Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 17 Oct 17 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Old King of Computers now on Ubuntu tjavailable 27/07/2011 - 4:06am
Story The Browser By Many Other Names srlinuxx 27/07/2011 - 3:27am
Story Mandriva's Dodonov Leaves Goodbye Gifts srlinuxx 27/07/2011 - 3:25am
Story Review: Kongoni 2011 "Firefly" srlinuxx 27/07/2011 - 3:17am
Story Latest Bundle Already Pulls $100k srlinuxx 27/07/2011 - 3:15am
Story Ubuntu 11.04 Review srlinuxx 26/07/2011 - 11:22pm
Story Cordia Tab, Open Tablet to cost only $300 srlinuxx 26/07/2011 - 11:13pm
Story Humble Indie Bundle 3 Now Available srlinuxx 26/07/2011 - 11:09pm
Story Debian 7 Wheezy to introduce multiarch support srlinuxx 26/07/2011 - 11:06pm
Story GNOME vs. KDE vs. Unity: Customization Tools and Ease of Use srlinuxx 1 26/07/2011 - 10:41pm

Dell welcomes back Muslim workers

Filed under
Hardware
Legal

Dell Computer has reached agreement with 31 workers at its Nashville factory who left the firm after a disagreement over evening prayers.

Computers bad for kids

Filed under
Misc

Using a computer at home might actually reduce a child's performance in maths, science and English rather than improve it, a study has found.

Website offers cash for old mobile phones

Filed under
Web

A new UK website has launched, offering cash in exchange for second-hand phones.

Mopay says that if you send off your used phone - Freepost - to them they’ll send you a cheque in exchange. You can get a quote for your old phone online, before you send it in, and a cheque will arrive within an fortnight.

Intel's 64-Bit Pentium 4s Hit The Streets

Filed under
Hardware

Intel's first 64-bit Pentium 4 microprocessors were quietly added to the company's price lists on Sunday, heralding their entrance into the marketplace.

Although, AMD chip retains the speed crown.

Does Your Wi-Fi Hotspot Have an Evil Twin?

Filed under
Security

Identity thieves are going wireless in their quest to steal your personal info.

You may want to think twice before logging into a public wireless hotspot. Sure, grabbing a few minutes of connectivity is convenient, but identity thieves are discovering that, through "evil twin" attacks, hotspots are a great way to steal unsuspecting users' private information. So how does an evil twin attack work?

This Week's Movies: The Jacket and The Pacifier

Filed under
Movies
Reviews
-s

The Pacifier staring Vin Diesel was your basic Disney feel good movie. Formulaic, by-the-numbers plot and cookie cutter script are dressed up by an admirable performance from my favorite action hero and yours, Vin Diesel.

The Jacket was an imaginative pychological mystery with an intriguing plot and engaging dialogue. The actors did a marvelous job of portraying their characters. They made an unbelievable scenario plausible.

Circumventing Microsoft

Filed under
Microsoft

Notwithstanding the fact it will be many years before very many corporate users might be able to work in a "Microsoft-free" environment, there appears to be significant effort being put forth to make it a reality. From the geekiest tech pubs, like the Java Developer's Journal to august ones such as The Wall Street Journal, circumventing Microsoft is a hot topic.

Report finds surge in on-line attacks

Filed under
Security

Internet attacks on businesses and other organizations increased by about 28 per cent in the second half of 2004 compared with the first six months of the year, and hackers are setting their sights on the rapidly emerging mobile-computing market, warns a report on Internet security to be released Monday.

original content

Will Longhorn be short on features?

Filed under
Microsoft

While Microsoft continues raising Longhorn, rivals are seizing the operating system's extended adolescence to develop competing feature sets of their own.

The already scaled-back version of Longhorn is still roughly 18 months from shipping, and with the expected technical advances by Linux competitors during that time, Microsoft's estimable industry influence to sell the product as currently constituted will be severely tested.

Computer Addiction or Healthy Enthusiam?

Filed under
-s

Are you a computer addict? ... or is someone you love a computer addict?

If so, you are not alone.

I have this friend who I believe has become addicted to her computer. It started out innocently enough with the purchase of a computer to do her bookkeeping, keep in touch with long distant friends and relatives, or a little light reading. Over the next year or so she began to spend more and more time on it and less and less with her friends. She became withdrawn from society and stopped participating in activities she used to enjoy. Call her anytime day or night and in asking "wha'cha doing?" she states "playing on the computer". I jokingly told her "I think you are addicted to that thing".

NYPL Digital Gallery

Filed under
Web

The New York Public Library is making more than 275,000 images available for personal use. Print and frame these vintage maps, rare prints and photos and create your own personal art gallery.

Link.

Google Gmail accounts are bottomless barrels

Filed under
Web

PLENTY OF US use Google's Gmail accounts on a daily basis. I, for instance, obtained my first account back in early June, 2004. It only took me 10 months to fill Google's until then considered "huge" storage space. See, one gigabyte is not so much after all when you start leaving all your email on the remote server.

Back in February, I started getting nervous when the space-metre at my Gmail account hit "95%". I asked my contact at Google in the UK what would happen when the account reached 100%. Would email start bouncing back to sender? Would I be alerted and given the option to "upgrade" for a fee to a bigger storage space?

UK games industry 'needs support'

Filed under
Gaming

More software and games are being sold overseas than are imported, a good sign for the economy, said the report. It shows the interactive entertainment industry is doing financially better than film and television industries. The rising cost of making games has meant many studios have closed however, sending talent overseas.

