Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Friday, 23 Aug 19 - Tux Machines is a community-driven public service/news site which has been around for over a decade and a half and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

ATI has released 64-Bit drivers

Filed under
Software

According to AMDZone and ATI's own site, ATI has released 64-bit drivers for XFree86 and Xorg. Here's a link the download page.

No Case - No Problem

Filed under
Hardware
Humor
-s

Just mount every thing on the wall! LOL Here's the discussion thread with pictures. Too funny.

2004 LinuxQuestions.org Members Choice Award Winners Announced

Filed under
Linux

Browser of the Year - Firefox (77.12%)

Distribution of the Year - Slackware (19.36%)

LiveCD Distribution of the Year - Knoppix (57.69%)

Database of the Year - MySQL (53.51%)

Desktop Environment of the Year - KDE (58.25%)

I Heard a Rumor - PCLOS 8.1 in the Works?

Filed under
PCLOS
-s

A little birdie told me that an update to the acclaimed PCLinuxOS Preview 8 is in the works and possibly due out next week. Details are a bit sketchy at this time, but it seems Tom has been hard at work updating the hardware detection and mklivecd scripts. Now don't get your hopes up, but I hear it might sport a newer 2.6.10 kernel, including patches to fix a little kvm switch problem. Of course it will include all kinds of application updates and other goodies. More on this as it develops.

Mandrake's Clustering Again

Filed under
MDV

Mandrake is apparently joining a consortium to help the advancement of what I think of as distributed computing to the point of and what they are terming clustering. Mandrake has a some previous experience in that arena so maybe they can prove to be an asset. Here's a more in depth article on the subject. They want to harness our cpu cycles, and it sounds like for commercial purposes. Show me the money then I say. Until then, I'm looking for aliens.

This months Cosmo

Woo hoo Gals, this months Cosmopolitan magazine is chocked full of nice tips and tricks to tantalize even the most frigid of geeks. Big Grin It looks like Ashley Simpson on the cover, but more importantly are the words: The Power of Pre-sex, Beyond Kama Sutra, His Butt, and 50 Ways to Have Fun With Your Man. I can't wait to try some of this stuff on my man!!!

50 gmail invites?

Filed under
Google
Software

Has anyone else noticed they now have 50 gmail invites to get rid of? I couldn't even get rid of the original 5 or 6! Well, here's a summary of this weeks google wars.

Moooore Spam!

Filed under
Security

Spam has new way to evade security

E-mails via service providers clogging system

Yep, just what we need, more spam. Apparently they aren't as concerned with hiding from their isps as getting the mail out as they are now just sending it through their isps servers. Read the gory details here.

Linux leaders at open-source summit

Filed under
OSS

Here's a long borin^H^Hserious story on how Linux was represented at last weeks open-source summit. I didn't read too much of it, but it might interest you hard core advocates.

Vin Diesel going soft on us?

Filed under
Movies
-s

Have you seen the previews for Vin Diesels's new movie? He is starring in a soon to be released Walt Disney production co-starring five children! I hope all those tattoos in XXX were stick ons! Well, here's a summary of the flick and here's a shot of the promotional poster. Heck anything with Vin Diesel has got be good!

Doom3 for those with little or no PC!

Filed under
Gaming
-s

Here's a story on a board game based on and entitled Doom: The Board Game. This is apparently not breaking news, but I just heard about and got a chuckle over it a few days ago. But hey, I think it might make a neato gift for those diehard doom series lovers, or those who wished they could have played doom3 but couldn't swing the hardware upgrade! Get yours here!

More BS from the Evil One.

Filed under
Microsoft

Seems Mr. Gates is at it again with saying one thing while trying to cleverly conceal his jabs at Linux. This time speaking of interoperability amongst differing architectures while stating that doesn't mean open source as open source is detrimental to interoperability. Does that seem backwards to anyone else besides me? This is posted all over the net, but here's one reference at Betanews.

Syndicate content

More in Tux Machines

Security Leftovers

  • Security Researchers Find Several Bugs in Nest Security Cameras

    Researchers Lilith Wyatt and Claudio Bozzato of Cisco Talos discovered the vulnerabilities and disclosed them publicly on August 19. The two found eight vulnerabilities that are based in the Nest implementation of the Weave protocol. The Weave protocol is designed specifically for communications among Internet of Things or IoT devices.

