Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Sunday, 30 Aug 15 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Security Leftovers Roy Schestowitz 29/08/2015 - 11:46am
Story Hortonworks and NSA Roy Schestowitz 29/08/2015 - 10:01am
Story Xtreme Download Manager (XDM) 2015 Released, Amazing Development By Team, Install/Upgrade XDM 2015 In Ubuntu Linux Or Derivatives Mohd Sohail 29/08/2015 - 9:34am
Story 5 Open Source Data Backup Options for Small Business Rianne Schestowitz 29/08/2015 - 7:54am
Story Red Hat and Fedora Rianne Schestowitz 28/08/2015 - 8:50pm
Story Android Leftovers Rianne Schestowitz 28/08/2015 - 8:32pm
Story NetworkManager 1.0.6 brings metered connections API and more Rianne Schestowitz 28/08/2015 - 8:05pm
Story Wayland in Fedora 23 Linux Allows for Use of Multiple Monitors with Different DPIs Rianne Schestowitz 28/08/2015 - 7:17pm
Story GNOME Developers Discuss Codenames, GNOME 3.18 Might be Dubbed "Gothenburg" Rianne Schestowitz 28/08/2015 - 7:13pm
Story Developer lowers Drupal's barrier to entry Rianne Schestowitz 28/08/2015 - 7:10pm

LibreOffice 5.0.1 Turns a Great Release into an Excellent One

Filed under

The Document Foundation has just revealed that LibreOffice 5.0.1 has been released, making this the first maintenance version for the new generation of the famous office suite.

Read more

Ubuntu: Wily Werewolf Beta 1 Released

Filed under

The first beta of the Wily Werewolf (to become 15.10) has now been

This beta features images for Kubuntu, Lubuntu, Ubuntu GNOME,
Ubuntu Kylin, Ubuntu MATE, Xubuntu and the Ubuntu Cloud images.

Pre-releases of the Wily Werewolf are *not* encouraged for anyone
needing a stable system or anyone who is not comfortable running
into occasional, even frequent breakage. They are, however,
recommended for Ubuntu flavor developers and those who want to
help in testing, reporting and fixing bugs as we work towards getting
this release ready.

Read more

Ubuntu Touch Users Can Technically Dial a Number from Terminal

Filed under

Ubuntu Touch is actually a Linux distribution and it's easy to forget that sometimes. This means that most of the stuff you can do in the OS can be done from the terminal, including dialing a number, for example.

Read more

5 open source alternatives to Trello

Filed under

But most kanban board tools are multi-purpose, and you can also use them to track next actions, someday/maybe lists, or even just what groceries you need to pick up. The killer feature of almost all of them is the ability to share your boards with a team, allowing group collaboration and keeping everyone on the same page. When looking for an open source tool to fit my needs, I came across five great options and wanted to share a little bit from my experience with each.

Read more

4MParted 13.1 Beta Is a Cool Small OS Based on GParted

Filed under

4MParted, a Linux distribution based on the 4MLinux and GParted, is now at version 13.1 Beta and is ready for download and testing.

Read more

Unity 8 Shows Off Task Switcher and Multiple Desktops - Video

Filed under

We've recently written how Canonical is making Unity 8 act and looks like a proper Linux desktop, and developers have been quick to show us the progress.

Read more

today's leftovers

Filed under

Leftovers: Kernel

Filed under

Leftovers: Software

Filed under

Leftovers: Gaming

Filed under

Red Hat and Fedora

Filed under
Red Hat

Red Hat


Leftovers: Debian and Derivatives

Filed under


Filed under

Leftovers: OSS

Filed under

FOSS Events

  • Linux Plumbers Conference 2015

    Linux Plumbers 2015 finished up last Friday. Another great conference. The focus of Plumbers is supposed to be more problem solving/discussion and less talking/lecturing. To really get the most out of Plumbers, you need to be an active participant and asking questions or giving input. Plumbers was co-located with the group of conferences now run by the Linux Foundation. The fist day of Plumbers overlapped with the last day of Linux Con. This day was as bit more lecture focused like a regular conference. Even if Plumbers is typically a discussion conference, the talks I went to were all great.

  • Speakers and Agenda announced for Tizen Developer Conference 2015 Shenzhen

    The Tizen Developer Conference 2015 has been moved this year from San Francisco to Shenzhen, China, from September 17 to 18. This is the annual event that brings together open source and app developers who are interested in contributing to the growth of the Tizen ecosystem worldwide.

  • First Round of systemd.conf 2015 Sponsors

    We are happy to announce the first round of systemd.conf 2015 sponsors!

Rust and Mozilla

Filed under
  • SIMD in Rust

    For the last two months, I’ve been interning at Mozilla Research, working on improving the state of SIMD parallelism in Rust: exposing more CPU instructions in the compiler, and an in-progress library that provides a mostly-safe but low-level interface to that core functionality.

  • Rust Gains Greater SIMD Support

    A new SIMD scheme is now available in the latest nightly versions of the Rust programming language.

    Mozilla Research has been working on improving SIMD (Single Instruction Multiple Data) parallelism in Rust that's simple to use.

