Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 23 Jul 19 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Tesseract Is Looking Okay For A Small, Open-Source Game Rianne Schestowitz 13/05/2014 - 8:00pm
Story POPCORN TIME 0.3 RELEASED WITH TV SERIES SUPPORT, NEW USER INTERFACE, OTHER MAJOR NEW FEATURES Rianne Schestowitz 13/05/2014 - 7:54pm
Story Google Chrome 36 Dev Adds Extra Step for Profile Deletion Rianne Schestowitz 13/05/2014 - 7:48pm
Story NVIDIA Continues Beating Other Vendors On OpenGL Support Rianne Schestowitz 13/05/2014 - 7:41pm
Story Canonical offers "Chuck Norris Grade" OpenStack private cloud service Rianne Schestowitz 13/05/2014 - 7:37pm
Story GNOME MUSIC 3.12.2 Rianne Schestowitz 13/05/2014 - 7:33pm
Story Olimex dives into Linux/Android modules Rianne Schestowitz 13/05/2014 - 7:27pm
Story GCC 4.9 Will Soon Be The Default In Debian, Ubuntu Rianne Schestowitz 13/05/2014 - 7:12pm
Story The Moto E is shockingly cheap and surprisingly good Rianne Schestowitz 13/05/2014 - 7:06pm
Story Today in Techrights Rianne Schestowitz 13/05/2014 - 7:05pm

Spyware Floods In Through BitTorrent

Filed under
Security

Public peer-to-peer networks have always been associated with adware program distributions, but BitTorrent, the program created by Bram Cohen to offer a new approach to sharing digital files, has managed to avoid the stigma.

The Linux iPod

Filed under
Linux

Imagine using your iPod and a regular old microphone to record studio-quality audio. Or sitting on a commuter train and playing Othello, Pong, Tetris, or Asteroids. All this and more is possible when you install Linux on your third-generation or earlier iPod. Best of all, one soft reset, and you’re back in Apple’s iPod operating system, listening to your tunes.

In geek world, he's a celebrity

Filed under
Misc

Mention Chris Pirillo on your blog or Web site and, soon enough, he'll show up with a comment. This happens so often that bloggers call it "The Pirillo Effect."

Nvidia graphics chip to debut at game bash

Filed under
Hardware

Hard-core game enthusiasts descending on San Francisco next week will get first crack at buying Nvidia's long-awaited GeForce 7800 graphics cards.

Diesel powering 'Hitman' game to big screen

Filed under
Movies
Gaming

Vin Diesel, who returned to box office glory recently with the family comedy "The Pacifier," is bringing Agent 47 to life. He has signed on to star in 20th Century Fox's upcoming adaptation of "Hitman."

Rambus names Samsung in antitrust lawsuit

Filed under
Hardware

Rambus has added Samsung Electronics to its antitrust lawsuit against most of the DRAM industry, another development in the souring of relations between the two former partners.

n/a

Three SATA-II Hard Drives Reviewed

Filed under
Hardware
Reviews

Today, we're looking at three sata-ll drives, plus we're comparing them with the Western Digital Caviar RAID Edition drive we reviewed several months ago. This allows us to see if there's any real performance difference between the old and new.

M$ sues US software pirates

Filed under
Microsoft

Microsoft today announced that it is filing four lawsuits against companies in Virginia and California for alleged distribution of counterfeit and/or illicit software and software components.

PC makers snub Windows sans media player

Filed under
Microsoft

Four major PC makers have no plans to sell the media-player-free version of Windows, which Microsoft was ordered to offer by Europe's competition commissioner.

Nvidia GF 7800 GTX $639 option

Filed under
Hardware

The Geforce 7800 GTX with 256MB - for now - sporting with DVI and TV out will add $639 to your PC's price.

Hashing exploit threatens digital security

Filed under
Security

Cryptographers have found a way to snip a digital signature from one document and attach it to a fraudulent document without invalidating the signature and giving the fraud away.

Falling CD sales can't be blamed on P2P swappers

Filed under
Web

Declining CD sales cannot be blamed on the rise of internet file-sharing networks, according to a new report into the state of the global online digital music industry.

FCC sets rules for VoIP 911

Filed under
Sci/Tech

Internet telephone service will soon come with a warning sticker.

