Language Selection

English French German Italian Portuguese Spanish

HowTos

Set Up Two Factor Auth (2FA) on Your Smartphone & Linux Desktop... now.

Filed under
HowTos

Here's a tutorial to get 2FA working on both your smartphone and Linux desktop using oathtool.

Software and today's howtos

Filed under
Software
HowTos
  • Kodi 18 Media Center to Be Dubbed "Leia," In Honor of the Late Carrie Fisher

    To celebrate 40 years of the Star Wars saga, the Kodi developers announced earlier today the codename of the next major release of their open-source and multiplatform media center.

    As many of you probably know from our regular reports, Kodi 17 "Krypton" is currently in heavy development with a first Release Candidate snapshot out of the door at the end of 2016, but the team was already looking to codename the next major version, Kodi 18. In early December, they asked the community to vote for the Kodi 18 code name, which should have start with the letter L.

  • GENIVI Alliance's GENIVI Vehicle Simulator

    By providing a realistic simulated driving experience, the new GENIVI Vehicle Simulator (GVS) assists adopters to develop and test the user interface of an open in-vehicle infotainment (IVI) system safely, thereby identifying and executing necessary design changes quickly and efficiently.

  • PlayStation 2 Emulator 'PCSX2' New Version Released, Install In Ubuntu/Linux Mint Via PPA

    PCSX2 is a PlayStation 2 emulator for Windows and Linux. It was started by the team behind PCSX (an emulator for the original PlayStation) back in 2002, and as of early 2012 development is still active. The emulator achieved playable speeds only by mid-2007 and subsequent versions have improved speed and compatibility making it both the ultimate solution for PS2 emulation and the instrument to keep and preserve the PS2 legacy in the modern world. Though not yet perfect the program can successfully emulate most commercial PS2 games at playable speeds and good visuals (often better than the original PS2). The project is open source, and it is licensed under the GNU General Public License v3. Currently up to 3 cores are supported (2 cores and an additional one if the new MTVU speed hack is used). To make PCSX2 efficiently use 4 or more cores will require major code changes. PCSX2 only uses 2 cores,so if you have more the CPU usage will be way less 100%. Even if you have exactly 2 cores, the emulator will not cause 100% CPU usage because of the way threading works. This does NOT mean PCSX2 isn't using the full power of your CPU, it is normal.

  • Go paperless: How to install and use LogicalDOC for document management in Linux
  • Emerald – Simple, Clean and Fresh Icon Theme For Linux
  • How to record a region of your desktop as animated GIF on Linux
  • sTLP - Don't go chasing power management

today's howtos

Filed under
HowTos

today's howtos

Filed under
HowTos

Overcoming Ubuntu Wi-Fi Not Working

Filed under
Ubuntu
HowTos

One of the biggest issues I still see cropping up for Ubuntu (and other distributions) are challenges connecting to Wi-Fi networks. This article will provide actionable solutions to overcome common Ubuntu Wi-Fi issues.

Read more

Syndicate content

More in Tux Machines

today's howtos

Security Leftovers

  • Java and Python FTP attacks can punch holes through firewalls
    The Java and Python runtimes fail to properly validate FTP URLs, which can potentially allow attackers to punch holes through firewalls to access local networks. On Saturday, security researcher Alexander Klink disclosed an interesting attack where exploiting an XXE (XML External Entity) vulnerability in a Java application can be used to send emails.
  • Microsoft: no plans to patch known bugs before March [Ed: Microsoft is keeping open 'back doors' that are publicly known about, not just secret ones]
    Microsoft has no plans to issue updates for two vulnerabilities, one a zero-day and the other being one publicised by Google, before the scheduled date for its next round of updates rolls around in March. The company did not issue any updates in February, even though it had been scheduled to switch to a new system from this month onwards. It gave no reason for this, apart from saying: "This month, we discovered a last minute issue that could impact some customers and was not resolved in time for our planned updates today. "After considering all options, we made the decision to delay this month’s updates. We apologise for any inconvenience caused by this change to the existing plan." The Google-disclosed bug was made public last week, and is said to be a flaw in the Windows graphic device interface library that can be exploited both locally and remotely to read the contents of a user's memory.
  • Microsoft issues critical security patches, but leaves zero-day flaws at risk
    Microsoft has patched "critical" security vulnerabilities in its browsers, but has left at least two zero-day flaws with public exploit code. The software giant released numerous patches late on Tuesday to fix flaws in Adobe Flash for customers using Internet Explorer on Windows 8.1 and later, as well as Edge for Windows 10.

Red Hat News

  • Why upstream contributions matter when developing open source NFV solutions.
    When software is developed using open source methods, an upstream repository of the code is accessible to all members of the project. Members contribute to the code, test it, write documentation and can create a solution from that code to use or distribute under license. If an organization follows the main stream or branch of the upstream code their solution will receive all the changes and updates created in the upstream repository. Those changes simply “flow down” to the member’s solution. However, if a member organization forks the code — if they create a solution that strays from the main stream — their solution no longer receives updates, fixes and changes from the upstream repository. This organization is now solely responsible for maintaining their solution without the benefit of the upstream community, much like the baby salmon that took a tributary and then have to fend for themselves rather than remain in the main stream and receive the benefit and guidance of the other salmon making their way to the ocean.
  • HPE and Red Hat Join Forces to Give Customers Greater Choice for NFV Deployments
    Hewlett Packard Enterprise ( NYSE : HPE ) and Red Hat, Inc. ( NYSE : RHT ) announced today they are working together to accelerate the deployment of network functions virtualization (NFV) solutions based on fully open, production-ready, standards-based infrastructures. HPE plans to offer ready-to-use, pre-integrated HPE NFV System solutions and HPE Validated Configurations incorporating Red Hat OpenStack Platform and Red Hat Ceph Storage for communications service providers (CSPs).
  • Red Hat Joins the OpenPower Foundation
    As part of our commitment to delivering open technologies across many computing architectures, Red Hat has joined the OpenPOWER Foundation, an open development community based on the POWER microprocessor architecture, at the Platinum level. While we already do build and support open technologies for the POWER architecture, the OpenPOWER Foundation is committed to an open, community-driven technology-creation process – something that we feel is critical to the continued growth of open collaboration around POWER.
  • Buy, Sell or Hold? Analysts Approach: HCA Holdings, Inc. (HCA), Red Hat, Inc. (RHT)?

Linux and FOSS Events