Language Selection

English French German Italian Portuguese Spanish

Korora Love, Why Wayland, Microsoft Monopoly

Filed under
-s

Korora 23 was released February 7 and today Jack Germain said you'll love it. Matthias Clasen today blogged that Wayland would still not be the default in Fedora 24 and Ubuntu convergence is starting to impress. Tim Sweeney, founder Epic Games and creator Gears of War, said Microsoft is (shockingly) trying to create a monopoly and a new startup is creating something on which users can run their choice of Windows or Ubuntu.

Read more

More in Tux Machines

today's leftovers

  • Run Every Distro At Once | LINUX Unplugged 417

    Yabba Dabba Distro! Run every major distribution on one native host. How we hijacked a Fedora install and turned it into the ultimate meta Linux box. Plus Valve and AMD team up to improve Linux performance and the duct-tape solution holding our server together.

  • Win a $10,000 Thelio Major Workstation!

    The computer and operating system are the most powerful tools in existence. The Launch into Learning season encourages STEM and creative professionals like you to hone their craft, learn a new skill, or make something they’re proud to share. This year, we’re empowering one lucky user with a $10,000 Thelio Major workstation. The complete package includes a Launch keyboard, an MX Master 3 wireless mouse, a 27” 1440p IPS display, and a decked-out Thelio Major.

  • U.S. medical entities fall prey to Pysa threat actors, but many haven’t disclosed it – at least, not yet.
  • Damage control: Microsoft deletes all comments under heavily criticized Windows 11 upgrade video
  • C++ Vector Iterators – Linux Hint

    The main iterators in C++ are Input Iterator, Output Iterator, Forward Iterator, Bidirectional Iterator, and Random Access Iterator. Reverse Iterator is not really an iterator; it is an iterator adaptor. There are some variants to iterators, like a constant iterator. An iterator is an elaborated pointer. Like a pointer, it points to objects of the same type in memory at different times. All iterators are dereferenceable, except for the output iterator that is dereferenceable only for a set of types. Dereferenceable means the value pointed to by the pointer or iterator can be obtained using the indirection operator, *. An integer can be added to some iterators in the same way, and for the same purpose, the integer would be added to a pointer. The questions for this article are: What are these iterators? Which of these iterators are used with the C++ vector? How are these iterators used with the C++ vector? This article answers all these questions in a simplified way. At the end of this article, when all these questions would have been answered, C++ vector iterators will be intuitive and natural (for the reader).

  • Security breaches where working from home is involved are costlier, claims IBM report

    Firms looking to save money by shifting to more flexible ways of working will need to think carefully about IT security and the additional cost of breaches linked to staff working from home. That's according to the latest annual "Cost of a Data Breach Report" conducted by Ponemon Institute along with IBM Security, which found that the average total cost of a remote-working data breach was more than $1m higher than cyberattacks where remote working wasn't a factor.

  • IBM Cloud took the evening off – 23 services were hard to provision for eight hours

    IBM cloud has experienced a significant Severity One outage – the rating Big Blue uses to denote the most serious incidents that make resources in its cloud unavailable to customers. The impact was indeed severe: IBM stated that users might not be able to access its catalogue of cloudy services or provision affected services.

Hardware From Vecow and Arduino

  • Vecow unveils Intel Atom x6211E based fanless Box PC & Pico-ITX motherboard

    Vecow EPBC-1000 2.5-inc/Pico-ITX single board computer powered by an Intel Atom x6211E Elkhart Lake processor, and found in the company’s PBC-1000 ultra-compact fanless embedded box PC, is designed for edge applications such as intelligent control, energy management, M2M, In-Vehicle Infotainment (IVI), factory automation, and any AIoT or Industry 4.0 applications.

  • This massive five-axis CNC machine is 3D-printable | Arduino Blog

    CNC (Computer Numerical Control) mills, routers, and lathes are indispensable manufacturing tools. If you need a part that adheres to tight tolerances, you turn to a CNC machine. Industrial CNC equipment is usually large, heavy, and very expensive. But small models exist for light-duty hobby jobs. This DIY device designed by Brian Brocken stands out because it is huge, has five axes, and is 3D-printable.

