Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Sunday, 18 Feb 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story I’ve had enough of Ubuntu Unity! srlinuxx 14/06/2012 - 6:53pm
Story Comix: A Useful Comic Reader For Linux srlinuxx 14/06/2012 - 6:51pm
Story Opera 12 Adds Themes, Do Not Track, Hardware Acceleration srlinuxx 14/06/2012 - 6:50pm
Story Most Open-Source Game Artwork Is Awful srlinuxx 14/06/2012 - 1:28am
Story SolusOS 1 Eveline review - Very interesting srlinuxx 14/06/2012 - 1:24am
Story Blame the user, not the tool srlinuxx 13/06/2012 - 11:25pm
Story 10 GNOME games your friends will enjoy srlinuxx 13/06/2012 - 11:23pm
Story Best System Cleaning Software for Linux srlinuxx 13/06/2012 - 11:22pm
Story KDE Announces 4.9 Beta2 srlinuxx 13/06/2012 - 11:19pm
Story Mandriva finally died! Well, sort of... srlinuxx 13/06/2012 - 7:43pm

KDE Quality Assurance Meeting Report

Filed under
KDE

On the weekend of December 10th & 11th, a small group of nine KDE contributors met in Hamburg to work on quality assurance checks for KDE's code base.

'Open Source Content' Has No Quality Control

Filed under
Web

The flap over the man who spoofed the Wikipedia with a bogus entry claiming a journalist was involved in both Kennedy assassinations and spent 13 years living in the Soviet Union is a powerful indictment of what I'm calling "open source" content.

Also: WIKIPEDIA: fitting the open source framework

There's hope for a unified Linux desktop yet

Filed under
Linux

Seems like everyone got tired of clawing at reach other and instead decided to get down to work last week. Moreover, not only was the acrimony factor way down, but also the helpful factor was way up. What a change!

Unreal Tournament 2004 Linux patch v3369-1

Filed under
Gaming

Rounding off this patchy Monday, Icculus has issued updated retail patches for Unreal Tournament 2004 to bring the Linux and Mac OSX editions of Epic's multiplayer first-person shooter to version 3369-1.

My sysadmin toolbox

Filed under
Linux

I'm that odd guy who puts Linux on virtually everything, and will take something apart just because I can. My Linksys WRT54G runs Talisman from Sveasoft, my iPaq runs Familiar, and even my TiVos (DirecTiVo and Series 2) have been hacked up a bit. So what does a guy like me use for software tools?

Torvalds: "Just Use KDE"

Filed under
KDE

Without tip-toeing around the matter, Linus Torvalds made his preference in the GNOME vs. KDE matter quite clear on the GNOME-usability list: "I personally just encourage people to switch to KDE.

Open Source - Is it a Valid Direction for You?

Filed under
OSS

There is a perception that Open Source products like the Linux operating system are rapidly replacing their paid-for commercial counterparts like Microsoft Windows.

CompAmerica Announces AX5, a Free “Windows-Like” Operating System

Filed under
OS

CompAmerica (http://www.compamerica.com) announces a free operating system option for its PCs that it claims “bears a reasonable resemblance” to Microsoft Windows XP and can cohabitate with Microsoft Windows XP on the same PC.

Open-source antivirus tech may get commercial help

Filed under
Software

To plug a hole in its intrusion-prevention product, eEye Digital Security may adopt the Clam AntiVirus project and improve the open-source software.

klik wins "Linux Format Hottest Pick" award

Filed under
Software

We got notified from the Linux Format (a printed magazine sold in UK newspaper stands) that they give their Hottest Pick award to klik. -- Woooohoo!

Quake 4 patch v1.0.5, Linux client/server v1.0.6 - patch

Filed under
Gaming

Id Software has released a new beta patches for Quake 4, bringing the Linux client/server to version 1.0.6.

Also: $2,000 Quake 4 tourney proposed

Closed, Open Source Share Compatibility Problems

Filed under
Software

Software stacks, open or closed, will always be dogged by backward-compatibility issues. Deal with it.

Packetstorm in a teacup; Firefox still secure

Filed under
Moz/FF
Security

The first exploit for Mozilla Firefox 1.5 was discovered by Packetstorm last week. However initial reports that Packetstorm's hack could completely disable Firefox seem grossly exaggerated.

Linux Shortcuts and Commands

Filed under
HowTos

This is a practical selection of the commands we use most often. On my small home system, it says there are 2595 executables on my PATH. Many of these "commands" can be accessed from your favourite GUI front-end, by clicking on the right menu or button. They can all be run from the command line.

Preventing Buffer Overflow Exploits Using the Linux

Filed under
Security

Internet servers (such as Web, email, and ftp servers) have been the target for different kinds of attacks aiming to disable them from providing services to their respective users.

