Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 28 Jun 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Snapcraft 2.12 Coming Soon to Ubuntu 16.04, Lets You Access the Parts Ecosystem Roy Schestowitz 28/06/2016 - 12:05pm
Story GeckoLinux 421.160627.0 "Static" Editions Released Based on openSUSE Leap 42.1 Rianne Schestowitz 28/06/2016 - 11:20am
Story Parsix GNU/Linux 8.5 and 8.10 Receive New Security Patches, Latest LTS Kernels Rianne Schestowitz 28/06/2016 - 11:19am
Story Five reasons to switch from Windows to Linux Rianne Schestowitz 28/06/2016 - 11:17am
Story today's leftovers Roy Schestowitz 28/06/2016 - 9:23am
Story Leftovers: OSS and Sharing Roy Schestowitz 28/06/2016 - 9:18am
Story Security Leftovers Roy Schestowitz 28/06/2016 - 9:13am
Story Windows 'Upgrade' Roy Schestowitz 28/06/2016 - 8:50am
Story Canonical Releases New Kernel Update for Ubuntu 12.04 LTS and Ubuntu 14.04 LTS Rianne Schestowitz 28/06/2016 - 8:16am
Story This programmable, open source outlet can do things that off-the-shelf smart plugs can't Rianne Schestowitz 28/06/2016 - 8:14am

Snapcraft 2.12 Coming Soon to Ubuntu 16.04, Lets You Access the Parts Ecosystem

Filed under
Ubuntu

The development of Snapcraft, the handy Ubuntu utility that lets you create Snaps for your applications, which you can now distribute across multiple operating systems, is advancing at a fast pace, and it looks like Snapcraft 2.12 will land soon.

Read more

GeckoLinux 421.160627.0 "Static" Editions Released Based on openSUSE Leap 42.1

Filed under
Linux
SUSE

Users of the GeckoLinux distribution are in for yet another treat after the announcement of updated GeckoLinux 421.160623.0 "Rolling" Editions based on the latest openSUSE Tumbleweed snapshots.

Read more

Parsix GNU/Linux 8.5 and 8.10 Receive New Security Patches, Latest LTS Kernels

Filed under
GNU
Linux

Today, June 28, 2016, the developers behind the Debian-based Parsix GNU/Linux computer operating system have announced that new security patches and kernel versions are available for both Parsix GNU/Linux 8.5 and 8.10.

Read more

Five reasons to switch from Windows to Linux

Filed under
Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system.

Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why.

Read more

today's leftovers

Filed under
Misc

Leftovers: OSS and Sharing

Filed under
OSS

Security Leftovers

Filed under
Security
  • Chrome vulnerability lets attackers steal movies from streaming services

    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.

  • Large botnet of CCTV devices knock the snot out of jewelry website

    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices.

    The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.

  • Study finds Password Misuse in Hospitals a Steaming Hot Mess

    Hospitals are pretty hygienic places – except when it comes to passwords, it seems.

    That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff.

    The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.

  • Why are hackers increasingly targeting the healthcare industry?

    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack.

    In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.

  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud

Windows 'Upgrade'

Filed under
GNU
Linux
Microsoft
  • When A Computer Is Ready for the Junk Pile

    To that point, there was a report that a mail server failure in a large business office remained a mystery for two days until someone found an old Pentium II back in the corner of some obscure closet with a burned out power supply. It is reported that the Slackware/Debian/Red Hat machine had been plugging away as a mail server for a number of years, completely unattended. That’s feasible I suppose, but I further suppose that it’s a modern day parable about how open source can indeed, carry the day.

  • Microsoft draws flak for pushing Windows 10 on PC users

    With about a month left for many PC users to upgrade to Windows 10 at no charge, Microsoft is being criticized for its aggressive — some say too aggressive — campaign to get people to install the new operating system.

  • Microsoft forks out thousands over forced Windows 10 upgrade

    Microsoft has had to pay a Windows user in California US$10,000 over a forced upgrade to Windows 10, according to a report in the Seattle Times.

    The user, Teri Goldstein, runs a travel agency in Sausalito, a San Francisco Bay Area city in Marin County, California.

