Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 23 Jan 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Open source nuclear bunker guards finance data

Filed under
OSS

Somewhere outside a remote village in Kent, we pull up to a gate smothered in barbed wire and CCTV cameras. The former Ministry of Defence site, is now owned by a data-hosting and resilience company. The Bunker is a relic of the Cold War.

Exploit published for Snort open-source IDS

Filed under
Security

Security researchers posted code on Tuesday capable of compromising computers running the most recent versions of the Snort open-source intrusion detection system.

IBM, Others to Create Open-Source Programs

Filed under
OSS

Pushing the "open source" idea deeper into computing, several companies led by IBM Corp. are teaming up to develop programs for letting big businesses uniformly manage their increasingly vast warehouses of data.

Quick and Dirty Data Extraction in AWK

Filed under
HowTos

Need to pull some data from text--maybe e-mail messages--and sort it, graph it or otherwise manipulate it? Here's an AWK script to use as a starting point.

Fetching email with Mutt

Filed under
HowTos

What do you look for in an email program? You may find it in Mutt, an easy-to-use text-based messaging client. Here's all you need to know to get started with Mutt.

Leaping Lizards, It's SUSE Linux

Filed under
Reviews
SUSE

I've been playing around with the boxed edition of SUSE Linux 10.0, but Novell representatives assure me that the Evaluation edition available for download through OpenSUSE.org is the same product, complete with proprietary extensions.

Did Bill Gates Invent Linux and Has He Erased the Evidence?

Filed under
Microsoft

Someone has started rearranging content on the Internet to suit their own purposes and the culprit might be a convicted monopolist. This article examines some compelling evidence and asks Congress to investigate.

klik: True click-and-run software

Filed under
Software

Debian's APT makes installing software a breeze: you just run apt-get update&&apt-get upgrade to download and install the latest versions of all your software, or apt-get install widget to install widget on your machine. Pretty easy and painless. But now there's something available that's even easier and more painless: klik.

MySQL 5.0 Now Available for Production Use

Filed under
Software

MySQL AB has announced the general availability of MySQL 5.0, the most significant product upgrade in the company's ten-year history. Starting today, MySQL 5.0 can be downloaded under the open source GPL license.

Nominations open for SA's first open source awards

Filed under
OSS

Tectonic has launched South Africa's first-ever open source software awards to recognise the software most loved by Tectonic readers as well as the SA companies they most respect.

Remastering a Custom Knoppix Distribution

Filed under
HowTos

Ever wanted your own bootable CD? Something personalized for your users and complete with all of your own Linux-based software and configuration?

Dine In Geek Heaven With Dyne:BolicII

Filed under
Linux

Multimedia producers and artists will have the power to fully customise their own tailored GNU/Linux environment on a bootable CD with the release of Dyne:bolicII by the end of the year.

NZ Inland Revenue testing Linux

Filed under
Linux

New Zealand's Inland Revenue is testing Linux on a handful of its 7000 personal computers and expects to decide next year whether to become the first government department to take a big punt on open source desktop software.

Doom 3 v. Quake 4 Performance

Filed under
Gaming

Now a story on a subject near and dear to my heart. Rarely has a game caused me to have to upgrade any hardware, but Quake 4 pushed me to upgrade my amount of ram and left me wishing I could afford more. What is it that makes it so much more demanding than doom3/roe? Although the test machine for the article is quite decked out, this could be a valuable comparison.

OpenOffice.org 2.0 reviewed

Filed under
Reviews

Here's a really nice review of OpenOffice.org 2.0. Although it appears it's a review of the Windows version, it is still a tour de force of reviews, showing some of the wonderful options and includes really great screenshots.

UK graphics firm takes on Microsoft

Filed under
Microsoft

A small UK graphics software house is desperately trying to fight its corner against Microsoft by giving away its software to any Linux user prepared to help the company.

Q&A: Which Linux OS is best?

Filed under
Linux

Recently, I have decided to ditch Windows and move to an open source (Linux) operating system, especially now that the software available for open source covers my needs. However, before taking the leap, I would like to ask a few questions.

Book Review: Knoppix Pocket Reference

Filed under
Reviews

Knoppix is a wonderful tool; Rankin, the author of Knoppix Hacks, has given us a concise (84-page) book that will become indispensable.

Inside account about how Sun got its start

Filed under
Misc

Andy Bechtolsheim recently spoke with Mercury News Staff Writer Therese Poletti. Here are edited excerpts of the interview:

Free Sequoia Open Source ERP Software Released

Filed under
Software

Free open source software took a further step toward meeting the needs of business users today with the release of Sequoia Open Source ERP. Unlike commercial software solutions, however, Sequoia ERP is freely available to users to download, use, and modify without paying license fees.

