Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 28 Jun 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story What does Community really mean? (Part 2) srlinuxx 18/03/2011 - 5:38pm
Story Ubuntu: a complete guide srlinuxx 18/03/2011 - 5:36pm
Story Mozilla outlines 16-week Firefox development cycle srlinuxx 18/03/2011 - 5:35pm
Story openSUSE 11.4 review – KDE 4.6 and Tumbleweed shine srlinuxx 18/03/2011 - 5:33pm
Story How To Upgrade OpenSUSE 11.3 To 11.4 (Desktop & Server) falko 18/03/2011 - 12:26pm
Story today's leftovers: srlinuxx 18/03/2011 - 4:37am
Story some howtos: srlinuxx 18/03/2011 - 4:14am
Story Debian CUT, a new rolling release? srlinuxx 18/03/2011 - 2:57am
Story 7 Surprises From Turkey srlinuxx 18/03/2011 - 2:54am
Story Lessons Learned from Canonical, Banshee, and GNOME srlinuxx 18/03/2011 - 2:52am

Howto Bypass Ubuntu Login Screen

Filed under
Ubuntu
HowTos

I think many of you who has installed Ubuntu, must hava encountered a login screen before you actually can use the Ubuntu desktop. However there’s a way to enable automatic login to your desktop and completely bypass the login screen.

Open source start-ups speak out

Filed under
OSS

Entrepreneurs attending a recent forum in Germany showed how they plan to use clever open source products — commercially — to compete with proprietary software companies.

Vim Tips & Tricks

Filed under
HowTos

You can execute the vim command, while opening files with vim with option -c. While I wanna replace a string from a huge file, first I need to check whether I can do it with sed or not. That means my replace string must be unique, so that it won’t affect others line thatI might not want to replace.

Racoon Roadwarrior Configuration

Filed under
Linux
HowTos

Racoon Roadwarrior is a client that uses unknown, dynamically assigned IP addresses to connect to a VPN gateway (in this case also firewall). This is one of the most interesting and today most needed scenarios in business environment. This tutorial shows how to configure Racoon Roadwarrior.

http://www.howtoforge.com/racoon_roadwarrior_vpn

Authenticating on the network

Filed under
HowTos

Usually, I get annoyed at having to authenticate myself to each and every service I set up; after all, my passwords are the same everywhere, since I make sure of that myself. On Windows, I wouldn’t have to do that; once I log in, Windows is able to communicate credentials to each and every service that asks for them. But something similar is impossible on GNU/Linux, right? Wrong.

GNOME Interface for YUM: 0.1.5

Filed under
Software

This is the first time for me to hear about gnome-yum, the GNOME interface for YUM, by András Tóth. Version 0.1.5 was just released on Nov. 16, and it doesn't bring much of a change over the older 0.1.2.

Thieves steal thousands from Portland non-profit

Filed under
Misc

Thieves broke into a non-profit that builds computers for people who can't afford them, stealing about $4,500 worth of hardware early Saturday. "Keep an eye out for laptops for sale in Portland loaded with Ubuntu Linux: if you see one of these, please call us! "

how to check the CPU and mem usage of current running process?

Filed under
HowTos

We may curious some times why our computer running so slow, and we suspect that must be some programs (process) is running and uses a lots of CPU. We wanna know which process is it, and we have top. But some how top is not so interactive, where there is another program call htop.

Adventures in a New Ubuntu 6.10 Install: Day 5

Filed under
Ubuntu

Since my last post in this series, I’ve been busy customizing the look and feel of Ubuntu, which I find is the funnest part of using Ubuntu! There are so many options and themes and icons and window borders and wallpapers…

PCLinuxOS - perfect halfway house

Filed under
PCLOS
Reviews

It's been quite the dilemma over recent months as to which Linux distro is the best choice for users moving away from XP (or "windoze" as it's affectionately labelled by some in the community). Instinctively the majority of users looked to Ubuntu and the user-friendliness of the gnome environment but it was brought to my attention that there's another major player in this exchange, a plucky little distro called PCLinuxOS, and here are my thoughts on it.

Mandriva Free 2007 - the FOSSwire review

Filed under
MDV
Reviews

I’m going to take a look at the popular Linux distribution Mandriva; more specifically, their latest free-of-charge desktop outing Mandriva Free 2007.

Using Unbuntu Christian Edition - a Review

Filed under
Reviews
Ubuntu

The last time I saw this distribution discussed it degenerated quickly into a flame war that had nothing to do with the merits of the distribution. Recently I saw that there was an update to the distribution. I had a bit of time so I thought I would take it for a spin and see what it was actually like. While this review is brief I hope to cover the major features that differentiate this distribution from Ubuntu its parent distribution and rate its overall usefulness.

Means and ends in open source

Filed under
OSS

One thing that makes analysis of business strategies in open source difficult (even for professionals) is a confusion of means and ends.

Get Crontab Output in Ubuntu via E-mail

Filed under
HowTos

Having troubles getting your crontab’s output in Ubuntu? Constantly checking your email for a non-existent email? Turns out you might just be missing a message.

Windows vs GNU/Linux vs MacOSX - the showdown

Filed under
OS

I’ve been a Windows user since Windows 3.1, a Desktop GNU/Linux user since August and a MacOSX user for some weeks. I will share with you what I was able to learn from my experience with these operative systems.

Kill Process with Care

Filed under
HowTos

A lots of people likes to do kill -9, which means kill a process by force. By specified -9, process will be terminated by force, which is very fast and confirm kill but it leaves hidden side effects. Refers to Useless use of kill -9, kill a process by specified -9 may leave child processes of a parent orphaned, temporary files open, shared memory segments active, and sockets busy. This leaves the system in a messy state, and could lead to unanticipated and hard to debug problems.

Ubuntu to add proprietary drivers

Filed under
Ubuntu

Analysis -- Reluctantly, the Ubuntu developer community has decided that with the next version of Ubuntu, Feisty Fawn, it will be including some proprietary drivers. Feisty Fawn's emphasis on "multimedia enablement" appears to be the culprit.

Also: Linux desktop domination "just a matter of time"

The 451 Group: Calculating Open Source Software Costs and Savings

Filed under
OSS

Raven Zachary, open source senior analyst and practice lead at The 451, expects costs savings to continue driving commercial open source adoption for a long time. He described the 'calculator' included in his lataest report as a practical and vendor-neutral tool.

Microsoft the enemy to Red Hat and Linux community

Filed under
Microsoft

Microsoft's deal with Novell has been followed by Ballmer seemingly extending the olive branch to Linux leader Red Hat. However, Red Hat, like others in the Linux community, see Microsoft's moves as containing a veiled threat and just a means to get revenue for nothing.

Syndicate content

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud