Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 25 Jun 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Recover data from damaged Hard Disks and CD/DVD ROMs

Filed under
HowTos

Data recovery is the process of salvaging data from damaged, failed, wrecked or inaccessible primary storage media when it cannot be accessed normally. Often the data is being salvaged from storage media formats such as hard disk drive, storage tapes, CDs, DVDs, RAID, and other electronics. There are a few utilities that lets you (try to) recover your data, ignoring the I/O errors.

Installing Ubuntu on a machine with no CDROM drive

Filed under
Ubuntu

Today I had to install Ubuntu on one of the older machines in the computer room. It's a 1U server without CDROM drive.

Top Linux vs Windows Disputes Myths

Filed under
OS

In continuation of my previous article “Can Ubuntu Defeat Windows”, which caused some disputes, I decided to share my vision of the most Linux vs Windows disputes myths.

Why hack your game console?

Filed under
Linux

Some people buy game consoles at launch only to take them apart immediately and post pictures of the insides on the internet. It’s part of the ideology of the hacker: take it apart, fiddle with it, and make it do what you want.

Ubuntu on Sun's CoolThreads T1000

Filed under
Ubuntu

I wanted to test JBoss performance with the Sun Microsystems new CoolThreads CPU so i ordered one from the Try&Buy deal a week ago.And today it arrived. Small pizza-box with absolutely no printed documentation included. First i had to spend several hours figuring out planning how to actually install Ubuntu on the damn machine, because it doesn't have video output, keyboard or mice connectors or CD/DVD players.

Why Flash 9 for Linux is taking so long

Filed under
Software

Adobe skipped a version of Flash for Linux and released stable versions of the Flash 9 player for Windows and Mac OS X long before the beta of Flash 9 to Linux users. Paul Betlem, senior director of engineering for Adobe, explained why the process is taking so long.

Fork off Mr Ballmer!

Filed under
SUSE

Any serious, committed user of GNU/Linux who hasn’t heard about the Microsoft/Novell deal has either been slightly dead or at the bottom of an Albanian tin mine shaft. When names of such quality and recognition are speaking out so vehemently and with much greater knowledge and experience than me, I’m inclined to sit up and take notice.

Stable Linux Kernel 2.6.19 Released

Filed under
Linux

Linus has just tagged v2.6.19 of his vanilla Linux kernel tree. Not many changes here, so if it doesn't compile it's your fault. But the kernel team might just fix it anyway Wink So go get it. It's one of those rare "perfect" kernels.

BeleniX LiveCD v0.5.1 Screenshots

Filed under
OS

BeleniX, our favorite OpenSolaris-based LiveCD here at Phoronix, has come out with a new release. New in BeleniX 0.5.1 Firefox 2.0, Thunderbird 1.5.0.8, Koffice 1.6.0, C++ runtime libraries from the SUN Studio Suite, and the inclusion of NVIDIA's proprietary display drivers. BeleniX 0.5.1 is also up to date with OpenSolaris build 52. If you've never tried out BeleniX, it's certainly a handy LiveCD worth trying out.

Nice Screenshots.

Firefox Logo Crop Circle from Google Maps

Nixcraft has linked to the famous Firefox Logo Crop Circle from Google Maps and earth. Pretty cool. Take a click.

Make a DVD Slideshow Using QDVDAuthor

Filed under
HowTos

Last weekend a family member asked me if I knew how to create slideshow on a DVD and it got me thinking. After browsing the apps in the DVD Authoring category I settled upon QDVDAuthor and decided to give it a try.

The problem with 3rd party repositories

Filed under
Linux

I am a big supporter of the idea of a common repository format for all software management tools around Linux. But: whenever you install software from someone else, you should be aware that this person can gain total control of your entire system. And that’s a big security risk!

Google Toolbar FIX for Firefox 2

Filed under
HowTos

So I’ve realized that the Google Toolbar will not install on Ubuntu 6.10 “Edgy Eft” with Firefox 2. I did however figure out a fix for it. Below are instructions for downloading, “fixing” and installing the Google Toolbar on Firefox 2.