Britney Spears a hit with hackers

Filed under
Security

The celebrity whose name is used most by hackers creating computer e-mail viruses has shifted from Microsoft chief Bill Gates to pop singer Britney Spears.

Space shuttle Discovery rolls toward launch pad

Filed under
Sci/Tech

Space shuttle Discovery is making its glacial crawl to launch pad 39B this morning to prepare it for blastoff next month.

Most Want U.S. to Make Internet Safe

Filed under
Security

Most Americans believe the government should do more to make the Internet safe, but they don't trust the federal institutions that are largely responsible for creating and enforcing laws online, according to a new industry survey.

Linux Fans Greet New Kernel Release

Filed under
Linux
Linux-2.6.11.12

A new version of the Linux kernel has been released, adding support for virtualization and showcasing the use of a new release-management tool developed by Linux inventor Linus Torvalds himself.

Java flaws open door to hackers

Filed under
Security

Sun Microsystems has fixed a pair of security bugs in Java that could be exploited by attackers to take over computers running Windows, Linux and Solaris.

The State Of Internet Security

Filed under
Web

While the scams that daily flood our e-mail in-boxes show no signs of abating, there is some good news for the users who have to sort through them all. So says VeriSign in its latest "State of Internet Security" address covering the first three months of 2005.

Syndicate content

More in Tux Machines

Security: Windows Ransomware, Linux Tools and Linux FUD

  • The Growing Threat of Targeted Ransomware [iophk: Windows TCO]

    The two primary differences between targeted attacks and the early versions of spray-and-pray ransomware attacks is the size of ransom demanded and the technical expertise of the hackers. Symantec has analyzed six stages of a targeted attack: initial (typically involving PowerShell); lateral movement (typically with Mimikatz and/or Putty); stealth and countermeasures (with signed malware and disabled security software); ransomware spreading (typically through batch files and PS Exec); triggering the encryption; and finally the ransom demand.

    In January 2017 there were just two targeted attacks per month. By May 2019 this had risen to more than 50 per month, with the sharpest increasing occurring in 2019. There have already been at least two and probably three new targeted attack groups discovered. The pace of targeted attacks is clearly increasing, and it looks like it will continue to increase. Targeted ransomware attacks have evolved into one of the biggest cyber threats to business today.

  • Quest’s KACE SDA 7.0 automates large-scale system deployment and simplifies migrations

    The newest release of KACE SMA also supports new OS versions such as macOS 10.14, Windows 10 Fall 2018 Update, SUSE 15, and Fedora 28 and OpenSUSE 15 (both agentless only).

  • ESET unveils new version of File Security for Linux

    ESET File Security for Linux provides advanced protection to organisations’ general servers, network file storage and multipurpose servers. The software ensures the servers are stable and conflict-free in order to preserve system resources for vital tasks and avoid disrupting business continuity. As the use of Linux servers increases in popularity with organisations, it is vital that all users and their businesses remain protected against the latest threats.

  • Hackers Exploit Jira, Exim Linux Servers to "Keep the Internet Safe' [Ed: Troll site "BleepingComputer" is blaming on "Linux" unpatched applications; that's like blaming Windows for Adobe PhotoShop (with holes in it) because it can run on Windows]

    The newest variant spotted by Intezer Labs' researcher polarply on VirusTotal uses a malicious payload designed to exploit the 12-day old Jira template injection vulnerability tracked as CVE-2019-11581 that leads to remote code execution.

Announcing coreboot 4.10

The 4.10 release covers commit a2faaa9a2 to commit ae317695e3 There is a pgp signed 4.10 tag in the git repository, and a branch will be created as needed. In nearly 8 months since 4.9 we had 198 authors commit 2538 changes to master. Of these, 85 authors made their first commit to coreboot: Welcome! Between the releases the tree grew by about 11000 lines of code plus 5000 lines of comments. Read more Also: Coreboot 4.10 Released With New Support For Many Chromebooks & Random Motherboards

Red Hat and Fedora Leftovers

  • Building an organization that's always learning: Tips for leaders

    In open organizations, informal learning is critical to success. "Informal learning" accounts for all learning that occurs outside a training program, a classroom, or another formalized instruction setting. Unlike the learning in these formalized learning settings, informal learning is unstructured, personal, and voluntary. As a result, systematic study of it is difficult. But due to the prevalence and importance of informal learning in workplaces, several researchers have called for additional research into the subject—and particularly for the design of instruments to actually measure informal learning. Such instruments could likewise be useful in open organizations hoping to measure and foster informal learning practices among employees.