  • A lawsuit over an unwanted Windows 10 upgrade just cost Microsoft $10,000

    Microsoft recently paid a (very small) price for its Windows 10 upgrade tactics, and that was before they became increasingly aggressive.

  • Updategate: California woman awarded $10,000 for borked Windows 10 upgrade

    A CALIFORNIA woman has set a precedent after a court ruled that she was entitled to damages over the installation of Windows 10 on her machine.

    Teri Goldstein, a travel agent, testified that the new operating system had auto-downloaded, started to install, failed, and left her Windows 7 computer running painfully slowly and often unusable for days.

    "I had never heard of Windows 10," Goldstein told reporters. "Nobody ever asked me if I wanted to update."

  • Microsoft pays out $10,000 for automatic Windows 10 installation

    Company withdraws appeal leaving it liable for $10,000 compensation judgment after botched automatic upgrade of travel agent’s computer

  • Microsoft Pays Woman $10,000 Over Its Forced Windows 10 Upgrade

    As a result of a legal suit, Microsoft has paid a woman $10,000 over the forced Windows 10 upgrade.

  • 'I urge everyone to fight back' – woman wins $10k from Microsoft over Windows 10 misery

    A California woman has won $10,000 from Microsoft after a sneaky Windows 10 update wrecked the computer she used to run her business. Now she's urging everyone to follow suit and "fight back."

    Teri Goldstein – who manages a travel agency in Sausalito, just north of San Francisco – told The Register she landed the compensation by taking Microsoft to a small claims court.

    Rather than pursue a regular lawsuit, she chose the smaller court because it was better suited to sorting out consumer complaints. Crucially, it meant Microsoft couldn't send one of its top-gun lawyers – or any lawyer in fact: small claims courts are informal and attorneys are generally not allowed. Instead, Redmond-based Microsoft had to send a consumer complaints rep to argue its case.

Canonical Releases New Kernel Update for Ubuntu 12.04 LTS and Ubuntu 14.04 LTS

Filed under
Ubuntu

We reported the other day that Canonical released a major kernel update for its Ubuntu 16.04 LTS (Xenial Xerus) operating system, and it appears that it also affected users of the Ubuntu 15.10 (Wily Werewolf) distribution.

Read more

This programmable, open source outlet can do things that off-the-shelf smart plugs can't

Filed under
OSS

Excited by the idea of an open-source, Arduino-based outlet, capable of remotely controlling your various household devices?

If so, you’ll definitely want to check out the Portlet: a versatile portmanteau of “portable” and “outlet,” which — despite only consisting of 4 buttons and a simple 2×15 character LCD screen — can be programmed to do everything from switching your lights on at a certain time to keeping your coffee heated at the perfect temperature.

Read more

How I welcomed an immigrant family with a Linux laptop

Filed under
Linux

From the LibriVox website, I downloaded the free, public domain audio reading of Helen Keller’s amazing autobiography, The Story of My Life, which is an excellent book that was first published in 1903. Then, I downloaded the text of the book (it's in the public domain) from Project Gutenberg and imported the text into Calibre, the free ebook reading software. Using my favorite Linux screencasting software, SimpleScreenRecorder, I married the text (in a large font) to the audio recording. I created the first 11 chapters of the book as video files in this way, and uploaded them to YouTube. I also copied these onto the Dell Inspiron 9400, so these video files could be viewed offline.

Read more

What is the Fedora Modularity project and how do you get involved ?

Filed under
Red Hat

The Fedora Modularity Project is an effort to fix several problems that all distributions face. One of them is the disconnect between Fedora's release cycle and the release cycle of larger Fedora components like for example GNOME, KDE or even the kernel. Those components obviously don't have the same lifecycle that Fedora follows and Fedora can't always wait for major components to be released upstream and on the other hand doesn't want to ship outdated software.
An earlier attempt to work around this disconnect were the Fedora Rings with a central core 'base design', a concentric ring #2 around it for 'environments and stacks' and a ring #3 for applications. It wasn't possible to have different release cycles for packages in ring #2 as dependencies wouldn't allow that most of the time.