  • Hacking an old Nintendo Zapper into a wireless remote | Arduino Blog

    Those of us who have experienced the Nintendo Zapper while playing games such as Duck Hunt will probably have fond memories of it. However, with the rapid disappearance of CRT TVs and the aging of the physical mechanisms, YouTuber DuctTape Mechanic wanted to give an old Zapper a new lease on life. His modification integrated a small RF transmitting module into the top of the device, allowing it to be switched on by the trigger’s microswitch. With everything in place inside the Zapper, he moved onto the receiver.

Top 5 Software Tools for Linux with Data Encryption

Data encryption is a must-have feature in today’s world of cybersecurity. It allows you to encode your data making it unintelligible to someone who doesn’t have the authorized access. To be more secure online, it might be a good idea to opt for software that comes with this useful feature by default. Read more

today's howtos

  • How to automount volumes for Docker containers

    There are so many reasons you want to use volumes for your container deployments. The primary reason is to ensure persistent storage. Say, for example, you're deploying a WordPress instance via a Docker container. Not only do you want to give that container enough storage space to house all of the data it will require (especially as it scales), you want to make sure that data remains in play, even after the container is stopped or restarted. For that, you would use volumes.

  • How to install Adrift on a Chromebook

    Today we are looking at how to install Adrift on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • How to Install and Use Telnet on Ubuntu 20.04 - LinuxCapable

    Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network using a client-server protocol to establish a connection to Transmission Control Protocol port number 23 In the following tutorial, you will learn how to install Telnet on Ubuntu 20.04 and 21.04.

  • How to Install phpMyAdmin on Rocky Linux 8

    phpMyAdmin is a web app for administering MySQL or MariaDB. With phpMyadmin, you can perform various database management tasks, and execute SQL queries from a graphical interface via a web browser. It is free, open-source, and written in the PHP language.

  • Junichi Uekawa: Wrote a tool to parse /sys/block/*/stat.

    Wrote a tool to parse /sys/block/*/stat. It's probably impossible for a human brain to appreciate the numbers so I made a web page that you can paste the contents and parse it from JS to emit some processed numbers. Probably iostat is the tool you want, but hey, sometimes you need this kind of stuff.

  • All zip and unzip File Operations on Linux – Linux Hint

    This tutorial explains all zip and unzip operations under Linux with practical examples and easy function descriptions.

  • How to find all failed ssh login attempts in Ubuntu – Linux Hint

    One of the normal tasks of administrators is to keep track of successful and failed login attempts to ensure that the environment is free of unwanted and illegal intrusions. Administrators can also look through the logs to see if there have been any security problems on the servers. A log file is created whenever someone tries to log in to a server using SSH. You may see the requested login date, timestamp, user account, and IP address. SSH was created as a protocol for creating connections between two systems that rely on a client/server architecture, allowing administrators and users to access the server or computer remotely. This protocol is most commonly used by the system and network administrators and anyone who wants to administer a computer remotely. One of the most prominent benefits is that it is in charge of encrypting the link session to improve security by prohibiting attackers from reading unencrypted passwords. The rsyslog daemon in Linux keeps track of every attempt to login to an SSH server and records it in a log file. Combining, showing, and filtering log files is the most basic approach for listing all failed SSH login attempts on Ubuntu. In this article, we will find all failed ssh login attempts in Ubuntu 20.04 Linux system.

  • How to install a specific Python version on Ubuntu – Linux Hint

    It is often the case that we install a program on our system, and it turns out that it’s the wrong version. This can lead to compatibility and performance issues since it may not communicate with third-party modules properly. Similar is the case with Python, and as vigilant programmers, we must figure out the correct version that we need. Therefore, in this guide, we will show you how to install a specific version of Python on your Ubuntu system.