Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Monday, 31 Aug 15 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Things To Fix / Tweak After Installing Ubuntu 9.10 Karmic Koala hotice 31/10/2009 - 12:59pm
Story Syntensity: New FOSS Platform for 3D Games srlinuxx 31/10/2009 - 10:15am
Story full circle mag issue 30 srlinuxx 31/10/2009 - 10:12am
Story today's leftovers: srlinuxx 31/10/2009 - 12:01am
Story some howtos: srlinuxx 30/10/2009 - 11:49pm
Story First GNOME 3.0 Development Release Available srlinuxx 30/10/2009 - 8:35pm
Story DebConf10 Debian Conference Set for August in NYC srlinuxx 30/10/2009 - 8:34pm
Story Can DOD's stance on open source change the status quo? srlinuxx 30/10/2009 - 8:32pm
Story Machinarium Patch 01 srlinuxx 1 30/10/2009 - 6:58pm
Story Linux-Kongress 2009 Tuning Gathering srlinuxx 30/10/2009 - 6:32pm

UK games industry 'needs support'

Filed under
Gaming

More software and games are being sold overseas than are imported, a good sign for the economy, said the report. It shows the interactive entertainment industry is doing financially better than film and television industries. The rising cost of making games has meant many studios have closed however, sending talent overseas.

A Peak at MDK 10.2-b2 AMD64

Filed under
Reviews
Submitted by Anonymous

Anonymous writes, "It took about 10-12 minutes to install. I selected the default installation. You need all 3 cd's if you are doing the default install though it appears to only need 3-4 packages from the 3rd cd.

Boot up speed was about the same as the x86 version. The noticable difference came after logging into the desktop. This is where you begin to notice the speed difference from accessing the menus to launching applications.

After cable recall, Xbox's still frying

Filed under
Microsoft

14 million games console owners are still at risk of waking up to find their Xbox has become an ex-box. For when Microsoft issued a safety advisory for Xbox customers last month, it failed to address the underlying problem.

Amazon tightens rules for sellers

Filed under
Web
Fraud by third-party merchants could hurt brand integrity, some experts say

John Wocher bought the camera of his dreams from a seller on Amazon.com with nary a second thought, gleefully anticipating its arrival after wiring $4,549 to zShop merchant awesomediscount.com in January.

As February approached, Wocher stepped up the frequency of his e-mails with the seller, asking for the UPS tracking number, his concern growing after he had so amicably arranged the wire transfer from his home in Japan.

Schoolyard bullies get nastier online

Filed under
Web

When Joanne had a row with a longtime friend last year, she had no idea it would spill into cyberspace.

But what started as a spat at a teenage sleepover swiftly escalated into a three-month harangue of threatening e-mails and defacement of her Web log. "It was a nonstop nightmare," says Joanne, 14, a freshman at a private high school in Southern California. "I dreaded going on my computer."

US Advisory panel recommends more federal R&D spending

Filed under
Security

The Presidential IT Advisory Committee (PITAC) has recommended the federal government sharply increase its spending on cybersecurity R&D and shift the focus to fundamental, long-term solutions to security challenges.

"The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects," PITAC warned in a letter submitting the report, titled Cyber Security: A Crisis in Prioritization, to the president. "These vulnerabilities put the nation's entire critical infrastructure at risk."

Game bill picks up steam in Illinois

Filed under
Gaming

A bill introduced into the Illinois State House last December would supersede current ESRB ratings when it comes to video games with "violent and sexually explicit" content. The focus would be on isolating games deemed to have content not suitable for those under the age of 18 and would also attach a fine to retailers who violate the restriction on sales of those games.

$5m daily fine beckons for bad boy Microsoft

Filed under
Microsoft
Legal

Although the European Commission's statements are diplomatic to the point of opacity, there's no mistaking what it thinks of the latest turn in the Microsoft antitrust saga. The Commission doesn't think Microsoft's trying hard enough, and it has canvassed widespread industry support to bolster its position. From a Microsoft document unearthed by ZDNet, and still available here [PDF 450kb], we can see why even long time Redmond partners are losing their patience.

n/a

Gentoo 2005.0 Now Shipping!

