Language Selection

English French German Italian Portuguese Spanish

The Best System Tweaker for Linux

Filed under
Software

There aren't a ton of system tweakers for Linux, but we have to give a shout out to the very useful Ubuntu Tweak. It can change tons of extra settings in Ubuntu, make applications easy to install for beginners, and clean up unnecessary files on your system.

Features:

* View basic system information about your distribution, kernel, CPU, memory, and more

* Tweak the session menu and the way Ubuntu handles logout, restart, and shutdown

* Choose programs to auto-start at boot

* Quick install popular applications, including those not in the Ubuntu Software Center (and easily add new repositories)

* Clean up unneeded packages or cache to free disk space

rest here




More in Tux Machines

Qt 5.11 Alpha Released

Qt 5.11 Alpha is released today. As usual the official Alpha is a source code delivery only, but later we will offer development snapshots of Qt 5.11 regularly via the online installer. Please check Qt 5.11 New Features wiki to see what new is coming with Qt 5.11 release. Please note that the feature list is still in progress and not to be considered final before the first Beta release. Read more Also: Qt 5.11 Alpha Released With Many Toolkit Additions

Android Leftovers

Huawei P Smart review

With a decent 18:9 screen, the P Smart is a fine Android phone that should appeal to anyone looking for a cheap contract phone. However, the fact it’s so similar to the Honor 9 Lite (which costs £100 less when bought SIM-free) makes it hard to recommend, especially as the Honor has a couple of extra features – dual SIM and a second front camera – which the Huawei lacks. Read more

​Bogus Linux vulnerability gets publicity

I am so sick and tired of crap security news about Android and Linux. In the latest example, GoSecure claims it's discovered Chaos: a Stolen Backdoor Rising Again. Yeah. Right. Let's look closer. First, we have a neat name. Can't have a security bug these days without giving it a sexy name. But, what is it really? Well, it requires the attacker to break into the target system by "brute-forcing SSH credentials". Wait. What? To get this you need someone to log in to your server!? Read more