Language Selection

English French German Italian Portuguese Spanish


Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

Programming Leftovers

  • Experiment with the OpenShift API Management Developer Sandbox | Red Hat Developer

    Red Hat OpenShift API Management is a hosted, managed service that helps developers update, deploy, and scale cloud-native, integrated applications. OpenShift API Management is an add-on product to our managed Red Hat OpenShift cloud. Until recently, to try out OpenShift API Management, you needed access to Red Hat OpenShift Dedicated or Red Hat OpenShift Service on AWS. But now we are excited to announce the availability of the Red Hat OpenShift API Management Developer Sandbox environment. In this article, you'll learn about three things you can do today in this environment by following along with our sandbox activity.

  • Why Devs and ISVs Need to Rethink their Base Container Image Strategy  | SUSE Communities

    In a world where stability, agility and security compliances are hot topics, it is important to decide the base image for the applications (current and new ones). In this blog I will talk about the most widely used images by application developers, introducing Suse BCI, its registry and their multiple features. I will finish with a hands-on using the images and performing some buildings.

  • Filter unwanted notifications in Cryostat 2.1 | Red Hat Developer

    Cryostat has always issued notifications when monitoring Java applications with Java Flight Recorder (JFK). Version 2.1 of Cryostat has a new implementation and interface for notifications that increases the amount of information offered, enhances the user's control over what is displayed, and improves Cryostat performance.

  • Write C applications using Vely on Linux |

    Vely is a tool for writing web and command-line applications in C. Vely combines high performance and the low footprint associated with C programming with ease of use and improved safety reminiscent of languages like PHP. It's free and open source software, and licensed under GPLv3 and LGPL 3 for libraries, so you can even build commercial software with it. Vely works on major Linux distributions and processor architectures. You can use webservers, such as Apache, Nginx, or others, and databases such as MariaDB, PostgreSQL, and SQLite. You can use Vely for web applications, command-line programs, as middleware, database applications, services software, data integration, IoT (Internet of Things), and anywhere else. It's well suited for the cloud, works easily in a container, and, due to low resource requirements, it's also a good choice when memory and processing power are at a premium.

  • Document your source code with Doxygen on Linux |

    When trying to familiarize yourself with someone else's project, you usually appreciate the comments left behind that help you understand the meaning of their code. In the same way, whenever you are programming, whether for yourself or for others, it is good practice to comment your own code. All programming languages offer a special syntax to mark a word, a line, or a whole section as a comment. Those areas are then ignored by the compiler or interpreter when the source code is processed. Comments don't take the place of documentation, but there is a way to use your comments to produce documentation easily. Meet Doxygen, an open source tool for generating HTML or LaTeX documentation based on comments in the code. Doxygen enables you to provide a comprehensive overview of the structure of your code without additional effort. While Doxygen is mainly used to document C++, you can use it for many other languages, like C, Objective-C, C#, PHP, Java, Python, and more.

  • This Week In Rust: This Week in Rust 444

today's howtos

  • How to change Raspberry Pi DNS Settings

    Domain Name System commonly referred as DNS is a decentralized naming system that automatically translates your internet address to a numeric machine address which your system uses. It’s a simple internet phonebook used to access online information using the domain names and translates them to IP addresses so as to enable the browser to load the internet resources. In this tutorial, you will get to know how you can change DNS settings on Raspberry Pi and use the device as a DNS server.

  • Complete Guide to Access Raspberry Pi Remotely Using Dataplicity

    Dataplicity is an online platform that allows you to control your Raspberry Pi device. It works similar to an SSH connection, but it doesn’t require any complex setup or third-party tool to manage the Raspberry Pi. It only needs a browser and a good internet connection to access your device with or without the Firewall option easily. In this tutorial, we will show you how you can access and control your Raspberry Pi through Dataplicity.

  • How to Check Dependencies of a Package in Ubuntu 22.04

    In Linux operating systems, especially for Ubuntu users, the package installation from the apt command is very popular because it’s pretty straightforward and doesn’t require any complex installation method. The command will install the package with the required dependencies most of the time. However, in some cases, you may encounter package dependencies error which may be a hectic task for some people to find out the dependencies information needed to install a package. This article is a detailed guideline on checking the dependencies of a package in Ubuntu 22.04.

  • How to Fix umount target is busy in Linux
  • How to boot, shut down, and suspend your system from the Linux command line | Enable Sysadmin

    Learn how to schedule timed shutdowns and reboots with systemd and to hibernate your system with systemctl.

  • A Complete Guide to Install Gitea on Ubuntu 22.04

    Gitea is a top notch open-source self-hosted Git server similar to GitLab written in the Go language. However, it is more straightforward, lightweight and easy to configure as compared to GitLab. It includes various features such as notification, repository file editor, user management and much more. The tutorial provides the simple guidelines to install Gitea on Ubuntu 22.04 LTS.

