Language Selection

English French German Italian Portuguese Spanish

original content

This began as a list of original articles found on tuxmachines.org, either by me or someone else, but it has since morphed into a list of original articles found on tuxmachines.org and the articles I've had published elsewhere.

  1. Linux Tycoon: Design and Manage Your Own Distribution - March 31, 2012
  2. Ubuntu 12.04 Beta 2 Arrives for Testing - March 29, 2012
  3. GNOME 3.4 Released with Lots of Improvement - March 28, 2012
  4. Greg K-H Updates Tumbleweed Status - March 27, 2012
  5. LibreOffice 3.4.6 Released - March 22, 2012
  6. openSUSE 12.2 M2, Better Late than Never - March 21, 2012
  7. Mitchell Baker Says H.264 is About User Experience - March 19, 2012
  8. LibreOffice 3.5.1 Released with Fixes - March 18, 2012
  9. Mageia 2 Beta 2, Still No Live Images - March 16, 2012
  10. KDE Spark Tablet Renamed to Honor Classical Composer - March 15, 2012
  11. Final Debian 5 Update Released - March 13, 2012
  12. Arch Turns Ten - Mar 12, 2012
  13. Raspberry Pi Orders Now Being Accepted - Feb 29, 2012
  14. Upcoming GNOME 3.4 Previewed - Feb 28, 2012
  15. Fedora's Beefy Miracle Sizzling with Alpha 1 - Feb 28, 2012
  16. Amnesia, Scariest Game Ever, to Get Sequel - Feb 24, 2012
  17. Intel Joins TDF, Adds LibreOffice to AppUp Center - Feb 23, 2012
  18. Red Hat Enterprise Linux 5.7 to 5.8 Risk Report - Feb 21, 2012
  19. The Document Foundation Incorporated in Germany - Feb 20, 2012
  20. KDE Spark Tablet Pre-Order Registration Open - Feb 16, 2012
  21. LibreOffice 3.5 Released - Feb 14, 2012
  22. Debian GNU/Linux 5.0 Reaches End of Life - Feb 10, 2012
  23. Pardus Future Uncertain, Fork Probable - Feb 07, 2012
  24. PCLinuxOS 2012.2 Released - Feb 02, 2012
  25. openSUSE has a Dream - Jan 31, 2012
  26. Mandriva Bankruptcy Crisis Averted, For Now - Jan 30, 2012
  27. GhostBSD 2.5 - Now with an Easy Graphic Installer - Jan 26, 2012
  28. Gentoo-based Toorox Releases 01.2012 GNOME Edition - Jan 25, 2012
  29. Mandriva Decision Delayed Again - Jan 23, 2012
  30. Xfce's Early April Fool's Joke - Jan 20, 2012
  31. KDE 4.9 to get a New Widgets Explorer - Jan 19, 2012
  32. Meet Bodhi's Bulky Brother: Bloathi - Jan 18, 2012
  33. Mandriva Delays Bankruptcy Decision - Jan 17, 2012
  34. LibreOffice 3.4.5 Released - Jan 16, 2012
  35. Fedora Running Beefy Contest - Jan 13, 2012
  36. Mageia 2 Inches Along with Another Alpha - Jan 12, 2012
  37. Linux Mint 12 KDE Almost Ready - Jan 11, 2012
  38. Greg KH Posts Status of Kernel Tree - Jan 10, 2012
  39. Unused LibreOffice Code Expunged - Jan 9, 2012
  40. Is Mandriva Finished This Time? - Jan 5, 2012
  41. New aptosid Fork, siduction 11.1 Released - Jan 4, 2012
  42. Lefebvre Introduces GNOME 3 Fork - Jan 3, 2012
  43. Gentoo Gets New Year's Release - Jan 2, 2012










More in Tux Machines

Linux firewalls: What you need to know about iptables and firewalld

A firewall is a set of rules. When a data packet moves into or out of a protected network space, its contents (in particular, information about its origin, target, and the protocol it plans to use) are tested against the firewall rules to see if it should be allowed through. Here’s a simple example... Read more

Mozilla: Firefox GCC/LLVM Clang Dilemma, September 2018 CA Communication and CfP

  • Fedora Firefox – GCC/CLANG dilemma
    After reading Mike’s blog post about official Mozilla Firefox switch to LLVM Clang, I was wondering if we should also use that setup for official Fedora Firefox binaries. The numbers look strong but as Honza Hubicka mentioned, Mozilla uses pretty ancient GCC6 to create binaries and it’s not very fair to compare it with up-to date LLVM Clang 6. Also if I’m reading the mozilla bug correctly the PGO/LTO is not yet enabled for Linux, only plain optimized builds are used for now…which means the transition at Mozilla is not so far than I expected.
  • September 2018 CA Communication
    Mozilla has sent a CA Communication to inform Certification Authorities (CAs) who have root certificates included in Mozilla’s program about current events relevant to their membership in our program and to remind them of upcoming deadlines. This CA Communication has been emailed to the Primary Point of Contact (POC) and an email alias for each CA in Mozilla’s program, and they have been asked to respond to the following 7 action items:
  • Emily Dunham: CFP tricks 1
    Some strategies I’ve recommended in the past for dealing with this include looking at the conference’s marketing materials to imagine who they would interest, and examining the abstracts of past years’ talks.

today's howtos

Security: Quantum Computing and Cryptography, Time to Rebuild Alpine Linux Docker Container

  • Quantum Computing and Cryptography
    Quantum computing is a new way of computing -- one that could allow humankind to perform computations that are simply impossible using today's computing technologies. It allows for very fast searching, something that would break some of the encryption algorithms we use today. And it allows us to easily factor large numbers, something that would break the RSA cryptosystem for any key length. This is why cryptographers are hard at work designing and analyzing "quantum-resistant" public-key algorithms. Currently, quantum computing is too nascent for cryptographers to be sure of what is secure and what isn't. But even assuming aliens have developed the technology to its full potential, quantum computing doesn't spell the end of the world for cryptography. Symmetric cryptography is easy to make quantum-resistant, and we're working on quantum-resistant public-key algorithms. If public-key cryptography ends up being a temporary anomaly based on our mathematical knowledge and computational ability, we'll still survive. And if some inconceivable alien technology can break all of cryptography, we still can have secrecy based on information theory -- albeit with significant loss of capability. At its core, cryptography relies on the mathematical quirk that some things are easier to do than to undo. Just as it's easier to smash a plate than to glue all the pieces back together, it's much easier to multiply two prime numbers together to obtain one large number than it is to factor that large number back into two prime numbers. Asymmetries of this kind -- one-way functions and trap-door one-way functions -- underlie all of cryptography.
  • This New CSS Attack Restarts iPhones & Freezes Macs
  • Time to Rebuild Alpine Linux Docker Containers After Package Manager Patch
  • GrrCon 2018 Augusta15 Automation and Open Source Turning the Tide on Attackers John Grigg