Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Thursday, 19 Oct 17 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Metallic glass: a drop of the hard stuff

Filed under
Sci/Tech

IN THE movie Terminator 2, the villain is a robot made of liquid metal. He morphs from human form to helicopter and back again with ease, moulds himself into any shape without breaking, and can even flow under doorways.

Now a similar-sounding futuristic material is about to turn up everywhere. It is called metallic glass.

Animal laughs no joke says expert

Filed under
Misc

Many animals may have their own forms of laughter, says a US researcher writing in the magazine Science.

Japanese Co. sells ghost detector

Filed under
Sci/Tech

The Japanese company that launched popular computer data storage units shaped like rubber ducks and sushi started selling a new product Friday - a ghost detector.

Former Microsoft employee sentenced two years

Filed under
Microsoft
Legal

A former Microsoft worker was sentenced Friday to two years in prison and ordered to pay $5 million in restitution after he admitted reselling software he stole from the company and using the money to pay off his mortgage, among other things.

Microsoft Acquires Linux

Filed under
Humor

REDMOND, Wash. - Mar. 31, 2005 -- Linus Torvalds, on behalf of all Linux users, has entered into a sales agreement with Microsoft valued at 1.4 billion US Dollars.

Gentoo on the NT kernel

Filed under
Gentoo
Humor

If we allow ourselves to think out of the box, we will realize that the Microsoft NT kernel is an alternative to Linux, that is both proven and commercial-grade. It has support from nearly all hardware vendors in the world, and practically every PC comes with an license for the NT kernel. This means: the monetary cost of a copy of the NT kernel is close to non-existent for the average end-user.

Open source to draw up ethical standards

Filed under
OSS

The Open Source Consortium has established a professional and ethical standards taskforce examining areas traditionally associated with professional standards, such as quality control and project management.

Fill Out Survey - Win an IPod

Filed under
Misc

ZDNet UK is launching the IT Priorities reader research programme for 2005 and needs your help - in return you could win an iPod.

Forty years of Moore's Law

Filed under
Hardware
Misc

Forty years ago, Electronics Magazine asked Intel co-founder Gordon Moore to write an article summarizing the state of the electronics industry. The article outlined what became known as Moore's Law.

The Well celebrates 20th birthday

Filed under
Web

One of the oldest and most celebrated online communities is celebrating its 20th birthday on Friday.

NVIDIA Version: 1.0-7174 released

Filed under
Software

Due to wide spread issues with 1.0-7167, NVIDIA has quickly released 1.0-7174. According to the changelog some highlights include:

Living will software sales surge

Filed under
Software

Sales of computer software to create living wills are surging amid the high-profile debate over Terri Schiavo, the severely brain-damaged Florida woman who died Thursday.

More Google Goodies

Filed under
Web

Starting today, we're beginning the roll-out of our new and top secret Infinity+1 storage plan. The key features are:

Quench your thirst for knowledge

Filed under
Humor

At Google our mission is to organize the world's information and make it useful and accessible to our users. But any piece of information's usefulness derives, to a depressing degree, from the cognitive ability of the user who's using it. That's why we're pleased to announce Google Gulp (BETA)™ with Auto-Drink™ (LIMITED RELEASE), a line of "smart drinks" designed to maximize your surfing efficiency by making you more intelligent, and less thirsty.

Origins of April Fools Day

Filed under
Misc

Do you know the origin of April Fools Day? It is believed to have started in France, but the British are credited with bringing it to the US.

Microsoft Issues Warning Against April Fool's Day Jokes

Filed under
Humor

REDMOND, WASHINGTON -- In a harshly worded statement, Microsoft today warned that the company would "aggressively defend its trademarks against any unauthorized April Fool's Day jokes, parodies, satires, hoaxes, lampoons, gags, japes, capers, pranks, larks, farces, wisecracks, frolics, mockeries, takeoffs, send ups, humor items, or fake news stories."

No Comdex this year?

Filed under
Hardware
Sci/Tech

No Comdex 2005 IT trade show this November in Las Vegas? No problem, according to IT users interviewed after yesterday's announcement that this year's event is off. It's the second year in a row Comdex has been canceled. One past attendee said Comdex had become a 'flea market'

WordPress Under Fire for Search-Engine Spamming

Filed under
Software
Web

One of the most popular Weblog-publishing tools, WordPress, is stirring a controversy over search-engine gaming because it included thousands of articles related to popular search terms on its Web site while largely hiding them from site visitors.

Shame on them!

Brain chip reads man's thoughts

Filed under
Sci/Tech
Misc

A paralysed man in the US has become the first person to benefit from a brain chip that reads his mind.

Google plans to double Gmail capacity

Filed under
Web

Google plans to offer a bottomless cup of storage with its Gmail Web-based e-mail service, dramatically raising the bar for rivals in the sharply competitive business for the second time in a year.

Syndicate content

More in Tux Machines

Security: WPA2, RSA/TPM, and Microsoft Breach

  • Google and Apple yet to fix Wi-Fi hole in a billion devices

    The WPA2 security protocol has been a mandatory requirement for all devices using the Wi-Fi protocol since 2006, which translates into billions of laptops, mobiles and routers. The weakness identified by Mathy Vanhoef, a digital security researcher at the Catholic University of Leuven (KUL) in Belgium, lies in the way devices running WPA2 encrypt information.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on. They can lack full documentation even months or years after their release.

  • Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

    Security experts say the bug has been present since 2012 and found specifically in the Infineon’s Trusted Platform Module used on a large number of business-class HP, Lenovo and Fijitsu computers, Google Chromebooks as well as routers and IoT devices.

  • ROCA: RSA encryption key flaw puts 'millions' of devices at risk

    This results in cyber criminals computing the private part of an RSA key and affects chips manufactured from 2012 onwards, which are now commonplace in the industry.

  • Infineon RSA Key Generation Issue

    Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.

  • Microsoft remains tight-lipped about 2013 internal database hack [sic]

    A secretive internal database used by Microsoft to track bugs in its software was compromised by hackers [sic] in 2013.

  • Exclusive: Microsoft responded quietly after detecting secret database hack in 2013

    Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking [sic] group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.

Red Hat reduces IoT tradeoffs and Asia Coverage

  • Industry Spotlight: Red Hat reduces IoT tradeoffs
    Organizations rolling out the IoT usually aren’t prepared for the additional complexity. With the IoT, data volumes grow exponentially, infrastructure management gets more complicated and the security vulnerabilities increase disproportionately. Nevertheless, IT departments are expected to handle all these changes competently without proportional increases in budget or other resources.
  • Analyse Asia 211: Red Hat in Asia & Open Innovation Institute with Dirk-Peter van Leeuwen
    Dirk-Peter van Leeuwen, senior vice president & general manager at Redhat, Asia Pacific, joined us to discuss the company’s footprint across Asia and the recent launch of their new Open Innovation Institute in Singapore. We discuss how Asian companies are in different phases of digital transformation from culture to innovation and adjusting against digital disruption.

Samsung and Tizen: Bixby 2.0, Tizen 3.0, GNU/Linux on DeX

Ubuntu 17.10: What’s New? [Video]

It’s Artful Aardvark arrival day today (no, really!) and to mark the occasion we’ve made our first video in 3 years! Prime your eyeballs and pop in some earbuds as we (try to) bring you up to speed on what’s new in Ubuntu 17.10. At a smidgen over 3 minutes long we think our video is perfect for watching on your commute; when you’re bleary eyed in bed; or when you get the tl;dr feels thinking about our fuller, longer, and far wordier Ubuntu 17.10 review (due out shortly). Read more