Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 30 Aug 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Linus Torvalds and Others on Community Burnout srlinuxx 30/08/2011 - 5:13pm
Story Kernel Log: X Server 1.11, new kernel maintenance strategy srlinuxx 30/08/2011 - 5:11pm
Story Linux Foundation chief srlinuxx 30/08/2011 - 5:06pm
Story The Perfect Server - CentOS 6.0 x86_64 [ISPConfig 2] falko 30/08/2011 - 7:35am
Story today's leftovers: srlinuxx 30/08/2011 - 7:14am
Story some howtos: srlinuxx 30/08/2011 - 7:06am
Story Mandriva Desktop 2011 in round figures srlinuxx 30/08/2011 - 5:48am
Story New Distribution: Dream Studio Introduced srlinuxx 30/08/2011 - 5:46am
Story Is This Ubuntu 11.10′s Default Wallpaper? srlinuxx 30/08/2011 - 2:27am
Story Important GNOME Shell, Mutter Updates srlinuxx 30/08/2011 - 2:24am

Trip the Light Fantastic - Linux in the Special Effects Industry

Filed under
Linux

In early 1998, Linux users began to be aware that their operating system of choice was making a serious impact in the field of movie production. Daryll Strauss had written an article for the Linux Journal, in which he described how Digital Domain had rendered scenes for the box-office busting Titanic on a farm of Linux boxes.

Why MS Office 2007 is both a good and bad thing for OpenOffice.org

Filed under
OOo

OpenOffice.org (OOo) is, of course, the free software world’s complete office suite.

Overview: Archive tools for linux

Filed under
HowTos

There are various archive file format exist, such as .tar.gz, .tgz, .tar.bz2, .gz, .bz2, .zip, .rar, .7z. The common questions regarding archives are “how to extract files from tar.gz?”, “how to create rar in Linux?” etc.

Therefore this overview aims to covers simple examples of archive tool usage for the common format such as: tar, gzip, gunzip, bzip2, bunzip2, zip, unzip, rar, 7z.

Student starts Firefox campaign on campus

Filed under
Moz/FF

When students use on-campus computers, they have various browsers they can use, including Internet Explorer and Safari.

If one Appalachian State University student has his way, all students would only use Mozilla Firefox.

When students use on-campus computers, they have various browsers they can use, including Internet Explorer and Safari.

VLC Media Player

Filed under
Reviews

For many, if not most, Windows users the world of media players begins and ends with Windows Media Player. Despite the ever increasing encroachment of digital rights management (DRM) and the bloat that is added to every release Windows Media Player is still the default media player for many users.

Safari Drops, Firefox Gains in March

Filed under
Moz/FF

Safari's Web browser marketshare dipped slightly in March while Firefox showed a gain. Microsoft's Internet Explorer continues the downward slide it started a year ago, according to data from Market Share.

Firefox moved from its previous all time high 14.18 percent in February up to a 15.01 percent marketshare March while maintaining its second place position.

The Visual History of Fedora

Filed under
Linux

With the release of Ubuntu 7.04 Feisty Fawn happening in just a matter of days, last month at Phoronix we had presented The Visual History of Ubuntu. In that article we went back and looked at all Ubuntu releases to date to see how it has evolved over time both when it comes to the interface as well as the changes that had made up each release.

Why I love- and hate- Mandriva

Filed under
MDV

Remember Mandriva? I did a review on it a while back, saying that it was best suited for newbies with well-paid administrators. Well, here's what I overlooked:

The problem with Linux is, there are no games

Filed under
Gaming

Linux will never take over the desktop market because it doesn’t have enough games. People might use Linux for normal day-to-day tasks, but not for gaming.

Sure, there are some Linux games, but nothing good. It’s like, maybe Pong with console graphics and stuff.

Or that awful interface — what’s that called? GTK or something? And every game needs a CS degree to install.

“Linux” is Free(dom)

Filed under
Linux

Linux is “Free” in two senses. In one sense, the Linux consumer is free to modify the system and do anything he or she wishes with it. In another sense, acquiring Linux does not necessarily require any cash outlay at all.