  • 9 people for sysadmins to follow on Twitter

    While Twitter certainly isn't the most open source platform, the open source community on the social network brings a lot of great minds together on a daily basis. The site, as I see it, also democratizes access to these brilliant minds since we're all just one @ away. Here are nine people whose Twitter accounts are making my pursuit of sysadmin knowledge, and its continued evolution, better. They fall across the spectrum of technology with the one thing they have in common being their passionate, informative, and thoughtful perspective. They share a wealth of knowledge from explaining Linux commands through comics, to applying a PhD's worth of knowledge to making DevOps make sense.

  • Fedora 32 System-Wide Change proposal: x86-64 micro-architecture update
    Fedora currently uses the original K8 micro-architecture (without 3DNow! and other AMD-specific parts) as the baseline....
    
  • Fedora Developers Discuss Raising Base Requirement To AVX2 CPU Support

    An early change being talked about for Fedora 32, due out in the spring of next year, is raising the x86_64 CPU requirements for running Fedora Linux. When initially hearing of this plan, the goal is even more ambitious than I was initially thinking: AVX2. A feature proposal for Fedora 32 would raise the x86_64 base-line for their compiler builds to needing AVX2. Advanced Vector Extensions 2 is Intel Sandy Bridge and newer or AMD Jaguar/Bulldozer and newer. This came as quite a surprise even to myself that Fedora is planning to jump straight from their existing AMD K8 baseline to now AVX2-supportive CPUs.

  • Stable docker CE for Fedora 30 are available!

    Do you use docker? If you are using Fedora 30 then I have good news for you. They officially relesed stable docker CE for Fedora 30, yay! Most of us have been waiting for stable docker since February, OMG! You can check issue #600 how frustrating most of docker users because we don’t have stable release and unable to use testing or nightly release because of missing containerd.io and forced dev to seek alternatives using old repo (F29) or using Podman as workaround.

  • Outreachy FHP week 7: Pytest, UI enhancements, FAS search

    From Outreachy.org: The theme for this week is “Modifying Expectations”. Outreachy mentors and interns start the internship with a specific set of project goals. However, usually those goals need to be modified, and that’s perfectly fine! Delays to projects happen. Maybe your project turned out to be more complicated than you or your mentor anticipated. Maybe you needed to learn some concepts before you could tackle project tasks. Maybe the community documention wasn’t up-to-date or was wrong. These are all perfectly valid reasons for projects to be a bit behind schedule, as long as you’ve been working full-time on the project. In fact, free and open source contributors have to deal with these kinds of issues all the time. Projects often seem simple until you start working on them. Project timelines are ususally a very optimistic view of what could happen if everything goes exactly as planned. It often doesn’t, but people still make optimistic plans. Modifying your project timeline to set more realistic goals is a skill all contributors need to learn. [....] I was a beginner in Django when I started working on this project. Earlier I worked on JavaScript-based framework, and switching to Python was a big change for me. So, it was always learning and implementing on my part. Since Django was new to me, I had to learn it fast, at least the core concept. I found some good resources but they were so detailed that at the end of the document, I would have lost interest in some of the topics. Then I found this tutorial, which turned out to be the perfect platform to have an overall grasp of the widely used python framework. I learned about containers, their importance and concept of virtualization. How Docker can also be used when we want to deploy an application to an environment. Understood the concept behind it, learned the basic commands and how to deal with multiple Docker containers. In the second half of my internship, I improved and wrote tests of the project without having any prior knowledge of the concept at the beginning.

Programming Leftovers

  • Excellent Free Books to Learn Java

    Java is a general-purpose, concurrent, class-based, object-oriented, high-level programming language and computing platform first released by Sun Microsystems in 1995. It is related in some ways to C and C++, in particular with regard to its syntax, and borrows a few ideas from other languages. Java applications are compiled to bytecode that can run on any Java virtual machine (JVM) regardless of computer architecture. Java is designed to be simple enough that many programmers can quickly become proficient in the language. It’s one of the most popular programming languages especially for client-server web applications.

