Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 30 Aug 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Bit Torrent Solutions For Linux

Filed under
Software

Utorrent has been indisputably the best Bit-Torrent client for Windows due to it's light-weight resource friendly interface and simple usability almost since the 1.5.0 release, or perhaps since even much before. When it comes to linux, selecting the "best" Bit-Torrent client has always been a n-sided affair.

S2 Games Announces Release of Highly Anticipated Linux Client for Savage 2: A Tortured Soul

Filed under
Gaming

PR: Independent game developer S2 Games today announced the release of the highly anticipated Linux client for Savage 2: A Tortured Soul. Linux gamers can download the client and sign-up for a FREE account at www.s2games.com.

Also: CrossOver Games For Linux Released

TEENpup 2008, the kids’ Linux OS with adult undertones

Filed under
Linux

reddevil62-techhead.blogspot: As a branch of the popular Puppy Linux distribution, it’s targeted squarely at teenage users. TEENpup 2008 contains the largest collection of multimedia and internet-related programs I’ve ever seen on one (half-full) CD.

F9 Beta release announcement & Screenshots

Filed under
Linux

Ah, spring... when a young penguin's fancy lightly turns to thoughts
of... Beta testing! Yes, spring has sprung, and so has the Beta release
of Fedora 9!

Free/Open-source Genealogy Software

Filed under
Software

junauza.com: A computer program used to collect, visualize, and publish genealogical data is called a Genealogy (the study and tracing of families) software. At a minimum, genealogy software collects the date and place of an individual's birth, marriage, and death, and stores the relationships of individuals to their parents, spouses, and children.

Linux: A Tempting Target for Malware?

Filed under
Linux

linuxinsider.com: The Linux operating system is not immune to virus infections, although Linux-specific viruses are extremely rare. Linux servers face more risk of virus attack than Linux desktops.

Standards expert defends OOXML fast-track bid

Filed under
OSS

news.zdnet.co.uk: A European standards expert has defended the move to fast-track the International Organization for Standardization approval process for Microsoft's Office Open XML document standard, dismissing criticisms that the decision to do so is flawed and unfair.

Shuttle KPC Desktop

Filed under
Linux
Hardware

computershopper.com: Shuttle is best known for selling barebones and complete PC systems in compact packages. With its newest offering, the KPC ("Korporate PC"), something else is small: the price. A fully working PC can be yours for a remarkable $209.

Also: Shuttle KPC K45: £180 Linux desktop

Is Linux really for me?

Filed under
Linux

rm-jones.com: In my last post, March 23, 2008, I asked the question “Linux - Is it really for me?”. Now I have the answer to that question. It is a very firm “YES”. After getting used to it, I really like Linux.

Get more out of Ubuntu's virtual desktops

Filed under
Ubuntu

cnet.com: Perhaps the greatest single productivity-boosting feature in Linux is the ability to open several virtual desktops at one time. This allows you to create separate work environments for various simultaneous tasks. The multiple desktops let you focus on the task at hand without interruption, but switch to your other active workspace with a single click.

some early howtos:

Filed under
HowTos
  • Syncing a Bluetooth phone with a Linux box

  • Manage MySQL remotely with phpMyAdmin
  • Using pam-mount to create a sandboxed home directory
  • Building GCC Cross-Compilers on Ubuntu Linux
  • Image Magick Banner Generator - part 5

Linux Distros That Could Take The Lead Soon

Filed under
Linux

biguncledave.wordpress: After more than 15 years of Linux development, the last couple of years have seen an explosive spectrum of progress in conquering the desktop. It is as if the world is suddenly waking up and discovering Linux. Lately a whole rash of distros have been coming out of the woodwork, building on the previous progress. Here’s my picks for the distros showing the greatest potential.