FoxieWire: Digg-Like Site for Mozilla News

Filed under
Moz/FF

SpreadFirefox has announced a new Digg-like site specifically for Mozilla news. The site is called FoxieWire and uses the Pligg software as the foundation to handle the user voting. Here is what SpreadFirefox had to say about the launch:

Try this workaround for time-out issues in kernel 2.6.17 and higher

Filed under
HowTos

Because of a recent change in TCP window scale settings in Linux 2.6.17 kernel and higher, you may have had some problems connecting to certain Web sites. In this tip, I'll show you a workaround for the time-out problem, but first, let me give you the background on this issue.

What if Linux Distros were Women?

Filed under
Humor

I've used quite a few linux distros in my time. Recently it occurred to me what they would look like if they were beautiful, attractive women. I think perhaps I've spent too much time on the computer, eh? Anyway, I've made a list. Tell me what you think!

If Linux Distros were women:

Redhat:

GNUMP3d: A small, portable, MP3/OGG streaming server

Filed under
Software

Suppose you want to let a friend thousands of miles away listen to a song from your computer. Perhaps you just want to open up the music library on your computer to a select few while you're on another client on your local area network. Enabling file sharing might be overkill. Instead, you can use a streaming server such as GNUMP3d.

Listening to Ubuntu with Amarok

Filed under
Software

I had written in my engagement with Ubuntu that I had some key audio requirements and I wondered how they will fare. The first problem with Ubuntu is that the system throws audio players at you willy nilly so that it is hard to sift through them all.Some are simple, crude, with bells and whistles and others are without this all.

DVD Authoring with DVDStyler

Filed under
HowTos

Free software for mastering DVDs is starting to catch up with some of the commercial software in this genre. Command line tools have been available for some time, but GUI based tools have just started to become usable. One such GUI is DVDStyler.

Mandriva’s business model

Filed under
MDV

I am often asked about the Mandriva business model. So here is a quick summary of the key points:

1. we’re open source
2. we’re a product company
3. we’re publicly traded
4. we address both the consumer market and the corporate market
5. we address the consumer market through multiple channels
6. we have a network of partner/distributors

Pimp Your Kubuntu in 3 Easy Steps

Filed under
HowTos

Welcome to the Kubuntu desktop customization guide where you will learn how to bring your KDE desktop to life! In other words, how to get from:

My First Impressions Of Dolphin File Manager

Filed under
Software

Don’t panic if you love the endless flexibility of Konqueror - it isn’t going away in KDE 4, it just won’t be the default. Today I downloaded Dolphin and decided to give it a try, spent around 15 minutes and I can say that I am staying with Konqueror.

Linux login with a Windows box and XDMCP

Filed under
HowTos

There are many different ways to login to a Linux computer. Most of them are text based and other graphical ones are slow and create lots of network traffic. To the windows click and pointy types the text based login's are a real pain and the other graphical types are murder over a slow connection.

