Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 01 Sep 15 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Mandriva Linux 2010 GNOME – Solid and Sweet srlinuxx 30/11/2009 - 6:12pm
Story Not All is Well with Karmic? srlinuxx 30/11/2009 - 6:11pm
Story 5 Fun things in Fedora 12 (Video) srlinuxx 30/11/2009 - 6:08pm
Story Noteworthy changes in Mandriva Cooker Nov 15 – 29 srlinuxx 2 30/11/2009 - 5:34pm
Story Make my OS Faster srlinuxx 30/11/2009 - 4:01pm
Story Estonia's Open Source Shame srlinuxx 30/11/2009 - 3:59pm
Story DistroWatch Weekly, Issue 331 srlinuxx 30/11/2009 - 2:12pm
Story KDE 4.4 dev: What’s new? srlinuxx 30/11/2009 - 2:11pm
Story I am the very model of an open source sensational srlinuxx 30/11/2009 - 2:09pm
Story FreeBSD 8.0 Benchmarked Against Linux, OpenSolaris srlinuxx 30/11/2009 - 2:06pm

Globalization's Next Victim: US

Filed under
Misc

Production, wealth, power, services and technology are slip-sliding away to the East

Quake Mobile Screenshots

Filed under
Gaming

Hands up if you remember the original Quake? Yes, I thought that would be most of you. As the first truly three-dimensional shooter, it was absolutely revolutionary back when it was released in 1996. How times change! The next evolution of Quake is the move to the mobile phone.

Web makes it easy to grow, sell pot

Filed under
Web

The world of marijuana trafficking once existed mostly in shady places where the right dealers hung out, or in exotic locales such as Amsterdam. But technology, which has revolutionized almost every other aspect of our world, has changed that.

M$ Surprises with Linux 'Hands-On Lab'

Filed under
Microsoft

Microsoft Corp. surprised many of the attendees at its annual worldwide partner show here this weekend by allowing a third party to present a "hands-on lab" that allowed attendees to play with a range of Linux desktop software.

Build a Secure Web Server with Mandriva 2005 LE

Filed under
MDV
HowTos

The last time we built the Secure Web Server it was quite a success. But it was done on version 10.0 of our beloved OS and it's time for a fresh look at what we can do for web serving. The 2.6 kernel is at a level now that most commercial firms have either already converted or are in the process. What this means for us is even tighter security with more and better hardware support in the kernel.

Teen on hacking charges

Filed under
Web

Reuben - not his real name, because he is facing computer hacking-related charges in Auckland's Youth Court - is a new breed of digital delinquent: young, smart and with the power to unlock all your secrets.

Driver glitch limits overclocking of Nvidia's GeForce 7800 GTX chip

Filed under
Software

Nvidia has confirmed a bug in its current driver software that prevents serious overclocking - by shutting down a graphics card not just when it runs too hot, but also too cool.

M$ ponders how to annihilate Linux

Filed under
Linux
Microsoft

THE THEME OF THE SALES keynotes at the MS WWPC was on how to sell: sell against Linux and sell to small businesses (SB).

Trojan poses as movie clip of London blasts

Filed under
Security

MessageLabs have detected a Trojan posing as a movie clip of yesterday's terrorist attack in London.

FCC approves second UWB chip set

Filed under
Hardware

Spectral keying UWB allows the combining of impulse radio architectures with multiple, independent frequency bands - demonstrating error-free streaming video up to 15 meters through walls.

Motherboard Review Roundup—Socket 939

Filed under
Hardware
Reviews

Socket 939 is no longer a rare commodity in mainboards like it was six months ago. We've batched together a group of nine of these AMD Athlon 64–ready mobos, ranging from the bargain basement to the ultimate gamer models for overclockers and tweakers.

USC: Applicants' Files May Have Been Read

Filed under
Security

Officials of the University of Southern California said they will contact everyone who used the school's online application system in the past eight years to warn them that a hacker may have been able to read their files.

FTC Urged to Probe Personal Data Sellers

Filed under
Security

A privacy rights advocacy group has asked the Federal Trade Commission to examine whether websites advertising investigative services capable of digging up personal information such as phone call records are violating federal laws.

Giant panda cub born at National Zoo in Washington

Filed under
Misc

A giant panda, one of the most critically endangered species in the world, was born early on Saturday at the National Zoo, the first for the endangered bears now living there, the zoo said.

Data Theft: How to Fix the Mess

Filed under
Security

What we need right now is someone in power who can put the burden for this problem right where it belongs: on the financial and other institutions who collect this data. Let's face it: by the time even the most vigilant consumer discovers his information has been used fraudulently, it's already too late. "When people ask me what can the average person do to stop identity theft, I say, 'nothing.' "

New judge named in Microsoft, EU case

Filed under
Microsoft

Microsoft's appeal against a European Union antitrust order will be heard by Bo Vesterdorf, the judge who rejected the company's attempt in December to suspend the decision.

Europe Goes Gently on P2P Piracy

Filed under
Web

A law banning digital distribution of copyright movies and music went into effect last week in Sweden, but enforcing the new law and others like it around Europe isn't proving easy.

Debian addresses security concerns

Filed under
Linux

Popular Linux distributor Debian has moved quickly to address concerns it was falling behind on security.

U.S. high-speed Internet use up 34 percent in 2004

Filed under
Web

High-speed Internet use by U.S. businesses and households rose 34 percent in 2004 to 37.9 million lines, the Federal Communications Commission said Thursday.

Massive investigation operation follows London attack

Filed under
Misc

Forensics and intelligence evidence will underpin efforts to find those responsible for London's worst ever terrorist attack.

Syndicate content