Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Thursday, 29 Sep 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Download podcasts and sync music automatically with podget

Many so-called podcatchers have shown up to help users download podcasts on request. Most of them are great applications, but what do you do when you want all of your podcasts downloaded automatically and synced to your MP3 player?

Command line tips - checking a folder’s disk usage with du

Filed under
HowTos

Konqueror is one of my favourite file managers on any platform (add OS X’s Finder column view and it would be the best). Why? Well, amongs many other features, it has a view called File Size View, that allows you to see how much space folders and files are taking up visually, and makes it really easy to see what files need cleaning up and deleting.

Securing Apache Web Server from information leakage

Filed under
HowTos

By default, most pre-packaged apache installations come with full information leakage, so if you telnet to port 80 on your webserver you can check, just type in the GET / HTTP/1.1 line, then hit enter twice

KDE Commit Digest 51: Phonon, Decibel, and KsirK

Filed under
KDE
-s

Since our good friend liquidat is taking a vacation, on a business trip, or having a kidney removed, I thought I'd try to brief folks on the latest KDE commit digest.

Linux reloaded

Filed under
Linux

When Linux first made its way onto the radar in the mid-1990s, one of its most touted advantages was its ability to give ageing computers a new lease on life.

At the time many people found the newest versions of Microsoft Windows and Office demanded more power than their systems could deliver. Linux, on the other hand, could run on the smell of an oily rag.

Linux Gazette April 2007 (#137) Issue Online

Filed under
Linux

This month's Linux Gazette is up and ready to read.

Some of this months topics include:

* Cursor Appearance in the Linux Console, by Anonymous
* Getting Started with Linux Mint, by Shane Lazar
* Measuring Congestion Windows of TCP Senders, by René Pfeiffer

How to find files in a remote Windows network from Linux

Filed under
HowTos

Scanning a network remotely is not always an easy task. It is even more difficult when different operating systems are involved. Here's how you can scan an entire tcp/ip range of Windows computers from a Kubuntu Linux box. This is very basic and serves as an example but it is usefull for learning which computers have mp3's or pr0n when they shouldn't have.

Oracle Linux adopters labelled 'idiots'

Filed under
Linux

One of the first converts to Oracle's support for Linux has revealed the public backlash it has endured since their decision to drop Red Hat.

Melbourne company Opes Prime Stockbroking told ZDNet Australia that in the weeks following its announcement to adopt Oracle Linux, upset Linux enthusiasts phoned, e-mailed and wrote about the company online to complain at the decision.

The Sorry State of WiFi Support with Feisty Beta

Filed under
Ubuntu

I have been keeping up with most of the reviews for the new beta release of Ubuntu Feisty with great interest. As a full-time user of Ubuntu Dapper and Edgy, I’m, to say the least, "comfortable" in all aspects of getting the most from my Linux experience.

Easily Convert .WMA to .MP3 in Linux

Filed under
HowTos

If, like me, you find that the majority of applications outside of the fuzzy, feel good realm of Windows do not inherently recognize .wma file format, then this script help you out.

Open up a file named wma2mp3 in your favorite editor, copy and paste the following code, then save. Don't forget to 'chmod +x wma2mp3' when you're finished so you can execute the script.

American Dental Association Sues FSF, Linux Foundation over FLOSS Acronym

Filed under
Legal

The American Dental Association announced Friday that they are suing both the Free Software Foundation and the Linux Foundation over the use of the acronym FLOSS.

PCLinuxOS Magazine April 2007 Issue 8 Released!

Filed under
PCLOS

It is my privilege to announce on behalf of the team members of the PCLinuxOS Magazine Project sponsored by MyPCLinuxOS.com, the April 2007 issue (#8) is available for download!

Some highlights include:

1. KDE User's Guide
2. What is ROOT?
3. A Letter to My Windows Friends
4. Free as in Free Beer
5. Creating a Favorite Applications Menu
6. As always, much more

Review: Bayanihan Linux 4

Filed under
Linux
Reviews

This Filipino-based Linux distribution, initiated by the Open Source Group in the Philippines’ Advanced Science and Technology Institute in October 2001, hasn’t received a lot of press (in the US, at least). I just first heard of it via DistroWatch announcing their latest release. Curious, I checked out the distribution’s website, which looked very nice.

Oracle yet to tip Red Hat

Filed under
Linux

Oracle is yet to provide evidence Australian customers are switching to its Red Hat Linux support program despite announcing new business deals for the last quarter.

Get This About Open Source

Filed under
OSS

You like packaged apps because they're standard, but is standard performance what your company is gunning for?