Syndicate content

More in Tux Machines

today's howtos

Leftovers: OSS

  • Report: If DOD Doesn't Embrace Open Source, It'll 'Be Left Behind'
    Unless the Defense Department and its military components levy increased importance on software development, they risk losing military technical superiority, according to a new report from the Center for a New American Security. In the report, the Washington, D.C.-based bipartisan think tank argues the Pentagon, which for years has relied heavily on proprietary software systems, “must actively embrace open source software” and buck the status quo. Currently, DOD uses open source software “infrequently and on an ad hoc basis,” unlike tech companies like Google, Amazon and Facebook that wouldn’t exist without open source software.
  • The Honey Trap of Copy/Pasting Open Source Code
    I couldn’t agree more with Bill Sourour’s article ‘Copy.Paste.Code?’ which says that copying and pasting code snippets from sources like Google and StackOverflow is fine as long as you understand how they work. However, the same logic can’t be applied to open source code. When I started open source coding at the tender age of fourteen, I was none the wiser to the pitfalls of copy/pasting open source code. I took it for granted that if a particular snippet performed my desired function, I could just insert it into my code, revelling in the fact that I'd just gotten one step closer to getting my software up and running. Yet, since then, through much trial and error, I’ve learned a thing or two about how to use open source code effectively.
  • Affordable, Open Source, 3D Printable CNC Machine is Now on Kickstarter
    The appeals of Kickstarter campaigns are many. There are the rewards for backers, frequently taking the form of either deep discounts on the final product or unusual items that can’t be found anywhere else. Pledging to support any crowdfunding campaign is a gamble, but it’s an exciting gamble; just browsing Kickstarter is pretty exciting, in fact, especially in the technological categories. Inventive individuals and startups offer new twists on machines like 3D printers and CNC machines – often for much less cost than others on the market.
  • Open Standards and Open Source
    Much has changed in the telecommunications industry in the years since Standards Development Organization (SDOs) such as 3GPP, ITU and OMA were formed. In the early days of telecom and the Internet, as fundamental technology was being invented, it was imperative for the growth of the new markets that standards were established prior to large-scale deployment of technology and related services. The process for development of these standards followed a traditional "waterfall" approach, which helped to harmonize (sometimes competing) pre-standard technical solutions to market needs.

Leftovers: BSD

  • The Voicemail Scammers Never Got Past Our OpenBSD Greylisting
    We usually don't see much of the scammy spam and malware. But that one time we went looking for them, we found a campaign where our OpenBSD greylisting setup was 100% effective in stopping the miscreants' messages. During August 23rd to August 24th 2016, a spam campaign was executed with what appears to have been a ransomware payload. I had not noticed anything particularly unusual about the bsdly.net and friends setup that morning, but then Xavier Mertens' post at isc.sans.edu Voice Message Notifications Deliver Ransomware caught my attention in the tweetstream, and I decided to have a look.
  • Why FreeBSD Doesn't Aim For OpenMP Support Out-Of-The-Box

Security Leftovers

  • FBI detects breaches against two state voter systems
    The Federal Bureau of Investigation has found breaches in Illinois and Arizona's voter registration databases and is urging states to increase computer security ahead of the Nov. 8 presidential election, according to a U.S. official familiar with the probe. The official, speaking on condition of anonymity, said on Monday that investigators were also seeking evidence of whether other states may have been targeted. The FBI warning in an Aug. 18 flash alert from the agency's Cyber Division did not identify the intruders or the two states targeted. Reuters obtained a copy of the document after Yahoo News first reported the story Monday.
  • Russians Hacked Two U.S. Voter Databases, Say Officials [Ed: blaming without evidence again]
    Two other officials said that U.S. intelligence agencies have not yet concluded that the Russian government is trying to do that, but they are worried about it.
  • FBI Says Foreign Hackers Got Into Election Computers
    We've written probably hundreds of stories on just what a dumb idea electronic voting systems are, highlighting how poorly implemented they are, and how easily hacked. And, yet, despite lots of security experts sounding the alarm over and over again, you still get election officials ridiculously declaring that their own systems are somehow hack proof. And now, along comes the FBI to alert people that it's discovered at least two state election computer systems have been hacked already, and both by foreign entities.
  • Researchers Reveal SDN Security Vulnerability, Propose Solution
    Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it. "It" is a new attack they call Know Your Enemy (KYE), through which the bad guys could potentially collect information about a network, such as security tool configuration data that could, for example, reveal attack detection thresholds for network security scanning tools. Or the collected information could be more general in nature, such as quality-of-service or network virtualization policies.
  • NV Gains Momentum for a Secure DMZ
    When it comes to making the shift to network virtualization (NV) and software-defined networking (SDN), one of the approaches gaining momentum is using virtualization technology to build a secure demilitarized zone (DMZ) in the data center. Historically, there have been two major drawbacks to deploying firewalls as a secure mechanism inside a data center. The first is the impact a physical hardware appliance has on application performance once another network hop gets introduced. The second is the complexity associated with managing the firewall rules. NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet associated with a specific application, but keeping track of what specific firewall rules are associated with a particular application becomes much simpler.