How To Set Up Software RAID1 On A Running LVM System (Incl. GRUB Configuration) (Debian Etch)

Filed under
HowTos

This guide explains how to set up software RAID1 on an already running LVM system (Debian Etch). The GRUB bootloader will be configured in such a way that the system will still be able to boot if one of the hard drives fails (no matter which one).

today's leftovers

Filed under
News
  • More OOXML BRM Messiness: A Delegate from Brazil Challenges "Law of Silence"

  • Best Way To Create Your Own Ubuntu
  • Hidden Linux : Doing the splits
  • Google exec lets slip Android release date?
  • Presens IT conducts Open Source Survey with Red Hat
  • I found my perfect KDE4 Setup!
  • Kernel as hypervisor: Andrea Arcangeli
  • Linux 2.6.24.4
  • Exploring Etoys on the OLPC XO
  • Paul Murphy: Security - lintel vs wintel
  • Exposing a closed Congress to Open Source: Change Congress
  • AMD's "Mystery" Digital Block Supported
  • ATI "r500-fp" DRM Merged To Master
  • Microsoft's real open-source nightmare
  • How to check the exit status code
  • Gnome Needs Plenty of Improvements, but ...

ISO approval: A good process gone bad

Filed under
Misc

redhatmagazine.com: You may have read our background article about ODF and OOXML and why Red Hat believes OOXML should not be approved as an ISO standard. This time, we focus on how the standardization process has been compromised at ISO.

My experience with Mandriva (and 64 bit)

Filed under
MDV

techsmartly.com/blog: I’ve always wanted to try Linux, but it was always impractical, since I had some stuff installed that I needed, and it would take ages to get everything working smoothly on Linux. But now, with a fresh reinstall, why not install Linux as well?

some ubuntu stuff

Filed under
Ubuntu
  • Ubuntu Misconceptions

  • It’s The Little Things…
  • 5 Must have Apps for Ubuntu
  • Mdv2Ubu...
  • Ubuntu UK Podcast Second Episode

Is the AGPL half-empty, or half-full?

Filed under
OSS

blogs.the451group: The GNU Affero GPL, released in November 2007 and approved by the OSI this month, is being viewed as both closure of a GPL loophole and as a tool to truly transfer the collaborative and community benefits of GPL to the software-as-a-service model.

Is Firefox 3 ready for prime time?

Filed under
Moz/FF

desktoplinux: Firefox 3 may still be a beta, Beta 4 to be exact, but in a recent Reuters news story, Mozilla Vice President of Engineering Mike Schroepfer said of the browser, "In many ways it is much more stable than anything else out there." OK, so Reuters jumped the gun. Still, how ready is Firefox 3 for everyday use? I decided to find out.

some howtos and apps:

Filed under
HowTos
  • PIC Programming with Linux #3: installing the needed software

  • Make the Windows Key Open the Gnome Panel Menu
  • File System Checking with fsck
  • gcore: Obtain core dump of current running application
  • Easily Install Prism Web Apps in Ubuntu 8.04
  • gcipher - A simple “encryption” tool
  • Find out what ports are open on Linux
  • KWordQuiz: An amazingly useful flash card tool
  • Inserting more than one row at a time in OpenOffice.org Calc
  • Undeleting photos on (gentoo) linux/windows/mac
  • I like Brasero
  • Music applet
Syndicate content

More in Tux Machines

today's howtos

Leftovers: OSS

  • Report: If DOD Doesn't Embrace Open Source, It'll 'Be Left Behind'
    Unless the Defense Department and its military components levy increased importance on software development, they risk losing military technical superiority, according to a new report from the Center for a New American Security. In the report, the Washington, D.C.-based bipartisan think tank argues the Pentagon, which for years has relied heavily on proprietary software systems, “must actively embrace open source software” and buck the status quo. Currently, DOD uses open source software “infrequently and on an ad hoc basis,” unlike tech companies like Google, Amazon and Facebook that wouldn’t exist without open source software.
  • The Honey Trap of Copy/Pasting Open Source Code
    I couldn’t agree more with Bill Sourour’s article ‘Copy.Paste.Code?’ which says that copying and pasting code snippets from sources like Google and StackOverflow is fine as long as you understand how they work. However, the same logic can’t be applied to open source code. When I started open source coding at the tender age of fourteen, I was none the wiser to the pitfalls of copy/pasting open source code. I took it for granted that if a particular snippet performed my desired function, I could just insert it into my code, revelling in the fact that I'd just gotten one step closer to getting my software up and running. Yet, since then, through much trial and error, I’ve learned a thing or two about how to use open source code effectively.
  • Affordable, Open Source, 3D Printable CNC Machine is Now on Kickstarter
    The appeals of Kickstarter campaigns are many. There are the rewards for backers, frequently taking the form of either deep discounts on the final product or unusual items that can’t be found anywhere else. Pledging to support any crowdfunding campaign is a gamble, but it’s an exciting gamble; just browsing Kickstarter is pretty exciting, in fact, especially in the technological categories. Inventive individuals and startups offer new twists on machines like 3D printers and CNC machines – often for much less cost than others on the market.
  • Open Standards and Open Source
    Much has changed in the telecommunications industry in the years since Standards Development Organization (SDOs) such as 3GPP, ITU and OMA were formed. In the early days of telecom and the Internet, as fundamental technology was being invented, it was imperative for the growth of the new markets that standards were established prior to large-scale deployment of technology and related services. The process for development of these standards followed a traditional "waterfall" approach, which helped to harmonize (sometimes competing) pre-standard technical solutions to market needs.