Read more

antiX 16 & OpenMandriva 3.0 Beta 2 Release, openSUSE Numbers

Filed under
-s

It was a busy day in Linux with Slack, antiX, and OpenMandriva all working towards their next releases. Sam Varghese quoted Alberto Planas who said openSUSE sees about 1600 new installations each month and Gentoo's Donnie Berkholz posted his retirement notice. Bruce Byfield posted two interesting articles today, one explaining the difference between an Open Source user and a Free Software Activist and the other describing the stringent Debian packaging policies. As a bonus, a lady in California won a $10,000 award in small claims court from Microsoft over its Windows 10 behavior.

Read more

Also: OpenMandriva Lx 3.0 Beta2 is here!

New Releases!

Linux Practicality vs Activism

Filed under
GNU
Linux

One of the greatest things about running Linux is the freedom it provides. Where the division among the Linux community appears is in how we value this freedom.

For some, the freedom enjoyed by using Linux is the freedom from vendor lock-in or high software costs. Most would call this a practical consideration. Others users would tell you the freedom they enjoy is software freedom. This means embracing Linux distributions that support the Free Software Movement, avoiding proprietary software completely and all things related.

In this article, I'll walk you through some of the differences between these two freedoms and how they affect Linux usage.

Read more

Dual-core MCU Arduino compatible SBC has WiFi and audio

Filed under
Linux

T-Firefly’s open-spec, Arduino Uno compatible Fireduino SBC offers Rockchip’s dual-core, Cortex-M3 RKNanoD MCU, plus WiFi, RTC, and MP3 audio.

Chinese embedded firm T-Firefly is apparently the new name for T-Chip Technology, which sponsors the Firefly open source hardware project. Its Arduino I/O- and IDE-compatible, dual-core Fireduino board is supported by the Firefly project along with Linux/Android hacker boards like the Rockchip RK3128 based Firefly-RK3288 Reload and Firefly FirePrime. Schematics and the like have already been posted.

Read more

A Variety Of OpenGL/OpenCL NVIDIA 367.27 vs. AMD Linux 4.7 + Mesa Git Benchmarks

Filed under
Graphics/Benchmarks

For your viewing pleasure this afternoon are some fresh NVIDIA GeForce GTX 900/1000 benchmarks with the 367.27 display driver compared to various Radeon GCN GPUs using a patched Linux 4.7 kernel and Mesa 12.1-dev Git as of this past weekend.

Read more

Steven J. Vaughan-Nichols on Red Hat

Filed under
Red Hat
  • ​Red Hat's JBoss moves to the cloud

    At Red Hat Summit in San Francisco, Red Hat announced the release of Red Hat JBoss Enterprise Application Platform (EAP) 7. The company also introduced the JBoss Core Services Collection to help developers create JBoss enterprise applications.

  • ​Open-source Microsoft protocol aims to be a programming standard

    Microsoft -- yes, Microsoft -- announced at the DevNation conference in San Francisco that it's releasing an open-source language server protocol. More interesting still, this is being done in concert with Codenvy and Red Hat.

  • ​Red Hat makes container development easier

    In San Francisco at Red Hat Summit, Red Hat announced the release of the Red Hat Container Development Kit 2.1 (RHCDK).

    This new developer kit, one of the many free programming tool kits Red Hat offers its Linux customers, is meant to enable programmers to easily create enterprise-ready containerized applications which target both OpenShift 3 development and Red Hat Enterprise Linux (RHEL) environments.

SFLC represents FOSS developers at the OECD 2016 Ministerial Meeting on the Digital Economy: Innovation, Growth and Social Prosperity

Filed under
GNU
OSS

On 21-23 June 2016, Ministers and stakeholders gathered in Cancún, Mexico, for an OECD Ministerial Meeting on the Digital Economy: Innovation, Growth and Social Prosperity, to move the digital agenda forward in four key policy areas foundational to the growth of the digital economy. Our Legal Director, Mishi Choudhary represented the United States civil society at the OECD Ministerial Panel on The Economic and Social Benefits of Internet Openness, chaired by the Canadian Minister of Innovation, Science, and Economic Development Hon’ble Navdeep Singh Bains.

Read more

Syndicate content

More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud