Language Selection

English French German Italian Portuguese Spanish

m23 Rock 15.2 Linux Deployment Tool Supports Debian 8, Linux Mint 17.2, and systemd

Filed under

From the looks of it, m32 Rock 15.2 is a major release, bringing support for the latest Debian GNU/Linux 8 (Jessie), Linux Mint 17.2 (Rafaela), and Linux Mint 17.1 (Rebecca) Linux kernel-based operating systems, support for the systemd init system, replacing the old SysVinit one, as well as a significant number of under-the-hood improvements.

Read more

More in Tux Machines

Games: Valve, Kingdoms and Castles, and a Lot More

today's howtos

  • How to Install and Configure HAProxy on Ubuntu 22.04

    In this post, we will demonstrate how to install HAProxy on Ubuntu 22.04 (Jammy Jellyfish) step by step. We will later configure it to act as a load balancer by distributing incoming requests between two web servers.

    HaProxy, short for High Availability Proxy, is a free and open-source HTTP load balancer and reverse-proxy solution that is widely used to provide high availability to web applications and guarantee maximum possible uptime.

  • How to use DNF Software Package Manager with Examples - TREND OCEANS

    The dandified yum (DNF) command is the next-generation version of the YUM package manager for Fedora, CentOS, AlmaLinux, and other RHEL-based distributions. This command was first implemented after the Fedora 22, CentOS 8, and RHEL 8 release. The launch was to remove the bottleneck involved in the YUM command.

  • How to Install FFmpeg on CentOS 9 Stream

    FFmpeg is the leading free, open-source multimedia framework, able to decode, encode, transcode, mux, demux, stream, filter, and play nearly all multimedia files that have been created on any platform. FFmpeg compiles and runs on Linux, Mac OS X, Microsoft Windows, BSD systems, and Solaris. The following tutorial will teach you how to install FFmpeg on CentOS 9 Stream using the RPM Fusion free repository command line terminal.

  • How to Install ClamAV on Arch Linux

    ClamAV is an open-source and free antivirus toolkit that detects many types of malicious software, including viruses, trojans, malware, adware, rootkits, and other malicious threats. One of its primary uses of ClamAV is on mail servers as a server-side email virus scanner or file hosting servers to periodically scan to ensure files are clean, especially if the public can upload to the server. ClamAV supports multiple file formats (documents, executables, or archives), utilizes multi-thread scanner features, and receives updates for its signature database daily to sometimes numerous times per day for the latest protection. The following tutorial will teach you how to configure ClamAV on Arch Linux desktop or server and some basic scan commands using the command line terminal.

  • Linux su vs sudo: what's the difference? |

    Both the su and the sudo commands allow users to perform system administration tasks that are not permitted for non-privileged users—that is, everyone but the root user. Some people prefer the sudo command: For example, Seth Kenlon recently published "5 reasons to use sudo on Linux", in which he extols its many virtues. I, on the other hand, am partial to the su command and prefer it to sudo for most of the system administration work I do. In this article, I compare the two commands and explain why I prefer su over sudo but still use both.

today's howtos

  • A Detailed Guide on How to Work with Documents in Nextcloud

    Nextcloud is an open-source content collaboration platform that makes it possible to create secure file storage with sharing and synchronization features. It’s not too much to say that Nextcloud is an ideal solution for file management, as this platform allows you to share files and folders on your computer, and instantly synchronize them with your Nextcloud server.

  • How to Reset Forgotten Root Password in Fedora

    The only way any Linux user can boldly claim to have full control of their operating system environment is if they can be identified as root or Sudoer users.

  • How to Change the Default Interface in Linux?

    “Almost everything productive we can do in Linux requires us to have a network connection. Whether developing apps, installing software, scripting, sharing files, or even watching movies, we need a working network connection. Hence, “I require a network connection” is simply an understatement. The only way to enable network connection on a machine is through a network interface. A network interface is a device or a point of connection between a device and a private or public network. In most cases, a network interface is a physical card such as a wireless adapter, a network card, etc. However, this does not necessarily mean that a network interface should be a physical device. For example, a loopback adapter that is not physically visible is implemented by software and available on all devices.” This quick tutorial will show you how to set the default interface in Linux.

  • CoreOS in VirtualBox

    Three Fedora CoreOS (FCOS) update streams are available: stable, testing, and next. In general, you will want to use stable, but it is recommended to run some machines on testing and next and provide feedback. Each stream has a canonical URL representing its current state in JSON format, known as “stream metadata.” For example, the stream metadata URL for stable is: For automating Fedora CoreOS installations, it is expected that you will interact with stream metadata. While Fedora CoreOS does automatic in-place updates, it is generally a good practice to start provisioning new machines from the latest images.

today's leftovers

  • GNU Hackers Meetings - News: GHM 2022 confirmed [Savannah]

    The next GNU Hackers' Meeting will take place in İzmir, Turkey, in October 2022. Please see the event web page at .

  • Ubuntu Weekly Newsletter Issue 741

    Welcome to the Ubuntu Weekly Newsletter, Issue 741 for the week of June 19 – 25, 2022.

  • The software operator design pattern: disadvantages – part 5 | Ubuntu

    The software operator is a design pattern – it is a proven design that has been applied in many situations, implemented by several frameworks. As such, we can discuss its different consequences. This is important, because software developers and IT architects need to know when a design is a good choice, and when it’s time to avoid it.

  • Abstract wallpapers in Blender using geometry nodes – Máirín Duffy

    One project I am working on in hopes of having something ready in Fedora 37 final is a new set of installed-by-default but not set as default extra wallpapers for Fedora. These wallpapers would have light & dark mode versions. This is something that Allan Day and I have been planning, and we decided to start out with a set of 6 abstract wallpapers ideally built in a tool such as Blender so that we could easily generate and tweak & refine the light and dark versions in a way that photography (at least within our current resources) does not allow.

  • Customer success stories: reducing costs and risks while increasing flexibility, scalability and productivity with Red Hat solutions and services

    In this month’s customer success highlights, you’ll learn how Nymbus, Cepsa and the Asian Development Bank used a variety of Red Hat solutions and services to increase flexibility and scalability, improve response times and productivity, and save hundreds of work hours per year.

  • GNOME Introductory Post

    I will be working as a Google Summer of Code Intern at GNOME Foundation, and my project will be to add Chromecast support to the already very cool GNOME Network Displays app that has Miracast support as of now. It can be installed through flatpak as well.

  • Microconferences at Linux Plumbers Conference: Android – Linux Plumbers Conference 2022

    Linux Plumbers Conference 2022 is pleased to host the Android Microconference Continuing in the same direction as last year, this year’s Android microconference will be an opportunity to foster collaboration between the Android and Linux kernel communities. Discussions will be centered on the goal of ensuring that both the Android and Linux development moves in a lockstep fashion going forward.

  • Python packages with malicious code expose secret AWS credentials [Ed: Yes, if one installs malware, bad things will happen]

    Sonatype researchers have discovered Python packages that contain malicious code that peek into and expose secret AWS credentials, network interface information, and environment variables. All those credentials and metadata then get uploaded to one or more endpoints, and anyone on the web can see this. Going up a directory level showed hundreds of TXT files containing sensitive information and secret.

  • Support for Istio 1.12 ends on July 12th, 2022

    According to Istio’s support policy, minor releases like 1.12 are supported until six weeks after the N+2 minor release (1.14 in this case). Istio 1.14 was released on June 1st, and support for 1.12 will end on July 12th, 2022.