Leftovers: BSD

  • The Voicemail Scammers Never Got Past Our OpenBSD Greylisting
    We usually don't see much of the scammy spam and malware. But that one time we went looking for them, we found a campaign where our OpenBSD greylisting setup was 100% effective in stopping the miscreants' messages. During August 23rd to August 24th 2016, a spam campaign was executed with what appears to have been a ransomware payload. I had not noticed anything particularly unusual about the bsdly.net and friends setup that morning, but then Xavier Mertens' post at isc.sans.edu Voice Message Notifications Deliver Ransomware caught my attention in the tweetstream, and I decided to have a look.
  • Why FreeBSD Doesn't Aim For OpenMP Support Out-Of-The-Box

Security Leftovers

  • FBI detects breaches against two state voter systems
    The Federal Bureau of Investigation has found breaches in Illinois and Arizona's voter registration databases and is urging states to increase computer security ahead of the Nov. 8 presidential election, according to a U.S. official familiar with the probe. The official, speaking on condition of anonymity, said on Monday that investigators were also seeking evidence of whether other states may have been targeted. The FBI warning in an Aug. 18 flash alert from the agency's Cyber Division did not identify the intruders or the two states targeted. Reuters obtained a copy of the document after Yahoo News first reported the story Monday.
  • Russians Hacked Two U.S. Voter Databases, Say Officials [Ed: blaming without evidence again]
    Two other officials said that U.S. intelligence agencies have not yet concluded that the Russian government is trying to do that, but they are worried about it.
  • FBI Says Foreign Hackers Got Into Election Computers
    We've written probably hundreds of stories on just what a dumb idea electronic voting systems are, highlighting how poorly implemented they are, and how easily hacked. And, yet, despite lots of security experts sounding the alarm over and over again, you still get election officials ridiculously declaring that their own systems are somehow hack proof. And now, along comes the FBI to alert people that it's discovered at least two state election computer systems have been hacked already, and both by foreign entities.
  • Researchers Reveal SDN Security Vulnerability, Propose Solution
    Three Italian researchers have published a paper highlighting a security vulnerability in software-defined networking (SDN) that isn't intrinsic to legacy networks. It's not a showstopper, though, and they propose a solution to protect against it. "It" is a new attack they call Know Your Enemy (KYE), through which the bad guys could potentially collect information about a network, such as security tool configuration data that could, for example, reveal attack detection thresholds for network security scanning tools. Or the collected information could be more general in nature, such as quality-of-service or network virtualization policies.
  • NV Gains Momentum for a Secure DMZ
    When it comes to making the shift to network virtualization (NV) and software-defined networking (SDN), one of the approaches gaining momentum is using virtualization technology to build a secure demilitarized zone (DMZ) in the data center. Historically, there have been two major drawbacks to deploying firewalls as a secure mechanism inside a data center. The first is the impact a physical hardware appliance has on application performance once another network hop gets introduced. The second is the complexity associated with managing the firewall rules. NV technologies make it possible to employ virtual firewalls that can be attached to specific applications and segregate them based on risk. This is the concept of building a secure DMZ in the data center. The end result is that the virtual firewall is not only capable of examining every packet associated with a specific application, but keeping track of what specific firewall rules are associated with a particular application becomes much simpler.