Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Sunday, 15 Jul 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Secure communications service Perzo will be open source Roy Schestowitz 07/12/2013 - 9:13am
Story GCW-ZERO, the open source gaming console Roy Schestowitz 07/12/2013 - 9:03am
Story IBM will be bringing KVM Linux virtualization to Power in 2014 Roy Schestowitz 07/12/2013 - 8:36am
Story A Summer Spent on OpenPrinting with the Linux Foundation Roy Schestowitz 07/12/2013 - 8:33am
Story Linux users laugh at Microsoft's commitment to open source Rianne Schestowitz 06/12/2013 - 9:13pm
Story Fedora 20 Ends Up With Yet Another Delay Rianne Schestowitz 06/12/2013 - 8:56pm
Story Netrunner 13.12 RC available for testing Rianne Schestowitz 06/12/2013 - 8:40pm
Story Linux Mint 16 OEM Has Been Officially Released Rianne Schestowitz 06/12/2013 - 8:27pm
Story Linux Kernel News Rianne Schestowitz 06/12/2013 - 7:04pm
Story Fact sheet: Red Hat Enterprise Linux 6.5 Roy Schestowitz 06/12/2013 - 1:18pm

Linux Kernel 2.6.17 Released

Filed under
Linux

Not a lot of changes since the last -rc, the bulk is actually some last-minute MIPS updates and s390 futex changes, the rest tend to be various very small fixes that trickled in over the last week.

More Here and Here.

How to run Windows XP under Ubuntu Dapper

Filed under
HowTos

Why?

Because Dapper was just too Damn reliable... nah, seriously, I need to run Microsoft Visual Studio, and doing so under wine was not going to cut it, and dual booting was going to be a pain, VMWare was not open source so....QEMU to the rescue.

n/a

Show Me That New GNOME Main Menu

Filed under
SUSE

A lot of the people I have spoken to at various shows and events have wanted to see more of GNOME's new Main Menu which Novell aims to deliver with SUSE Linux Enterprise Desktop 10. The newly overhauled navigation resulted from studies in Novell's desktop usability labs. So let's take a moment to examine it.

Download with Resume - gwget - GNOME Download Manager

Filed under
HowTos

Today I found the perfect solution for downloading over slow or undependable internet connections. Though I already knew about wget, a command line tool, but it was a bit of a stretch to expect my uncle to use the command line time and again. gwget to the rescue!

PPPoE muddle in Debian over Ubuntu: a story

Filed under
Linux

I have to admit that network scripts in RedHat/CentOS/Fedora, and also SuSE and even Mandriva, are somehow better than the Debian way, in some particular occasions.

n/a

How Linux can compete with Windows Vista

Filed under
Linux

At first glance, you'd think an operating system like GNU/Linux that installs in less hard drive space and requires a less-beefy computer than Windows Vista would be an automatic sales superstar. Not so! If anything, Linux needs to become more hardware-hungry in order to compete effectively with Vista.

Gloomy prospects for Chinese Linux industry

Filed under
Linux

A Linux specialist who declined to be named, said recently that of all the Linux kernel codes, none are developed by Chinese. The situation has been acknowledged by Ni Guangnan, an academic with the Chinese Academy of Engineering and a strong advocate of Linux in China.

The Break-Up: Not a good date movie

Filed under
Reviews

Although The Break-up is laced with wit and charm throughout, the theme and ultimate outcome make it not the best flick to take a date. Vince Vaughn and Jennifer Aniston star.

Neverwinter Nights: Infinite Dungeons Premium Module

Filed under
Reviews
Gaming

This week on PCBurn's Linux Game Review we're taking a look at Infinite Dungeons, BioWare's newest (and last) official module for Neverwinter Nights. It's a professionally crafted game expansion that aims to replicate the automatic dungeon generation game play of rogue style dungeon romps such as nethack or ADOM. Let's see how it stacks up.

Novell hits a desktop home run with SLED 10

Filed under
SUSE

For the forthcoming SLED (Suse Linux Enterprise Desktop) 10, Novell went back to the drawing board to rethink what makes a good desktop. The result is extremely impressive.

How To: Enable apache modules under Debian based system

Filed under
HowTos

Apache is usually suitable out of the box for most common used. The apache structure under debian based systems is actually really well made as it is really easy to activate or deactivate module. This how-to will show how to activate or deactivate available modules under a debian system running apache2.

How to know which Linux Distribution you are using ?

Filed under
HowTos

Here are a few ways to find out which linux distro you are using :

Removing sendmail

Filed under
Software

Sendmail has a terrible reputation for security. While the latest releases are very good, past releases have been less than secure and that is where the reputation has come from.

It's Not a Gold Watch...

Filed under
Misc

Why should Linux--as a technology, as a community--give a darn about anything Microsoft does? The story of Gates' retirement, as big as it was, wasn't about Linux or open source at all. And, try as many in the mainstream media wanted to make this about Linux, they really could not make a valid connection.

n/a

Can't I Just Click on Something? Debian package management from the perspective of a total newbie

Filed under
Reviews

Just about any distro these days installs nicely to the hard drive. What can sometimes happen is that the system breaks when packages are added to the collection which the distro provides by default.

Why don't you get Linux?