  • GFX-RS Portability 0.7 Released With Vulkan Events, Binding Model Improvements

    The GFX-RS high performance graphics API for the Rust programming language and based on Vulkan while mapping to Metal when on Apple systems is out with a new release. GFX-RS continues to be about being a cross-platform API for Rust that is bindless and high performance while retaining the traits of Vulkan but with back-ends as well for Direct3D 11/12, Metal, and even OpenGL 2 / GLES2.

  • Use the Requests module to directly retrieve the market data

    Hello and welcome back to our cryptocurrency project. In the previous article I had mentioned before that I want to use the cryptocompy module to create our new cryptocurrency project, however, after a closer look at the CriptoCompare API I think we have better used the original API to make the rest call instead of using the wrapper module because the original API seems to provide more returned data type than the one offered by the cryptocompy module.

  • Eli Bendersky: Faster XML stream processing in Go

    XML processing was all the rage 15 years ago; while it's less prominent these days, it's still an important task in some application domains. In this post I'm going to compare the speed of stream-processing huge XML files in Go, Python and C and finish up with a new, minimal module that uses C to accelerate this task for Go. All the code shown throughout this post is available in this Github repository the new Go module is here.

  • How to Use Binder and Python for Repoducible Research

    In this post we will learn how to create a binder so that our data analysis, for instance, can be fully reproduced by other researchers. That is, in this post we will learn how to use binder for reproducible research. In previous posts, we have learned how to carry out data analysis (e.g., ANOVA) and visualization (e.g., Raincloud plots) using Python. The code we have used have been uploaded in the forms of Jupyter Notebooks.

  • Wingware Blog: Introducing Functions and Methods with Refactoring in Wing Pro

    In this issue of Wing Tips we explain how to quickly create new functions and methods out of existing blocks of Python code, using Wing Pro's Extract Method/Function refactoring operation. This is useful whenever you have some existing code that you want to reuse in other places, or in cases where code gets out of hand and needs to be split up to make it more readable, testable, and maintainable. Wing supports extracting functions and methods for any selected code, so long as that code does not contain return or yield statements. In that case automatic extraction is not possible, since Wing cannot determine how the extracted function should be called from or interact with the original code.

  • How to Use Binder and Python for Reproducible Research

    In this post we will learn how to create a binder so that our data analysis, for instance, can be fully reproduced by other researchers. That is, in this post we will learn how to use binder for reproducible research. In previous posts, we have learned how to carry out data analysis (e.g., ANOVA) and visualization (e.g., Raincloud plots) using Python. The code we have used have been uploaded in the forms of Jupyter Notebooks. Although this is great, we also need to make sure that we share our computational environment so our code can be re-run and produce the same output. That is, to have a fully reproducible example, we need a way to capture the different versions of the Python packages we’re using.

  • NumPy arange(): How to Use np.arange()

    NumPy is the fundamental Python library for numerical computing. Its most important type is an array type called ndarray. NumPy offers a lot of array creation routines for different circumstances. arange() is one such function based on numerical ranges. It’s often referred to as np.arange() because np is a widely used abbreviation for NumPy. Creating NumPy arrays is important when you’re working with other Python libraries that rely on them, like SciPy, Pandas, Matplotlib, scikit-learn, and more. NumPy is suitable for creating and working with arrays because it offers useful routines, enables performance boosts, and allows you to write concise code.

  • Cogito, Ergo Sumana: Beautiful Soup is on Tidelift

    I've been doing a tiny bit of consulting for Tidelift for a little over a year now, mainly talking about them to open source maintainers in the Python world and vice versa. (See my October 2018 piece "Tidelift Is Paying Maintainers And, Potentially, Fixing the Economics of an Industry".) And lo, in my household, my spouse Leonard Richardson has signed up as a lifter for Beautiful Soup, his library that helps you with screen-scraping projects.

  • Chris Moffitt: Automated Report Generation with Papermill: Part 1

    This guest post that walks through a great example of using python to automate a report generating process. I think PB Python readers will enjoy learning from this real world example using python, jupyter notebooks, papermill and several other tools.

  • Cryptocurrency user interface set up

    As mentioned above, in this article we will start to create the user interface of our latest cryptocurrency project. Along the path we will also use the CryptoCompare API to retrieve data.

  • Python Snippet 2: Quick Sequence Reversal
  • 10x Evilgineers | Coder Radio 367

    Mike rekindles his youthful love affair with Emacs and we debate what makes a "10x engineer". Plus the latest Play store revolt and some of your feedback.