  • A complete guide to install and use Gnome Shell Extensions on Ubuntu 22.04

    Gnome shell is a popular next-generation graphical shell for the Linux operating system that includes a set of core interface options such as windows switching, launching applications and view notifications. To extend the Gnome desktop experience, the Gnome shell provides several extensions that you can easily install on your operating system. In this tutorial, we will assist you with how you can install Gnome shell extensions on Ubuntu 22.04.

  • How to Install and Setup PhotoPrism on Raspberry Pi

    PhotoPrism is a self-hosted platform that helps you manage and organize your photos on a private server. It keeps your photos saved by storing them in your home folder only. It works similar to Google Photos but includes additional features such as identifying duplicate photos, removing noise from the images, securing photo-sharing and much more. In this article, you will find the method to set up PhotoPrism on Raspberry Pi.

  • How to Install Ubuntu Server 22.04 LTS on Raspberry Pi 4

    Ubuntu Server 22.04 LTS is the latest Ubuntu series released on April 21, 2022 that has long term support till 2032. It includes cloud images for Amazon Web services, Google Cloud and Microsoft Azure. All these services are incorporated with the advanced security updates. The latest series further includes the OpenSSL 3.0 that makes the cryptography more purposeful and secure. Having the advantage of running the Ubuntu server on all platforms, it would be fair enough to say that this operating system will be an ideal fit for your Raspberry Pi device. This tutorial will provide you with the quick approach to install Ubuntu Server 22.04 LTS on Raspberry Pi 4.

  • How To Install Apache Solr 9.0 on Fedora 36/35 – TecAdmin

    Apache Solr is an open-source search platform written on Java. Solr provides full-text search, spell suggestions, custom document ordering and ranking, Snippet generation, and highlighting. This tutorial will help you to install Apache Solr 9.0 on Fedora 36/35/34/33/32 Linux systems.

today's leftovers

  • Adam Young: Building Linux tip-of-tree on an Ampere based system

    I Have an Ampere Altra-Max/INGRASYS Yushan Server System running Centos 8 stream.

  • How to Kill a Process in Linux Command Line

    It has been an awesome day on your Linux system, and suddenly a process starts to slow down the whole computer. It is not that important, and you want to stop its execution.

  • SWO: An ARM Printf By Any Other Name

    I’ll confess. Although printf-style debugging has a bad rep, I find myself turning to it on occasion. Sure, printf is expensive and brings in a lot of code, but if you have the space and time to use it while debugging you can always remove it before you are finished. However, what if you don’t have an output device or you are using it for something else? If you are using most modern ARM chips, you have another option — a dedicated output channel that is used for several things, including debugging output. I decided I wanted to try that on the Blackpill running mbed, and found out it isn’t as easy as you might think. But it is possible, and when you are done reading, you’ll be able to do it, too.

Proprietary and Microsoft Leftovers

  • Data ordering attacks | Light Blue Touchpaper

    Most deep neural networks are trained by stochastic gradient descent. Now “stochastic” is a fancy Greek word for “random”; it means that the training data are fed into the model in random order. So what happens if the bad guys can cause the order to be not random? You guessed it—all bets are off. Suppose for example a company or a country wanted to have a v, but still be able to pretend that its training was actually fair. Well, they could assemble a set of financial data that was representative of the whole population, but start the model’s training on ten rich men and ten poor women drawn from that set ­ then let initialisation bias do the rest of the work.

  • FTC fines Twitter $150M for using 2FA info for targeted advertising [Ed: "2FA" is very often just fake security; there are many technical issues with it as well, set aside privacy issue]
  • FTC Politely Asks Education Companies If They Would Maybe Stop Spying On Kids

    If you hadn’t noticed, the U.S. doesn’t give much of a shit about this whole privacy thing. Our privacy regulators are comically and intentionally understaffed and underfunded, we still have no meaningful privacy law for the Internet era, and when regulators do act, it’s generally months after the fact with penalties that are easily laughed off by companies rich from data over-collection.

  • DuckDuckGo’s “agreement with Microsoft” allows trackers to bypass privacy settings of DuckDuckGo “Privacy Browser”. – BaronHK's Rants

    DuckDuckGo’s “agreement with Microsoft” allows trackers to bypass privacy settings of DuckDuckGo “Privacy Browser”. Why would they block them? They’re hosted on Microsoft Azure and get their search results from Microsoft Bing. DuckDuckGo is just a thrall of Microsoft, and it lets them sell their products while hiding who they really are, from people who know that the Microsoft brand is toxic.

  • Warning: You should stop using Tails Linux NOW! [Ed: Brian Fagioli with another idiotic clickbait like Microsoft media operatives I saw hours ago; lots of actively exploited holes in Microsoft products are revealed by the dozens each day by CISA, so a distraction is sorely needed]
  • Blizzard: No Piracy Filters? That's Evidence of Intentional Infringement

    A recent DMCA notice sent by Blizzard to Github demands the takedown of an avatar depicting the gaming company's character 'Chef Nomi'. While legally sound up to this point, Blizzard's notice goes on to inform the coding platform that its failure to deploy piracy filtering technologies is "evidence of intentional facilitation of copyright infringement." In Github's case? Not even close.