Filed under
Humor

To the tune of "Why don't you get a job" by The Offspring

You won't pay, for upgrades. No way!
No, no, Why don't you get Linux
Say no way, say no way, no way
No, no, Why don't you get Linux

How to keep users from messing up their desktops

Filed under
HowTos

While I prefer allowing every user to customize his system, some managers may want to keep users from messing up a standard configuration. There are two basic approaches to this process. First, you can disable access to the key tools. Second, you can change ownership and permissions on associated configuration files to prevent changes by regular users.

Syndicate content

More in Tux Machines

Ubuntu MATE - Pimp your desktop to perfection

Ubuntu MATE has made a quantum leap of innovation in the past several months, offering a wealth of visual and functional changes and a mindblowing level of flexibility when it comes to customization. You really have the ability to implement anything and everything, and all of it natively, from within the system's interface. The list of options is so long that it can be overwhelming. Hopefully, this little pimping guide puts some order into this fine and rich chaos. Ubuntu Bionic isn't the most refined distro, but it sure has the almost infinite possibilities to make it appear and behave how you want it. You can have a classic desktop one day and then a MAC-like thing the next and then Ubuntu Unity the day after that. It's all there, very slick, very elegant. Well, it's time for you to do some exploring. See you. Read more

Games: Atari VCS, NEC, Pillars of Eternity II: Deadfire – Beast of Winter, State of Mind

  • Atari VCS RAM upgraded to 8GB and Atari confirm you can put a normal Linux distribution on it
    While I remain quite sceptical of the Atari VCS, I'm still pretty interested in it as a Linux gaming device. Atari recently did a Q&A blog post detailing some interesting information about it. The post is written by Rob Wyatt, the System Architect for the Atari VCS device. If the name Rob Wyatt doesn't ring a bell—they were the original Xbox system architect.
  • Atari VCS Product Q&A #1
    At this time the developer program is not open yet and it will come online in the coming months. If you have an application in mind you can start today, make sure it runs on Linux at HD resolution using standard runtime libraries, the changes from this to the AtariOS will be minimal and mostly related to application startup and application packaging. In the very near future we will release documentation on the AtariOS which will detail all the runtime components we support as well as libraries for Linux that mimic the AtariOS.
  • Is it worth $129 to relive your NES Duck Hunt glory days?

    But the folks behind the Modern Mallard Kickstarter campaign figured out a way to overcome this problem -- by using a speedy processor to rewrite the game's code in real time, counteracting the lag. The project includes a hardware mod for both the original Duck Hunt game cartridge and Zapper that makes it compatible with LCD, LED and OLED TVs. Note that the campaign doesn't include the game cartridge or Zapper, so you'll have to use your own.

    You can read more about how the mods work at the bottom of the Kickstarter page.

  • Pillars of Eternity II: Deadfire – Beast of Winter due out early next month
    The first piece of expansion content will be released 2 August. Expect to get caught up in a different realm, the Beyond, and face new enemies and puzzles.
  • Futuristic thriller 'State of Mind' has a new story trailer and releasing a day earlier than expected
    Daedalic Entertainment's futuristic thriller 'State of Mind' has a new story trailer out and a new release date. When we mentioned it last month, they gave us a release date of August 16th. However, they seem to have moved it forward as it's now going to release on August 15th. This will come with same-day Linux support!

Security Leftovers

  • Data breaches show we’re only three clicks away from anarchy
    An IT glitch afflicting BP petrol stations for three hours last Sunday evening might not sound like headline news. A ten-hour meltdown of Visa card payment systems in June was a bigger story — as was the notorious TSB computer upgrade cock-up that started on 20 April, which was still afflicting customers a month later and was reported this week to be causing ruptures between TSB and its Spanish parent Sabadell. Meanwhile, what do Fortnum & Mason, Dixons Carphone, Costa Coffee and its sister company Premier Inn have in common with various parts of the NHS? The answer is that they have all suffered recent large-scale ‘data breaches’ that may have put private individuals’ information at risk. IT Governance, a blog that monitors international news stories in this sphere, came up with a global figure of 145 million ‘records leaked’ last month alone. Such leaks are daily events everywhere — and a lesson of the TSB story was that cyber fraudsters are waiting to attack wherever private data becomes accessible, whether because of computer breakdown or lax data protection.
  • UK security researcher Hutchins makes renewed bid for freedom

    British security researcher Marcus Hutchins, who was arrested by the FBI last August over alleged charges of creating and distributing a banking trojan, has made a fresh bid to go free, claiming that the US has no territorial jurisdiction to file charges against him for alleged crimes committed elsewhere.

  • Common Ground: For Secure Elections and True National Security

    An open letter by Gloria Steinem, Noam Chomsky, John Dean, Governor Bill Richardson, Walter Mosley, Michael Moore, Valerie Plame, and others.

Containers or virtual machines: ​Which is more secure? The answer will surprise you

Are virtual machines (VM) more secure than containers? You may think you know the answer, but IBM Research has found containers can be as secure, or more secure, than VMs. James Bottomley, an IBM Research Distinguished Engineer and top Linux kernel developer, writes: "One of the biggest problems with the current debate about Container vs Hypervisor security is that no-one has actually developed a way of measuring security, so the debate is all in qualitative terms (hypervisors 'feel' more secure than containers because of the interface breadth) but no-one actually has done a quantitative comparison." To meet this need, Bottomley created Horizontal Attack Profile (HAP), designed to describe system security in a way that it can be objectively measured. Bottomley has discovered that "a Docker container with a well crafted seccomp profile (which blocks unexpected system calls) provides roughly equivalent security to a hypervisor." Read more