Language Selection

English French German Italian Portuguese Spanish

Articles from 2008

This began as a list of original articles found on tuxmachines.org, either by me or someone else, but it has since morphed into a list of original articles found on tuxmachines.org and the articles I've had published elsewhere.

  1. Why the world isn't ready for Linux* - Dec 30, 2008
  2. My New Laptop and Linux* - Dec 25, 2008
  3. Revised Slackware keeps it simple - Dec 23, 2008
  4. openSUSE 11.1 makes Christmas come early - Dec 18, 2008
  5. The State of UK Terrestrial Web TV* - Dec 15, 2008
  6. How about "just using" instead of "migrating"?* - Dec 12, 2008
  7. Meet PCLinuxOS 2009 (Beta 1) - Oct 18, 2008
  8. Foresight Kid's can inspire young minds - Oct 09, 2008
  9. Sidux grows on you - Oct 08, 2008
  10. What Using Linux Means to Me* - Oct 06, 2008
  11. Why I Choose Linux* - Oct 06, 2008
  12. What I wish I'd read months ago about KDE3 vs. KDE4* - Oct 02, 2008
  13. Mandriva 2009/KDE 4.1 Revisited* - Sep 27, 2008
  14. The worlds best Linux Distro is now available* - Sep 26, 2008
  15. Michael Larabel talks about Phoronix - Sep 15, 2008
  16. Some Reasons NOT to use Linux. Ever. At all.* - Sep 11, 2008
  17. Dell Mini 9....* - Sep 09, 2008
  18. Linux-powered LinPC desktop is a bargain - Sep 08, 2008
  19. Mandriva 2009 Beta 1 & KDE 4.1 - A Brief Report* - Aug 15, 2008
  20. Gentoo 2008.0: Return to greatness? - Aug 7, 2008
  21. Parsix GNU/Linux 1.5r1 - Aug 04, 2008
  22. Tux's Dream* - July 25, 2008
  23. Welcome to my Nightmare - July 21, 2008
  24. Proprietary software? Counsel objects - July 17, 2008
  25. Desktop Distros* - July 14, 2008
  26. Linux is a tool* - July 8, 2008
  27. Penumbra Overture - If You Dare - July 5, 2008
  28. On OpenSuse 11* - July 1, 2008
  29. Battle of the Titans - Mandriva vs openSUSE: The Rematch - June 25, 2008
  30. New media center OS is pleasing to the eye and ear - June 23, 2008
  31. Kudos to openSUSE 11.0 - June 20, 2008
  32. Tuxpaint is fun for kids and adults - June 9, 2008
  33. Openoffice.org mailing labels solution* - June 8, 2008
  34. A Tiny Look at TinyMe 2008.0 - May 25, 2008
  35. No is Ark verdict - May 21, 2008
  36. New group advocates for FOSS in libraries - May 19, 2008
  37. Hardy Heron converts an Ubuntu skeptic - May 9, 2008
  38. Top 5 Tiny Distros - May 3, 2008
  39. New SymphonyOne distro plays a different tune - Apr 30, 2008
  40. First look at Draco GNU/Linux 0.3 - Apr 21, 2008
  41. PCLinuxOS Gnome links two worlds - Apr 10, 2008
  42. First look at Dreamlinux 3.0 - Apr 07, 2008
  43. GoblinX packs a lot into compact Slackware-based distro - Mar 21, 2008
  44. Drupal keeps getting better - Mar 20, 2008
  45. First look at PC-BSD 1.5 - Mar 17, 2008
  46. Latest Slax release needs more time in the oven - Mar 04, 2008
  47. Parsix: Persian distro makes GNOME look good - Feb 25, 2008
  48. Create a backup server with Restore - Feb 19, 2008
  49. Vector Linux 5.9: Light, fast Slackware-based distro* - Feb 13, 2008
  50. First look at Zenwalk Linux 5.0 - Feb 11, 2008
  51. Litrix: Linux from Brazil to your desktop - Jan 24, 2008
  52. SimplyMEPIS 7.0 is a keeper - Jan 18, 2008
  53. KDE 4.0: Everything that has an end, has a beginning* - Jan 18, 2008
  54. Osmo: A daily organizer - Jan 09, 2008

* - Posts by other contributers.





More in Tux Machines

Five reasons to switch from Windows to Linux

Linux has been in the ascendancy ever since the open source operating system was released, and has been improved and refined over time so that a typical distribution is now a polished and complete package comprising virtually everything the user needs, whether for a server or personal system. Much of the web runs on Linux, and a great many smartphones, and numerous other systems, from the Raspberry Pi to the most powerful supercomputers. So is it time to switch from Windows to Linux? Here are five reasons why. Read more

today's leftovers

Leftovers: OSS and Sharing

Security Leftovers

  • Chrome vulnerability lets attackers steal movies from streaming services
    A significant security vulnerability in Google technology that is supposed to protect videos streamed via Google Chrome has been discovered by researchers from the Ben-Gurion University of the Negev Cyber Security Research Center (CSRC) in collaboration with a security researcher from Telekom Innovation Laboratories in Berlin, Germany.
  • Large botnet of CCTV devices knock the snot out of jewelry website
    Researchers have encountered a denial-of-service botnet that's made up of more than 25,000 Internet-connected closed circuit TV devices. The researchers with Security firm Sucuri came across the malicious network while defending a small brick-and-mortar jewelry shop against a distributed denial-of-service attack. The unnamed site was choking on an assault that delivered almost 35,000 HTTP requests per second, making it unreachable to legitimate users. When Sucuri used a network addressing and routing system known as Anycast to neutralize the attack, the assailants increased the number of HTTP requests to 50,000 per second.
  • Study finds Password Misuse in Hospitals a Steaming Hot Mess
    Hospitals are pretty hygienic places – except when it comes to passwords, it seems. That’s the conclusion of a recent study by researchers at Dartmouth College, the University of Pennsylvania and USC, which found that efforts to circumvent password protections are “endemic” in healthcare environments and mostly go unnoticed by hospital IT staff. The report describes what can only be described as wholesale abandonment of security best practices at hospitals and other clinical environments – with the bad behavior being driven by necessity rather than malice.
  • Why are hackers increasingly targeting the healthcare industry?
    Cyber-attacks in the healthcare environment are on the rise, with recent research suggesting that critical healthcare systems could be vulnerable to attack. In general, the healthcare industry is proving lucrative for cybercriminals because medical data can be used in multiple ways, for example fraud or identify theft. This personal data often contains information regarding a patient’s medical history, which could be used in targeted spear-phishing attacks.
  • Making the internet more secure
  • Beyond Monocultures
  • Dodging Raindrops Escaping the Public Cloud