Language Selection

English French German Italian Portuguese Spanish

Gaming

OpenMW 0.39.0

Filed under
Gaming
  • OpenMW 0.39.0 Released!

    The OpenMW team is proud to announce the release of version 0.39.0! Grab it from our Downloads Page for all operating systems. This release brings background cell loading and caching, which is a feature not to be missed. Initial support for object shaders has found its way back into our engine, and a host of bugs have been smashed. See below for the full list of changes.

  • OpenMW 0.39 Open-Source Elder Scrolls III: Morrowind Remake Lands for GNU/Linux

    The OpenMW project today, April 16, 2016, announced yet another maintenance version in the development cycle of their open-source remake of the Elder Scrolls III: Morrowind game for GNU/Linux operating systems.

Leftovers: Gaming

Filed under
Gaming

Saints Row 2: Linux Gaming

Filed under
Gaming

Leftovers: Gaming

Filed under
Gaming

Gaming on Linux Roundup

Filed under
Gaming

Leftovers: Gaming

Filed under
Gaming
  • The HTC Vive and Valve's SteamVR don't yet support Linux and SteamOS

    The HTC Vive headset and Valve’s SteamVR are finally released and shipping! You might expect that the HTC Vive works with Valve’s own SteamOS and Linux, but it doesn’t. It’s Windows-only for now, just like the Oculus Rift.

  • Paws: A Shelter 2 Game & The Lonesome Fog both now available on Linux & SteamOS

    Paws: A Shelter 2 Game is a standalone, single player, adventure, platformer set in the world of Shelter 2. The Lonesome Fog is a living book that seeks to expand on the concept of storytelling and explores the plight of a young cub trapped in a cycle of fear, cowardice and uncertainty.

  • ARK: Survival Of The Fittest the free online survival arena is now on Linux & SteamOS

    ARK: Survival Of The Fittest, the spin off from ARK: Survival Evolved is now available on Linux & SteamOS, it's free too. Completely free that is, no pay for anything here as they are funded by the original ARK.

    This appeals to me much more than the original ARK game, as there will be more focus on action and taking down other players. That just seems more interesting than generally surviving to me.

    It might take you a while to get into a game, as you have to wait for everyone to either join or create a tribe before the game begins. Prepare to wait a while, as I joined a few with people just standing around doing nothing. I hope they implement a timer for people to join or create tribes so people can't spoil it for others.

  • There's an open source Standalone Steam Controller Driver

    I hope to see this project continue on and on, and eventually have it work alongside Steam as well. If you have the driver, you will need to disable it to use it properly inside of Steam, having that issue somehow sorted out by itself would be awesome without user interaction.

  • Survival game Rust adds female player models, assigns gender to Steam accounts at random

    Your gender is linked to your SteamID, so what you're assigned to you're essentially stuck with. I'm fine with this, as I understand it's just a game. Others however, are not happy with this change.

    I can understand both sides of the argument, people want their character to reflect them as an extension of themselves. I am a male in any game that lets me choose, simply because I also have that view of wanting it to represent me, but it's certainly not a deal-breaker.

Benchmarking/Profiling and Games

Filed under
Graphics/Benchmarks
Gaming

GNU/Games: Linux vs Windows Benchmarks

Filed under
GNU
Graphics/Benchmarks
Linux
Gaming

Leftovers: Gaming

Filed under
Gaming

Leftovers: Gaming

Filed under
Gaming
Syndicate content

More in Tux Machines

Security: WPA2, RSA/TPM, and Microsoft Breach

  • Google and Apple yet to fix Wi-Fi hole in a billion devices

    The WPA2 security protocol has been a mandatory requirement for all devices using the Wi-Fi protocol since 2006, which translates into billions of laptops, mobiles and routers. The weakness identified by Mathy Vanhoef, a digital security researcher at the Catholic University of Leuven (KUL) in Belgium, lies in the way devices running WPA2 encrypt information.

  • The Flawed System Behind the Krack Wi-Fi Meltdown

    No software is perfect. Bugs are inevitable now and then. But experts say that software standards that impact millions of devices are too often developed behind closed doors, making it difficult for the broader security community to assess potential flaws and vulnerabilities early on. They can lack full documentation even months or years after their release.

  • Factorization Flaw in TPM Chips Makes Attacks on RSA Private Keys Feasible

    Security experts say the bug has been present since 2012 and found specifically in the Infineon’s Trusted Platform Module used on a large number of business-class HP, Lenovo and Fijitsu computers, Google Chromebooks as well as routers and IoT devices.

  • ROCA: RSA encryption key flaw puts 'millions' of devices at risk

    This results in cyber criminals computing the private part of an RSA key and affects chips manufactured from 2012 onwards, which are now commonplace in the industry.

  • Infineon RSA Key Generation Issue

    Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.

  • Microsoft remains tight-lipped about 2013 internal database hack [sic]

    A secretive internal database used by Microsoft to track bugs in its software was compromised by hackers [sic] in 2013.

  • Exclusive: Microsoft responded quietly after detecting secret database hack in 2013

    Microsoft Corp’s secret internal database for tracking bugs in its own software was broken into by a highly sophisticated hacking [sic] group more than four years ago, according to five former employees, in only the second known breach of such a corporate database.

Red Hat reduces IoT tradeoffs and Asia Coverage

  • Industry Spotlight: Red Hat reduces IoT tradeoffs
    Organizations rolling out the IoT usually aren’t prepared for the additional complexity. With the IoT, data volumes grow exponentially, infrastructure management gets more complicated and the security vulnerabilities increase disproportionately. Nevertheless, IT departments are expected to handle all these changes competently without proportional increases in budget or other resources.
  • Analyse Asia 211: Red Hat in Asia & Open Innovation Institute with Dirk-Peter van Leeuwen
    Dirk-Peter van Leeuwen, senior vice president & general manager at Redhat, Asia Pacific, joined us to discuss the company’s footprint across Asia and the recent launch of their new Open Innovation Institute in Singapore. We discuss how Asian companies are in different phases of digital transformation from culture to innovation and adjusting against digital disruption.

Samsung and Tizen: Bixby 2.0, Tizen 3.0, GNU/Linux on DeX

Ubuntu 17.10: What’s New? [Video]

It’s Artful Aardvark arrival day today (no, really!) and to mark the occasion we’ve made our first video in 3 years! Prime your eyeballs and pop in some earbuds as we (try to) bring you up to speed on what’s new in Ubuntu 17.10. At a smidgen over 3 minutes long we think our video is perfect for watching on your commute; when you’re bleary eyed in bed; or when you get the tl;dr feels thinking about our fuller, longer, and far wordier Ubuntu 17.10 review (due out shortly). Read more