Mandriva 2007.1: KDE vs. Gnome

Filed under
MDV

Mandriva 2007.1 RC3 is out since this weekend, so we are really near the final release now. After all the Gnome testing I did for Mandriva 2007.1, I thought it was time to do some ultimate testing with KDE. Actually, I'm very deceived: where Mandriva 2007.1 is very polished, the default KDE install is terrible. Really, not just bad, but plain terrible. Here's an overview.

Feisty Openbox on 1Ghz Pentium III, start to finish

Filed under
HowTos

This post is one part memo to self, one part demonstration of how I put together a very lightweight Feisty system using Openbox on a Dell Inspiron 1Ghz Pentium III laptop with 512Mb of PC133, two 60Gb 7200rpm hard drives and an Intel 2200BG wireless card.

ThinkGeek offers new selections in product line

Filed under
Misc

Does playing with your Wii make you tired? Do you long for the nostalgic 8-bit clothing days? Get a whole new meaning from snooze you lose. The Lonely Guy Dream Vacation Digital Photo Frame is the next best thing to actually going.

New products include:

* The ThinkGeek WiiHelm
* SnuzNLuz - Wifi Donation Alarm Clock
* Piranhaz - R/C Battle Fish

Non-Destructive Partitioning with GParted

Filed under
HowTos

What is partitioning and why would you want to repartition?

MS Stops Development for Mac

Filed under
Microsoft

MS has confirmed all development for MAC platform has stopped. Company spokesperson pointed out that the market share for MAC is no longer viable, and that resources would better be spent porting the products to Linux platform.

"The numbers don't lie, Linux's market share is 4 times Macs, and with the deal with Novell, we need to strike while the iron is Hot".

Syndicate content

More in Tux Machines

LibreOffice Office Suite Celebrates 6 Years of Activity with LibreOffice 5.2.2

Today, September 29, 2016, Italo Vignoli from The Document Foundation informs Softpedia via an email announcement about the general availability of the first point release of the LibreOffice 5.2 open-source and cross-platform office suite. On September 28, the LibreOffice project celebrated its 6th anniversary, and what better way to celebrate than to push a new update of the popular open source and cross-platform office suite used by millions of computer users worldwide. Therefore, we would like to inform our readers about the general availability of LibreOffice 5.2.2, which comes just three weeks after the release of LibreOffice 5.2.1. "Just one day after the project 6th anniversary, The Document Foundation (TDF) announces the availability of LibreOffice 5.2.2, the second minor release of the LibreOffice 5.2 family," says Italo Vignoli. "LibreOffice 5.2.2, targeted at technology enthusiasts, early adopters and power users, provides a number of fixes over the major release announced in August." Read more

OSS Leftovers

  • But is it safe? Uncork a bottle of vintage open-source FUD
    Most of the open source questioners come from larger organisations. Banks very rarely pop up here, and governments have long been hip to using open source. Both have ancient, proprietary systems in place here and there that are finally crumbling to dust and need replacing fast. Their concerns are more oft around risk management and picking the right projects. It’s usually organisations whose business is dealing with actual three dimensional objects that ask about open source. Manufacturing, industrials, oil and gas, mining, and others who have typically looked at IT as, at best, a helper for their business rather than a core product enabler. These industries are witnessing the lighting fast injection of software into their products - that whole “Internet of Things” jag we keep hearing about. Companies here are being forced to look at both using open source in their products and shipping open source as part of their business. The technical and pricing requirements for IoT scale software is a perfect fit for open source, especially that pricing bit. On the other end - peddling open source themselves - companies that are looking to build and sell software-driven “platforms” are finding that partners and developers are not so keen to join closed source ecosystems. These two pulls create some weird clunking in the heads of management at these companies who aren’t used to working with a sandles and rainbow frame of mind. They have a scepticism born of their inexperience with open source. Let’s address some of their trepidation.
  • Real business innovation begins with open practices
    To business leaders, "open source" often sounds too altruistic—and altruism is in short supply on the average balance sheet. But using and contributing to open source makes hard-nosed business sense, particularly as a way of increasing innovation. Today's firms all face increased competition and dynamic markets. Yesterday's big bang can easily become today's cautionary tale. Strategically, the only viable response to this disruption is constantly striving to serve customers better through sustained and continuous innovation. But delivering innovation is hard; the key is to embrace open and collaborative innovation across organizational walls—open innovation. Open source communities' values and practices generate open innovation, and working in open source is a practical, pragmatic way of delivering innovation. To avoid the all-too-real risk of buzzword bingo we can consider two definitions of "innovation": creating value (that serves customer needs) to sell for a profit; or reducing what a firm pays for services.
  • This Week In Servo 79
    In the last week, we landed 96 PRs in the Servo organization’s repositories. Promise support has arrived in Servo, thanks to hard work by jdm, dati91, and mmatyas! This does not fully implement microtasks, but unblocks the uses of Promises in many places (e.g., the WebBluetooth test suite). Emilio rewrote the bindings generation code for rust-bindgen, dramatically improving the flow of the code and output generated when producing Rust bindings for C and C++ code. The TPAC WebBluetooth standards meeting talked a bit about the great progress by the team at the University of Szeged in the context of Servo.
  • Servo Web Engine Now Supports Promises, Continues Churning Along
    It's been nearly two months since last writing about Mozilla's Servo web layout engine (in early August, back when WebRender2 landed) but development has kept up and they continue enabling more features for this next-generation alternative to Gecko. The latest is that Servo now supports JavaScript promises. If you are unfamiliar with the promise support, see this guide. The latest Servo code has improvements around its Rust binding generator for C and C++ code plus other changes.
  • Riak TS for time series analysis at scale
    Until recently, doing time series analysis at scale was expensive and almost exclusively the domain of large enterprises. What made time series a hard and expensive problem to tackle? Until the advent of the NoSQL database, scaling up to meet increasing velocity and volumes of data generally meant scaling hardware vertically by adding CPUs, memory, or additional hard drives. When combined with database licensing models that charged per processor core, the cost of scaling was simply out of reach for most. Fortunately, the open source community is democratising large scale data analysis rapidly, and I am lucky enough to work at a company making contributions in this space. In my talk at All Things Open this year, I'll introduce Riak TS, a key-value database optimized to store and retrieve time series data for massive data sets, and demonstrate how to use it in conjunction with three other open source tools—Python, Pandas, and Jupyter—to build a completely open source time series analysis platform. And it doesn't take all that long.
  • Free Software Directory meeting recap for September 23rd, 2016