Dual-core desktop duel: AMD vs. Intel

Filed under
Hardware

What would the results of a dual-core desktop CPU fight look like? To answer the question once and for all, we set ourselves to a no-holds-barred dual-core desktop CPU fistfight.

Considering the Misuse of Open Source

Filed under
OSS

As open-source software spreads to personal computers, servers and Internet networking equipment around the world, so, too, is the misuse of the rules governing the software.

LinuxWorld Boston mulls "invisible Linux" pavilion

Filed under
Linux

LinuxWorld Boston 2006 organizers say the "Invisible Linux" pavilion, currently at the "concept" stage, could help surface the use of Linux and open source in devices and embedded applications, given sufficient exhibitor interest.

Minding your P's and Q's with Open Source

Filed under
OSS

Open source compliance continues to be difficult issue, often compounded by the large and varied range of licenses that governed the use of the software that may come with the kind of strings attached that you may not realize.

Big Vole is watching you

Filed under
Microsoft

CUDDLY SOFTWARE giant Microsoft will use its new Windows Live geolocation finder as a Big Brother location device for the police.

Syndicate content

More in Tux Machines

LMMS Guide Part 1: Creating Simple Melodies Using Sounds And Instruments

​LMMS stands for Linux Multimedia Studio. It is a very good open-source program that is used to create music tracks using sound files, predefined instruments, and sound effects. LMMS has versions for Windows and macOS in addition to Linux. Their website, of course, lists all of their features offered to users. This article will attempt to provide practical guides and tips for composing songs using LMMS. Read
more

How To Create Shell Scripts

Having to type the same command over and over again can be a daunting task and tiresome for that matter. The shell scripts are really easy to create and run saving you from a lot of misery and anguish if you really prefer using the terminal over using the GUI for running tasks. Read
more

Today in Techrights

Security Leftovers

  • Thousands of FedEx customers' private info exposed in legacy server data breach

    Uncovered by Kromtech Security Center, the parent company of MacKeeper Security, the breach exposed data such as passport information, driver's licenses and other high profile security IDs, all of which were hosted on a password-less Amazon S3 storage server.

  • Correlated Cryptojacking

    they include The City University of New York (cuny.edu), Uncle Sam's court information portal (uscourts.gov), Lund University (lu.se), the UK's Student Loans Company (slc.co.uk), privacy watchdog The Information Commissioner's Office (ico.org.uk) and the Financial Ombudsman Service (financial-ombudsman.org.uk), plus a shedload of other .gov.uk and .gov.au sites, UK NHS services, and other organizations across the globe.

    Manchester.gov.uk, NHSinform.scot, agriculture.gov.ie, Croydon.gov.uk, ouh.nhs.uk, legislation.qld.gov.au, the list goes on.

  • Facebook using 2FA cell numbers for spam, replies get posted to the platform

    Replies ending up as comments appears to be a bizarre bug, but the spamming seems intentional.

  • Swedish Police website hacked [sic] to mine cryptocurrency

    Remember now, it is a Police Force that allowed their website to be hijacked by this simple attack vector. The authority assigned to serve and protect. More specifically, the authority that argues that wiretapping is totally safe because the Police is competent in IT security matters, so there’s no risk whatsoever your data will leak or be mishandled.

    This is one of the websites that were trivially hacked [sic].

    It gives pause for thought.

    It also tells you what you already knew: authorities can’t even keep their own dirtiest laundry under wraps, so the notion that they’re capable or even willing to protect your sensitive data is hogwash of the highest order.

  • New EU Privacy Law May Weaken Security

    In a bid to help domain registrars comply with the GDPR regulations, ICANN has floated several proposals, all of which would redact some of the registrant data from WHOIS records. Its mildest proposal would remove the registrant’s name, email, and phone number, while allowing self-certified 3rd parties to request access to said data at the approval of a higher authority — such as the registrar used to register the domain name.

    The most restrictive proposal would remove all registrant data from public WHOIS records, and would require legal due process (such as a subpoena or court order) to reveal any information supplied by the domain registrant.

  • Intel hit with 32 lawsuits over security flaws

    Intel Corp said on Friday shareholders and customers had filed 32 class action lawsuits against the company in connection with recently-disclosed security flaws in its microchips.

  • The Risks of "Responsible Encryption"

    Federal law enforcement officials in the United States have recently renewed their periodic demands for legislation to regulate encryption. While they offer few technical specifics, their general proposal—that vendors must retain the ability to decrypt for law enforcement the devices they manufacture or communications their services transmit—presents intractable problems that would-be regulators must not ignore.

  • Reviewing SSH Mastery 2nd Ed

    It’s finally out ! Michael W Lucas is one of the best authors of technical books out there. I was curious about this new edition. It is not a reference book, but covers the practical aspects of SSH that I wish everybody knew. Rather than aggregating different articles/blogs on SSH, this book covers 90% of the common use cases for SSH that you will ever encounter.