KDE - select audio device

Filed under
HowTos

GNOME has a nice selector to select the output device for audio. Apparently, KDE does not have any (at least up to version 3.5.2 I’m running). I figured out a rather simple way to select the ALSA audio device.

Tux`s progress

Filed under
Linux

The “Linux vs Windows” debate generally revolves around the Total Cost of Ownership (TCO) issue. Decision-makers rely heavily on their assessment of TCO. It is important to understand the dynamics of different segments of the market.

Xen GUI In Fedora Core 6

Filed under
Software

The new version (6) of Fedora Core, which became available for download in November, shows that major Linux vendors see the importance of virtualisation and virtual private servers in years to come. Xen in Fedora Core 6 comes with a GUI named Virtual Machine Manager.

Review: Arch64, Archlinux for 64bit processors

Filed under
Linux
Reviews

I love Slackware, and at one time Arch Linux was my absolute favorite. I recently upgraded to an Athlon64 3200. I tried a variety of distros, only to run into problems I didn’t have time to fix. Fedora gave me a messed up Grub. Mandriva Free gave me problems with my video driver. Ubuntu Edgy has been fine. I saw that Arch Linux had a 64bit version and decided it was time to revisit it.

Influence scheduling priority with nice and renice

Filed under
HowTos

The "niceness" of a process is a numeric hint to the kernel about how the process should be treated in relation to other processes contending for the CPU. The strange name is derived from the fact that it determines how nice you are going to be to other users of the system. A high nice value means a low priority for your process: you are going to be nice. A low or negative value means high priority: you are not very nice. The range of allowable niceness values is -20 to +19.

Linux desktop auto start or launch programs

Filed under
HowTos

So how do you automatically start or launch program when you login into your KDE desktop system? For example if you would like to start program called xawtv (to watch tv) and mozilla-thunderbird mail client program.

Geronimo JNDI/Java resource connection pools, Part 1

Filed under
Linux

Java Naming and Directory Interface (JNDI) is an interface to connection pools in the Apache Geronimo application server. Through this interface, developers have access to all Java objects, including Enterprise Java Beans (EJBs). This article series provides concept-rich documentation on how to use JNDI to access connection pools for data sources, Java Messaging Services (JMS), mail sessions, and URL connections.

Syndicate content

More in Tux Machines

Android N’s navigation buttons could get a face-lift

New Zealand vs Wales Live Streaming

Android Leftovers

IT runs on the cloud, and the cloud runs on Linux. Any questions?

A recent survey by the Uptime Institute of 1,000 IT executives found that 50 percent of senior enterprise IT executives expect the majority of IT workloads to reside off-premise in cloud or colocation sites in the future. Of those surveyed, 23 percent expect the shift to happen next year, and 70 percent expect that shift to occur within the next four years. Read more

Security Leftovers

  • Teardrop Attack: What Is It And How Does It Work?
    In Teardrop Attack, fragmented packets that are sent in the to the target machine, are buggy in nature and the victim’s machine is unable to reassemble those packets due to the bug in the TCP/IP fragmentation.
  • Updating code can mean fewer security headaches
    Organizations with high rates of code deployments spend half as much time fixing security issues as organizations without such frequent code updates, according to a newly released study. In its latest annual state-of-the-developer report, Devops software provider Puppet found that by better integrating security objectives into daily work, teams in "high-performing organizations" build more secure systems. The report, which surveyed 4,600 technical professionals worldwide, defines high IT performers as offering on-demand, multiple code deploys per day, with lead times for changes of less than one hour. Puppet has been publishing its annual report for five years.
  • Over half of world's top domains weak against email spoofing
    Over half of the world's most popular online services have misconfigured servers which could place users at risk from spoof emails, researchers have warned. According to Swedish cybersecurity firm Detectify, poor authentication processes and configuration settings in servers belonging to hundreds of major online domains are could put users at risk of legitimate-looking phishing campaigns and fraudulent emails.