  • Better SSH Authentication with Keybase

    With an SSH CA model, you start by generating a single SSH key called the CA key. The public key is placed on each server and the server is configured to trust any key signed by the CA key. This CA key is then used to sign user keys with an expiration window. This means that signed user keys can only be used for a finite, preferably short, period of time before a new signature is needed. This transforms the key management problem into a user management problem: How do we ensure that only certain people are able to provision new signed SSH keys?

  • Texas ransomware attacks deliver wake-up call to cities [iophk: Windows TCO]

    The Texas Department of Information Resources has confirmed that 22 Texas entities, mostly local governments, have been hit by the ransomware attacks that took place late last week. The department pointed to a “single threat actor” as being responsible for the attacks, which did not impact any statewide systems.

  • Texas Ransomware Attack

    On Security Now, Steve Gibson talks about a huge ransomware attack. 23 cities in Texas were hit with a well-coordinated ransomware attack last Friday, August 16th.

  • CVE-2019-10071: Timing Attack in HMAC Verification in Apache Tapestry

    Apache Tapestry uses HMACs to verify the integrity of objects stored on the client side. This was added to address the Java deserialization vulnerability disclosed in CVE-2014-1972. In the fix for the previous vulnerability, the HMACs were compared by string comparison, which is known to be vulnerable to timing attacks.

GNOME Feeds is a Simple RSS Reader for Linux Desktops

Feedreader, Liferea, and Thunderbird are three of the most popular desktop RSS readers for Linux, but now there’s a new option on the scene. GNOME Feeds app is simple, no-frills desktop RSS reader for Linux systems. It doesn’t integrate or sync with a cloud-based service, like Feedly or Inoreader, but you can import a list of feeds via an .opml file. “Power” users of RSS feeds will likely find that GNOME Feeds a little too limited for their needs. But the lean feature set is, arguably, what will make this app appeal to more casual users. Read more

GNU Radio Launches 3.8.0.0, First Minor-Version Release In Six Years

The GNU Radio maintainers have announced the release of GNU Radio 3.8.0.0, the first minor-version release of the popular LimeSDR-compatible software defined radio (SDR) development toolkit in over six years. “It’s the first minor release version since more than six years, not without pride this community stands to face the brightest future SDR on general purpose hardware ever had,” the project’s maintainers announced this week. “What has not changed is the fact that GNU Radio is centred around a very simple truth: Let the developers hack on DSP. Software interfaces are for humans, not the other way around. And so, compared to the later 3.7 releases, nothing has fundamentally modified the way one develops signal processing systems with GNU Radio: You write blocks, and you combine blocks to be part of a larger signal processing flow graph.” Read more

IBM/Red Hat Leftovers

  • Accelerating the journey to open hybrid cloud with Red Hat Modernization and Migration Solutions

    The integration of technology into all areas of a business (the "digital transformation" we hear so much about) is fundamentally changing how organizations operate as well as how they deliver value to customers. An example is Lockheed Martin, who opted to undergo an eight-week agile transformation labs residency to implement an open source architecture onboard the F-22 and simultaneously disentangle its web of embedded systems. But such transformation can also create new challenges, from additional competitive pressures to increased customer expectations. To help overcome these challenges, Red Hat is introducing a family of solutions to help optimize infrastructure, modernize applications and accelerate innovation while supporting customers in their journey to the open hybrid cloud. Red Hat Modernization and Migration Solutions are designed to help customers realize the benefits of open technologies and adopt containers, Kubernetes and hybrid cloud-ready platforms. The family of solutions offers a path for customers from restrictive, proprietary environments to more flexible and (often) less costly open source alternatives, in an iterative approach.

  • Let’s talk about Privacy by Design

    Privacy by Design or Privacy by Default (PbD) is not a new concept. However PbD received renewed attention when the GDPR added PbD as a legal requirement. PbD refers to the process of building in technical, organizational and security measures at the beginning stage of product development and throughout the product lifecycle. [...] One PbD tool we use to build in privacy to our development process is our Privacy Impact Assessment, also known as a PIA. The PIA is a process which assists developers at the early stages in identifying and mitigating privacy risks associated with the collection and use of personal data. The PIA tool begins with a self assessment that asks a lot of questions about the planned project or product. This initiates a process of review by individuals trained in privacy and security. The process is collaborative and creates an on-going dialogue about privacy with respect to the product, system or application at hand.

  • IBM Open Sources Its Workhorse Power Chip Architecture

    RISC-V now has formidable competition from an architecture with a long track record in servers and supercomputers.