Filed under
Gentoo

Gentoo Linux 2005.0 for x86 is now complete, and we will begin fulfilling x86 pre-orders today! AMD64 and PowerPC should start shipping very shortly as well.

Please note that 2005.0 is not yet available for download on Gentoo mirrors -- the Store is getting 2005.0 a week in advance of it appearing on various Gentoo mirrors worldwide. This is a good thing, as it will give us several days to catch up on Store pre-orders.

The strange decline of computer worms

Filed under
Security

Although windows-centric, theregister has published an article on the lessening numbers of "Slammer-style worms". They attribute this decline to "the widespread use of XP SP2 and greater use of personal firewall" rendering "worms far less potent in the same way that boot sector viruses died out with Windows 95 and the introduction of Office 2000 made macro viruses far less common."

Linux Kernel Multiple Vulnerabilities

Filed under
Security

secunia.com has published "some vulnerabilities have been reported in the Linux kernel. One has an unknown impact, and the others can be exploited to cause a DoS (Denial of Service) and potentially compromise a vulnerable system."

Are you now, or have you ever been…a journalist?

Filed under
Legal

In response to that judge's decision in a Santa Clara County Superior Court to force the producers of the Mac blogs to reveal their sources in that apple law suite, theinquirer has quoted a very interesing article from Wendy M. Grossman on the subject of journalists and their rights to protect sources as it applies to bloggers. She cites many professionally paid and respected journalists publish blogs to the net everyday and asks are those not consider real news? The underlying premise...

Open Source Movie by TheWeblogProject

Filed under
Movies
OSS

TheWeblogProject premieres a revolutionary and innovative way to movie production, and one which according to its creators, may seriously start to challenge Hollywood in the near future.

TheWeblogProject is in fact the first grassroots film that will be freely distributed, via the Internet and via those very P2P networks seen today as the major threats to Hollywood own sustainability.

TheWeblogProject is the first movie in which everyone can actively participate by sending in video clips.

unix motorcycle

Filed under
Linux
Sci/Tech

"some of you are probably rubbing your eyes, but you read it correctly. unix on a motorcycle.

a fellow by the name of ben installed a freebsd powered pc into his kawasaki z1000. a webcam on his helmet connects to a video capture board in the pc, which he uses to record movies of trips to the burrito store. his future plans are to have the freebsd box control his ipod, track gps data, and potentially interconnect with the bike’s ecu."

Story and links on hackaday.

Police smash child porn ring with raids across 12 countries

Filed under
Web
Legal

An article on theinquirer leads to a report detailing the arrest of "hundreds of people across two continents [...] in a Spanish-led operation to break a child pornography ring operating via the internet."

Have hackers recruited your PC?

Filed under
Security

BBC news has posted an article relating a study "by security researchers who have spent months tracking more than 100 networks of remotely-controlled machines. They discovered 'bot nets [were]used to launch 226 distributed denial-of-service attacks on 99 separate targets.'"

KDE 3.4 offers improved accessibility

Filed under
KDE

zdnet has a nice little article covering KDE 3.4 accessibility features. They say, "An improved colour scheme and a tool that reads out text should make KDE Linux desktop more usable for those whose vision is impaired."

"It's a huge improvement in accessibility," said Matthias Dalheimer, a KDE developer. "There is a new screen reading technology for visually impaired people and a much better colour scheme with icons that have a high contrast."

KDE DCop DoS Vulnerability prior to 3.4

Filed under
KDE
Security

Sebastian Krahmer has reported a vulnerability in KDE, which can be exploited by malicious, local users to cause a DoS (Denial of Service).

The vulnerability is caused due to an error in the authentication process in the DCOP (Desktop Communication Protocol) daemon dcopserver. This can be exploited to lock the dcopserver for arbitrary local users. Successful exploitation may result in decreased desktop functionality for the affected user.

The vulnerability has been reported in versions prior to 3.4.

Solution: Upgrade to KDE 3.4 or apply patch.

Click for more information and links to patches.

Original information on dot.kde.org.

US cyber-security 'nearly failing'

Filed under
Security

Cyber-security in the US is "nearly failing" and has been given a "must try harder" D+ rating by the Federal government.

The US Office of Management and Budget set forth cyber-security standards in the Federal Security Management Act 2002, encouraging federal agencies to tighten their IT systems.

Syndicate content