Security News

  • security things in Linux v4.5
  • Time to Kill Security Questions—or Answer Them With Lies
    The notion of using robust, random passwords has become all but mainstream—by now anyone with an inkling of security sense knows that “password1” and “1234567” aren’t doing them any favors. But even as password security improves, there’s something even more problematic that underlies them: security questions. Last week Yahoo revealed that it had been massively hacked, with at least 500 million of its users’ data compromised by state sponsored intruders. And included in the company’s list of breached data weren’t just the usual hashed passwords and email addresses, but the security questions and answers that victims had chosen as a backup means of resetting their passwords—supposedly secret information like your favorite place to vacation or the street you grew up on. Yahoo’s data debacle highlights how those innocuous-seeming questions remain a weak link in our online authentication systems. Ask the security community about security questions, and they’ll tell you that they should be abolished—and that until they are, you should never answer them honestly. From their dangerous guessability to the difficulty of changing them after a major breach like Yahoo’s, security questions have proven to be deeply inadequate as contingency mechanisms for passwords. They’re meant to be a reliable last-ditch recovery feature: Even if you forget a complicated password, the thinking goes, you won’t forget your mother’s maiden name or the city you were born in. But by relying on factual data that was never meant to be kept secret in the first place—web and social media searches can often reveal where someone grew up or what the make of their first car was—the approach puts accounts at risk. And since your first pet’s name never changes, your answers to security questions can be instantly compromised across many digital services if they are revealed through digital snooping or a data breach.
  • LibreSSL and the latest OpenSSL security advisory
    Just a quick note that LibreSSL is not impacted by either of the issues mentioned in the latest OpenSSL security advisory - both of the issues exist in code that was added to OpenSSL in the last release, which is not present in LibreSSL.
  • Record-breaking DDoS reportedly delivered by >145k hacked cameras
    Last week, security news site KrebsOnSecurity went dark for more than 24 hours following what was believed to be a record 620 gigabit-per-second denial of service attack brought on by an ensemble of routers, security cameras, or other so-called Internet of Things devices. Now, there's word of a similar attack on a French Web host that peaked at a staggering 1.1 terabits per second, more than 60 percent bigger. The attacks were first reported on September 19 by Octave Klaba, the founder and CTO of OVH. The first one reached 1.1 Tbps while a follow-on was 901 Gbps. Then, last Friday, he reported more attacks that were in the same almost incomprehensible range. He said the distributed denial-of-service (DDoS) attacks were delivered through a collection of hacked Internet-connected cameras and digital video recorders. With each one having the ability to bombard targets with 1 Mbps to 30 Mbps, he estimated the botnet had a capacity of 1.5 Tbps. On Monday, Klaba reported that more than 6,800 new cameras had joined the botnet and said further that over the previous 48 hours the hosting service was subjected to dozens of attacks, some ranging from 100 Gbps to 800 Gbps. On Wednesday, he said more than 15,000 new devices had participated in attacks over the past 48 hours.

Android Leftovers