Language Selection

English French German Italian Portuguese Spanish

Hardware

Linux Motherboard Follies

Filed under
Linux
Hardware

linuxplanet.com: Since I stuck my toe in the multi-core CPU waters, it's been an interesting journey. Interesting, that is, in the sense of the famous Chinese curse: "May you live in interesting times." When it comes to computers, these times are a bit too interesting for my liking.

Breaking the Nokia Booklet, Part 2: A win for Wubi.

Filed under
Hardware

Two things are clear from this experience: (1) Nokia made a very poor choice with the GMA 500, and (2) Wubi is a fantastic way to get Linux on your freedom-hating machine.

More here...

Disk-O-Tech: Linux Disk Management

Filed under
Linux
Hardware
HowTos

linux-mag.com: You might have worked with Linux for years and never added an additional disk to your system or perhaps you were too frustrated by Linux’s strange ways of dealing with disks to attempt it. In either case, here’s your opportunity to work through the steps required in adding a new disk to your system.

Open source champion Richard Stallman’s netbook

Filed under
Linux
Hardware

liliputing.com: Ever find yourself wondering what warrior for the open source movement Richard Stallman uses as his primary computer? It’s a Lemote Yeelong netbook.

Sony's First Linux Phone

Filed under
Hardware

katonda.com: Linux is gaining popularity in the mobile phone industry, thanks to Android. Sony Ericsson has also joined the Gnu-Linux club and announced the launch of their first Android-powered phone -- The Xperia X10.

Stuff That Works With Linux #4

Filed under
Hardware

reddevil62-techhead.blogspot: Given that the majority of my digital files include nothing more than MP3s and family photographs, I'm fairly relaxed about how I secure the digital data I carry around with me. But if you're used to carrying sensitive material, whether personal or professional, then I have just the device for you - the iStorage DiskGenie.

ECS NVIDIA GeForce GT 240 512MB

Filed under
Hardware

phoronix.com: A month after NVIDIA launched the GeForce GT 220 graphics card they rolled out the GeForce GT 240, to further fill the performance void between the GT216-based GT 220 and the GeForce GTS 250 that had been around since March. We finally have our hands on a GeForce GT 240 graphics card from the folks over at ECS Elitegroup to see how this GT215 graphics card performs under Linux.

The Open-PC: one step closer to open-hardware

Filed under
Hardware

At the Gran Canaria Open Desktop Summit in July 2009, the Open-PC project was announced. The statement said the project aimed to “cooperatively design a Free Software based computer by and for the community”. Further this PC would use only hardware for which there are free software drivers available. This would be a PC with the minimal compromise required for running a free desktop. In January 2010 the project announced the launch of its first product.

Read the full article at Free Software Magazine.

For those about to Rock - Gentoo-based electronic guitar

Filed under
Linux
Gentoo
Hardware

geek.com: This crazy guitar is actually an open source MIDI system using a sexy touchscreen with multi-touch and reactive fretboard. The result? Called the Misa Digital he fretboard has 144 note buttons, runs Gentoo Linux and, friends, has an Ethernet port with SSH server. Now you can truly hack the Gibson.

Linux and USB 3.0

Filed under
Linux
Hardware

linuxplanet.com: The newest, fast interface, USB 3.0, is finally out, but only one operating system has native support for it: Linux.

Syndicate content

More in Tux Machines

Security News

  • Wednesday's security updates
  • Secure your Elasticsearch cluster and avoid ransomware
    Last week, news came out that unprotected MongoDB databases are being actively compromised: content copied and replaced by a message asking for a ransom to get it back. As The Register reports: Elasticsearch is next. Protecting access to Elasticsearch by a firewall is not always possible. But even in environments where it is possible, many admins are not protecting their databases. Even if you cannot use a firewall, you can secure connection to Elasticsearch by using encryption. Elasticsearch by itself does not provide any authentication or encryption possibilities. Still, there are many third-party solutions available, each with its own drawbacks and advantages.
  • Resolve to Follow These 8 Steps for Better Data Security in 2017
    Getting physically fit is a typical New Year's resolution. Given that most of us spend more time online than in a gym, the start of the new year also might be a great time to improve your security “fitness.” As with physical fitness challenges, the biggest issue with digital security is always stagnation. That is, if you don't move and don't change, atrophy sets in. In physical fitness, atrophy is a function of muscles not being exercised. In digital fitness, security risks increase when you fail to change passwords, update network systems and adopt improved security technology. Before long, your IT systems literally become a “sitting duck.” Given the volume of data breaches that occurred in 2016, it is highly likely that everyone reading this has had at least one breach of their accounts compromised in some way, such as their Yahoo data account. Hackers somewhere may have one of the passwords you’ve used at one point to access a particular site or service. If you're still using that same password somewhere, in a way that can connect that account to you, that's a non-trivial risk. Changing passwords is the first of eight security resolutions that can help to improve your online security fitness in 2017. Click through this eWEEK slide show to discover the rest.
  • Pwn2Own 2017 Takes Aim at Linux, Servers and Web Browsers
    10th anniversary edition of Pwn2Own hacking contest offers over $1M in prize money to security researchers across a long list of targets including Virtual Machines, servers, enterprise applications and web browsers. Over the last decade, the Zero Day Initiative's (ZDI) annual Pwn2Own competition has emerged to become one of the premiere events on the information security calendar and the 2017 edition does not look to be any different. For the tenth anniversary of the Pwn2Own contest, ZDI, now owned and operated by Trend Micro, is going farther than ever before, with more targets and more prize money available for security researchers to claim by successfully executing zero-day exploits.
  • 'Factorio' is another game that was being hit by key scammers
    In another case of scammers trying to buy keys with often stolen credit cards to sell on websites like G2A, the developers of 'Factorio' have written about their experience with it (and other stuff too).

Red Hat News

Development News: LLVM, New Releases, and GCC

PulseAudio 10 and Virtual GPU in Linux

  • PulseAudio 10 Coming Soon, Using Memfd Shared Memory By Default
    It's been a half year since the debut of PulseAudio 9.0 while the release of PulseAudio 10 is coming soon. PulseAudio 9.99.1 development release was tagged earlier this month, then usually after x.99.2 marks the official release, so it won't be much longer now before seeing PulseAudio 10.0 begin to appear in Linux distributions.
  • Experimenting With Virtual GPU Support On Linux 4.10 + Libvirt
    With the Linux 4.10 kernel having initial but limited Intel Graphics Virtualization Tech support, you can begin playing with the experimental virtual GPU support using the upstream kernel and libvirt.