. Linux Mint 12 KDE Almost Ready - Jan 11, 2012
  38. Greg KH Posts Status of Kernel Tree - Jan 10, 2012
  39. Unused LibreOffice Code Expunged - Jan 9, 2012
  40. Is Mandriva Finished This Time? - Jan 5, 2012
  41. New aptosid Fork, siduction 11.1 Released - Jan 4, 2012
  42. Lefebvre Introduces GNOME 3 Fork - Jan 3, 2012
  43. Gentoo Gets New Year's Release - Jan 2, 2012










More in Tux Machines

Security Leftovers

  • Security updates for Thursday
  • Security Tips for Installing Linux on Your SysAdmin Workstation
    Once you’ve chosen a Linux distro that meets all the security guidelines set out in our last article, you’ll need to install the distro on your workstation.
  • Fedora 26 crypto policy Test Day today (2017-03-30)!
  • Open-source developers targeted in sophisticated malware attack
    For the past few months, developers who publish their code on GitHub have been targeted in an attack campaign that uses a little-known but potent cyberespionage malware. The attacks started in January and consisted of malicious emails specifically crafted to attract the attention of developers, such as requests for help with development projects and offers of payment for custom programming jobs. The emails had .gz attachments that contained Word documents with malicious macro code attached. If allowed to execute, the macro code executed a PowerShell script that reached out to a remote server and downloaded a malware program known as Dimnie.
  • A scramble at Cisco exposes uncomfortable truths about U.S. cyber defense
    When WikiLeaks founder Julian Assange disclosed earlier this month that his anti-secrecy group had obtained CIA tools for hacking into technology products made by U.S. companies, security engineers at Cisco Systems (CSCO.O) swung into action. The Wikileaks documents described how the Central Intelligence Agency had learned more than a year ago how to exploit flaws in Cisco's widely used Internet switches, which direct electronic traffic, to enable eavesdropping. Senior Cisco managers immediately reassigned staff from other projects to figure out how the CIA hacking tricks worked, so they could help customers patch their systems and prevent criminal hackers or spies from using the same methods, three employees told Reuters on condition of anonymity.
  • NTPsec: a Secure, Hardened NTP Implementation
    Network time synchronization—aligning your computer's clock to the same Universal Coordinated Time (UTC) that everyone else is using—is both necessary and a hard problem. Many internet protocols rely on being able to exchange UTC timestamps accurate to small tolerances, but the clock crystal in your computer drifts (its frequency varies by temperature), so it needs occasional adjustments. That's where life gets complicated. Sure, you can get another computer to tell you what time it thinks it is, but if you don't know how long that packet took to get to you, the report isn't very useful. On top of that, its clock might be broken—or lying. To get anywhere, you need to exchange packets with several computers that allow you to compare your notion of UTC with theirs, estimate network delays, apply statistical cluster analysis to the resulting inputs to get a plausible approximation of real UTC, and then adjust your local clock to it. Generally speaking, you can get sustained accuracy to on the close order of 10 milliseconds this way, although asymmetrical routing delays can make it much worse if you're in a bad neighborhood of the internet.
  • Zelda Coatings
    I assume that every permutation of scams will eventually be tried; it is interesting that the initial ones preyed on people's avarice and dishonesty: "I will transfer millions to your bank account, then you share with me" - with subsequent scams appealing to another demographic: "I want to donate a large sum to your religious charity" - to perhaps capture a more virtuous but still credulous lot. Where will it end ?

Tizen and Android

Linux and Linux Foundation

Mesa and Intel Graphics