A Peak at MDK 10.2-b2 AMD64

Filed under
Reviews
Submitted by Anonymous

Anonymous writes, "It took about 10-12 minutes to install. I selected the default installation. You need all 3 cd's if you are doing the default install though it appears to only need 3-4 packages from the 3rd cd.

Boot up speed was about the same as the x86 version. The noticable difference came after logging into the desktop. This is where you begin to notice the speed difference from accessing the menus to launching applications.

After cable recall, Xbox's still frying

Filed under
Microsoft

14 million games console owners are still at risk of waking up to find their Xbox has become an ex-box. For when Microsoft issued a safety advisory for Xbox customers last month, it failed to address the underlying problem.

Amazon tightens rules for sellers

Filed under
Web
Fraud by third-party merchants could hurt brand integrity, some experts say

John Wocher bought the camera of his dreams from a seller on Amazon.com with nary a second thought, gleefully anticipating its arrival after wiring $4,549 to zShop merchant awesomediscount.com in January.

As February approached, Wocher stepped up the frequency of his e-mails with the seller, asking for the UPS tracking number, his concern growing after he had so amicably arranged the wire transfer from his home in Japan.

Schoolyard bullies get nastier online

Filed under
Web

When Joanne had a row with a longtime friend last year, she had no idea it would spill into cyberspace.

But what started as a spat at a teenage sleepover swiftly escalated into a three-month harangue of threatening e-mails and defacement of her Web log. "It was a nonstop nightmare," says Joanne, 14, a freshman at a private high school in Southern California. "I dreaded going on my computer."

US Advisory panel recommends more federal R&D spending

Filed under
Security

The Presidential IT Advisory Committee (PITAC) has recommended the federal government sharply increase its spending on cybersecurity R&D and shift the focus to fundamental, long-term solutions to security challenges.

"The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects," PITAC warned in a letter submitting the report, titled Cyber Security: A Crisis in Prioritization, to the president. "These vulnerabilities put the nation's entire critical infrastructure at risk."

Game bill picks up steam in Illinois

Filed under
Gaming

A bill introduced into the Illinois State House last December would supersede current ESRB ratings when it comes to video games with "violent and sexually explicit" content. The focus would be on isolating games deemed to have content not suitable for those under the age of 18 and would also attach a fine to retailers who violate the restriction on sales of those games.

Syndicate content

More in Tux Machines

GNU/Linux Desktops/Laptops and Devices

OSS Leftovers

Security Leftovers

  • Google and IBM launch open-source security tool for containers
    Google and IBM, together with a few other partners, released an open-source project that gathers metadata that developers can use to secure their software. According to an IBM blog post, the goal of the project is to help developers keep security standards, while microservices and containers cut the software supply chain.
  • Top 10 Hacking Techniques Used By Hackers
    We live in a world where cyber security has become more important than physical security, thousands of websites and emails are hacked daily. Hence, It is important to know the Top hacking techniques used by hackers worldwide to exploit vulnerable targets all over the internet.
  • Protect your wifi on Fedora against KRACK
    You may have heard about KRACK (for “Key Reinstallation Attack”), a vulnerability in WPA2-protected Wi-Fi. This attack could let attackers decrypt, forge, or steal data, despite WPA2’s improved encryption capabilities. Fear not — fixes for Fedora packages are on their way to stable.
  • Federal watchdog tells Equifax—no $7.25 million IRS contract for you
    The Government Accountability Office (GAO) on Monday rejected Equifax's bid to retain its $7.25 million "taxpayer identity" contract—the one awarded days after Equifax announced it had exposed the Social Security numbers and other personal data of some 145 million people.
  • Adobe Flash vulnerability exploited by BlackOasis hacking group to plant FinSpy spyware

    Security researchers have discovered a new Adobe Flash vulnerability that has already been exploited by hackers to deploy the latest version of FinSpy malware on targets. Kaspersky Lab researchers said a hacker group called BlackOasis has already taken advantage of the zero-day exploit – CVE-2017-11292 – to deliver its malicious payload via a Microsoft Word document.

  • Companies turn a blind eye to open source risk [Ed: No, Equifax got b0rked due to bad practices, negligence, incompetence, not FOSS]
    For instance, criminals who potentially gained access to the personal data of the Equifax customers exploited an Apache Struts CVE-2017-5638 vulnerability.
  • Checking Your Passwords Against the Have I Been Pwned List
    Two months ago, Troy Hunt, the security professional behind Have I been pwned?, released an incredibly comprehensive password list in the hope that it would allow web developers to steer their users away from passwords that have been compromised in past breaches.

How to use an Arduino and Raspberry Pi to turn a fiber optic neural network into wall art

Hollywood has made many big promises about artificial intelligence (AI): how it will destroy us, how it will save us, and how it will pass us butter. One of the less memorable promises is how cool it will look. There's a great example of amazing AI visualization in Avengers: Age of Ultron when Tony Stark's AI butler Jarvis interacts with Ultron and we see an organic floating network of light morphing and pulsing. I wanted to make something similar to fill blank space on my apartment wall (to improve upon the usual Ikea art). Obviously, I couldn't create anything as amazing as Jarvis as a floating orb of light; however, I could use a machine learning algorithm that looks interesting with quirky data visualization: a neural network! It employs biologically inspired elements that were meant to replicate how (we thought) the human brain works. Read more