  • Mozilla CEO threatens to fire person responsible for anonymous hate speech on Reddit

    An anonymous person complaining about "social justice bullies" at Mozilla will be fired if the person is discovered to be an employee, the company's CEO said today. Speaking at Mozilla's weekly public meeting, Mozilla CEO Chris Beard said Reddit user aioyama had "crossed the line" in a series of postings about women at the company, including recently departed community organizer Christie Koehler. In a series of tweets earlier this month, Koehler complained about Mozilla's lack of diversity in the workplace and its failure to address accessibility issues.

Security Leftovers

Filed under
  • Tuesday's security updates
  • Security updates for Wednesday
  • Court rules FTC can prosecute companies over lax online security

    The Third Circuit US Court of Appeals in Philadelphia has ruled that the Federal Trade Commission does have the right to prosecute firms who mishandle their customers' data.

    Between 2008 and 2009, hotel chain Wyndham Worldwide – which runs hotels under the Days Inn, Howard Johnson, Ramada, Super 8, and Travelodge brands – suffered three computer intrusions. The hackers stole the personal information and credit card numbers of over 619,000 customers, causing at least $10.6m in thefts.

  • The Basic Principles of Security (and Why They Matter)

    Yet, despite the frequent complaints about the unrealistic demands of security, today the problem is just as likely to be the insistence on convenience. With the rise of desktop Linux and the popularity of Android, the pressure to be as easy to use as Windows is almost irresistible. As a result, there is no question that the average distribution is less secure than those of a decade ago. That is the price we pay for automounting external devices and giving new users automatic access to printers and scanners — and will continue to pay.

  • GitHub combats DDoS cyberattack

    At the time, the code repository said the cyberattack involved "a wide combination of attack vectors," as well as new techniques including the hijacking of unsuspecting user traffic to flood GitHub, killing the service.

  • Jails – High value but shitty Virtualization

    Virtualization is nothing new, and depending how fundamentalist you define “virtualized environment” one can point to the earliest of timesharing systems as the origin.

    IBM’s mainframe hardware, the 360 machine series, introduced hardware virtualization, so that it was possible to run several of IBMs different and incompatible operating systems on the same computer at the same time.

    It’s more than a little bit ironic that a platform which have lasted 50 years now, were beset by backwards-compatibility issues almost from the start, and even more so that IBMs patents on this area of technology prevented anybody else from repeating their mistake for that long.

    Everybody else did software virtualization.

  • How to crack Ubuntu encryption and passwords

    During Positive Hack Days V, I made a fast track presentation about eCryptfs and password cracking. The idea came to me after using one feature of Ubuntu which consists in encrypting the home folder directory. This option can be selected during installation or activated later.

  • AT&T Hotspots: Now with Advertising Injection

    While traveling through Dulles Airport last week, I noticed an Internet oddity. The nearby AT&T hotspot was fairly fast—that was a pleasant surprise.

    But the web had sprouted ads. Lots of them, in places they didn’t belong.

  • Advertising malware rates have tripled in the last year, according to report

    Ad networks have been hit with a string of compromises in recent months, and according to a new report, many of the infections are making it through to consumers. A study published today by Cyphort found that instances of malware served by ad networks more than tripled between June 2014 and February 2015, based on monthly samples taken during the period. Dubbed "malvertising," the attacks typically sneaking malicious ads onto far-reaching ad networks. The networks deliver those malware-seeded ads to popular websites, which pass them along to a portion of the visitors to the site. The attacks typically infect computers by exploiting vulnerabilities in Adobe Flash, typically triggered as soon as an ad is successfully loaded.

  • How security flaws work: the buffer overflow

    The most important central concept is the memory address. Every individual byte of memory has a corresponding numeric address. When the processor loads and stores data from main memory (RAM), it uses the memory address of the location it wants to read and write from. System memory isn't just used for data; it's also used for the executable code that makes up our software. This means that every function of a running program also has an address.

  • Lessons learned from cracking 4,000 Ashley Madison passwords

    When hackers released password data for more than 36 million Ashley Madison accounts last week, big-league cracking expert Jeremi Gosney didn't bother running them through one of his massive computer clusters built for the sole purpose of password cracking. The reason: the passwords were protected by bcrypt, a cryptographic hashing algorithm so strong Gosney estimated it would take years using a highly specialized computer cluster just to check the dump for the top 10,000 most commonly used passwords.

More on Munich, Linux Coming Out

Filed under

Last week's news of Munich considering a switch back to Windows has been clarified or rebuked today. Reports from DebConf15 refute the claims from certain city councillors complaining about the Ubuntu-based Linux. Nick Heath and Robert Pogson weigh in. Jack M. Germain chimed in today on his look at the life and times of Linux saying, "In honor of Linux's two dozen years of giving, LinuxInsider brings some gifts of praise to the party." Elsewhere, Red Hat was included in Forbes' Most Innovative Companies roundup this year.

Read more

GNOME Video Arcade Gets a Major Release with Compatibility for Latest MAME and GTK3

Filed under

The GNOME Video Arcade software, an open-source app that acts as a front-end to the well-known and cross-platform MAME (Multiple Arcade Machine Emulator) emulator, has been updated to version 0.8.4.

Read more

Syndicate content