Syndicate content

More in Tux Machines

Welcome To The (Ubuntu) Bionic Age: Nautilus, a LTS and desktop icons

If you are following closely the news of various tech websites, one of the latest hot topic in the community was about Nautilus removing desktop icons. Let’s try to clarify some points to ensure the various discussions around it have enough background information and not reacting on emotions only as it could be seen lately. You will have both downstream (mine) and upstream (Carlos) perspectives here. Read more

Programming: Perl, JavaScript, Ick, PowerFake, pylint-django, nbdkit filters

  • An Open Letter to the Perl Community

    Some consider Perl 6 to be a sister language to Perl 5. Personally, I consider Perl 6 more of a genetically engineered daughter language with the best genes from many parents. A daughter with a difficult childhood, in which she alienated many, who is now getting out of puberty into early adulthood. But I digress.

  • Long Live Perl 5!

    While not mentioned in the original Letter, a frequent theme in the comments was that Perl 6 should be renamed, as the name is inaccurate or is damaging.

    This is the topic on which I wrote more than once and those who have been following closely know that, yes, many (but by no means all) in the Perl 6 community acknowledge the name is detrimental to both Perl 6 and Perl 5 projects.

    This is why with a nod of approval from Larry we're moving to create an alias to Perl 6 name during 6.d language release, to be available for marketing in areas where "Perl 6" is not a desirable name.

  • JavaScript Trends for 2018
    Trying to bet on how many new JavaScript frameworks will be released each month, is, the best software engineer’s game in the past 5 years.
  • Ick: a continuous integration system
    TL;DR: Ick is a continuous integration or CI system. See http://ick.liw.fi/ for more information.
  • Introducing PowerFake for C++
    PowerFake is a new mini-framework/tool to make it possible to fake/mock free functions and static & non-virtual member functions in C++. It requires no change to the code under test, but it might need some structural changes, like moving some parts of the code to a different .cpp file; or making inline functions non-inline when built for testing. It is useful for writing unit tests and faking/mocking functions which should not/cannot be run during a test case. Some say that such a feature is useful for existing code, but should not be needed for a code which is written testable from the beginning. But, personally I don’t agree that it is always appropriate to inject such dependencies using virtual interfaces or templates. Currently, it is not supposed to become a mocking framework on its own. I hope that I can integrate PowerFake into at least one existing C++ mocking framework. Therefore, currently it doesn’t provide anything beyond faking existing functions.
  • Introducing pylint-django 0.8.0
    Since my previous post was about writing pylint plugins I figured I'd let you know that I've released pylint-django version 0.8.0 over the weekend. This release merges all pull requests which were pending till now so make sure to read the change log.
  • nbdkit filters
    nbdkit is our toolkit for creating Network Block Device (NBD) servers from “unusual” data sources. nbdkit was already configurable by writing simple plugins in several programming languages. Last week Eric Blake and I added a nice new feature: You can now modify existing plugins by placing “filters” in front of them.

Moving to Linux from dated Windows machines

Every day, while working in the marketing department at ONLYOFFICE, I see Linux users discussing our office productivity software on the internet. Our products are popular among Linux users, which made me curious about using Linux as an everyday work tool. My old Windows XP-powered computer was an obstacle to performance, so I started reading about Linux systems (particularly Ubuntu) and decided to try it out as an experiment. Two of my colleagues joined me. Read more

Security: TPM, Yubikey, Holes, Bricking and Uber

  • Trusted Computing
    The Trusted Platform Module on your computer's motherboard could lead to better security for your Linux system. The security of any operating system (OS) layer depends on the security of every layer below it. If the CPU can't be trusted to execute code correctly, there's no way to run secure software on that CPU. If the bootloader has been tampered with, you cannot trust the kernel that the bootloader boots. Secure Boot allows the firmware to validate a bootloader before executing it, but if the firmware itself has been backdoored, you have no way to verify that Secure Boot functioned correctly.
  • Locking the screen when removing a Yubikey

    I have my Yubikey on my key ring, so whenever I leave my computer, I have to remove the Yubikey. So why not lock the screen automatically?

  • Corporate cultural issues hold back secure software development

    The study of over 1,200 IT leaders, conducted by analysts Freeform Dynamics for software company CA Technologies, finds 58 percent of respondents cite existing culture and lack of skills as hurdles to being able to embed security within processes.

  • Stop installing our buggy Spectre CPU firmware fixes, Intel says
  • Uber shrugs off flaw that lets hackers bypass two-factor authentication

    Security researcher Karan Saini found the bug in Uber's two-factor authentication process, which has yet to be rolled out widely to Uber users. The flaw relates to the way an account is authenticated when users log in, meaning hackers [sic] with someone's username and password can drift pass the 2FA with ease.