Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 20 Jan 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story EXT4 In Linux 3.18 Has Clean-ups, Bug Fixes Rianne Schestowitz 20/10/2014 - 11:10pm
Story Free and Open Source Electronic Signature in Costa Rica Roy Schestowitz 20/10/2014 - 10:55pm
Story Rejuvenate your Fedora desktop with Moka Rianne Schestowitz 20/10/2014 - 8:57pm
Story Red Hat CEO Jim Whitehurst on the impact of cloud and mobile Rianne Schestowitz 20/10/2014 - 8:50pm
Story LIBINPUT INTEGRATION IN KWIN/WAYLAND Rianne Schestowitz 20/10/2014 - 8:31pm
Story V is for Vivid Roy Schestowitz 20/10/2014 - 8:27pm
Story Elive Is an Interesting Debian-Based Distro with a Beautiful Enlightenment Desktop Rianne Schestowitz 20/10/2014 - 8:27pm
Story NVIDIA's NVPTX Support For GCC Is Close To Being Merged Rianne Schestowitz 20/10/2014 - 8:22pm
Story The Future of the Internet - 20 Years Ago Rianne Schestowitz 20/10/2014 - 8:18pm
Story Kodi 14.0 Beta Is Getting Closer to Release Rianne Schestowitz 20/10/2014 - 8:14pm

The Next Paradigm Shift: Open Source Everything

brighthand.com: In the past year, open source software and development models have come to the forefront of mobile computing. The shift isn't just a move to mobile devices, but a move to a different way of doing business with computing. And this one is more profound than just simply cloud computing or moof-ing.

some howtos:

Filed under
HowTos
  • Gentoo: Spellchecking in GTK Applications

  • Virus scanning with F-Secure Rescue CD 3.00
  • How To Change File Type Associations
  • Extract tarballs in Ubuntu
  • Getting wireless to work in Ubuntu on a Lenovo ThinkPad X200
  • #ubuntu Q and A Vol.1 - Hardware
  • 10G database on Ubuntu 8.04
  • How to setup Boot Password (Grub)
  • Unix 101: Manipulating files - Copying, moving, deleting
  • wl wireless driver in Intrepid
  • nvidia geforce fx5500 on Ubuntu 8.04.1

5 reasons to upgrade from Windows Vista to Linux

Filed under
Linux

itwire.com: Windows Vista has been out for almost two years now but it still suffers from stability and compatibility issues, let alone an insatiable desire for beefier hardware. You don't have to live with it; here are five reasons why Linux makes a better choice for your computer.

opensuse-tutorials is up online

Filed under
SUSE

opensuse.org: There are fedora-tutorials, ubuntu-futorials website on the web, for anyone who envies, of course, we have opensuse-tutorials either.

Best GNU/Linux Desktops Of 2008

Filed under
Linux

cyber-geeks.net: Here i have got some awesome desktop views of various linux editions. So i thought it would be a better idea to publish all these under the title "Best GNU/linux desktops of 2008."

OpenSUSE Linux 11.0, MacOS X Leopard, and Windows Vista

Filed under
OS

suseblog.com: I thought I’d take on the challenge of doing a triple-boot setup on my laptop. Windows Vista, MacOS X Leopard, and OpenSUSE 11.0 all on the same non-Mac machine. A machine much like my Dell Inspiron E1705.

Interview: JOLIE and Service-Oriented Computing Explained

Filed under
Interviews

dot.kde.org: During Akademy 2008, we sat down with Fabrizio Montesi who's working on JOLIE integration in KDE (and Plasma in particular). He explained the mechanics of the technology and what it can do for KDE.

odds & ends

Filed under
Linux
  • mrxvt: Fast, light multitabbed terminal emulator

  • Dangerous Linux Feature?
  • The Amazing Artwork of Fedora 10
  • Lightweight GNU/Linux web browsers
  • Linux Foundation to host End User Collaboration Summit
  • How to install and Configure Hamachi in Ubuntu

How to Perfectly Kill a Perfect Distribution

Filed under
PCLOS

lazytechguy.com: PCLinuxOS was the perfect distribution in 2007. It had all the bells and whistles to be an excellent Windows XP alternative. However, this is 2008 and almost end of 2008. A lot has changed since then.

openSUSE Weekly News, Issue 37

Filed under
SUSE

Issue #37 of openSUSE Weekly News is now out. In this issue: Hack Week III Judging, Novell OpenPR Blog: Zonker Blogs, and Board election.

Reject Closed Source Mathematical and Scientific Programs

Filed under
OSS

kdubois.net: The modern scientific and mathematical community relies heavily on mathematical software for research and computations of pretty much everything. Unfortunately, from what I’ve seen, most of these tools seem to be closed source.

New startups explore new niches for open source

Filed under
OSS

Matt Asay: Over the weekend two new open-source startups caught my eye (and my inbox): OrecX and Transverse. The first is notable for its demonstration that open source is ready for niche applications. The second? Well, the second is notable because after reading through its website I still have no idea what it does.

Playing Windows Games on Linux: What are your options

Filed under
Gaming

blogs.howtogeek.com: If you're a gamer or a recent linux switcher you probably think you can't play Windows games on your linux box - or that they will run very slow and crash because they are emulating the Windows DirectX API. That's not the case anymore.

Mombuntu - Ubuntu For Your Mom

Filed under
Ubuntu

helpforlinux.blogspot: You might be wondering why I am suggesting an Linux distro for your mom. Well Linux is no longer the stronghold of geeks. Distros like Ubuntu have made using Linux as simple as using Windows.

few howtos:

Filed under
HowTos
  • Resetting the root password on Ubuntu Linux

  • Firefox 3: Getting rid of the drop-downs
  • /etc/grub.conf explained
  • Photo KDE Tutorial 1-4: Brightness/Contrast/Gamma + Hue/Saturation/Lightness
  • Puppet - Centralised configuration management for networks
  • HOW TO: Remove the annoying KDE error when unmounting usb device
  • Ksensors: An Application To Monitor Your Computer’s Temperature

Dell Mini 9....

Filed under
Just talk

So, September the 4th saw the launch of the new Dell Mini 9 PC, which I placed and order on Dells website, paid my money, and even had a dell official call me at work, to check m Work address was where i wanted the device delivered to.. All very good service, and its at this point, over here in the UK, I see problems occuing.

10 Fine-looking Icon Sets for KDE Desktop

Filed under
KDE

junauza.com: Since plenty of you love our collection of icon sets for Ubuntu/GNOME Desktop, I'll be sharing to you all yet another set of my favorite desktop icons. This time, I'll try to cheer up some KDE.

2000 Caldera-Microsoft Settlement Surfaces in Novell v. Microsoft Antitrust Lawsuit

Filed under
Legal

groklaw.net: The Novell/Canopy/Caldera/DR DOS story continues, and Novell and Microsoft are in the middle of it all, battling in discovery in the Novell v. Microsoft antitrust litigation -- that is the litigation over WordPerfect currently before the US District Court in Maryland in pretrial discovery.

openSUSE Board Election Comments

Filed under
SUSE

opensuse.org: The first openSUSE board has been appointed a year ago and now the elections are starting. We have formed an election committee that is organising it.

Ubuntu 8.10 Alpha 5 Screenshot Tour

Filed under
Ubuntu

softpedia.com: Delayed one day, the fifth alpha version of the upcoming Ubuntu 8.10 (codename Intrepid Ibex), which is scheduled for release in late October this year, was made available a few hours ago and, as usual, we intend to keep you up-to-date with the latest changes.

Syndicate content

More in Tux Machines

Security: OpenSSL, IoT, and LWN Coverage of 'Intelpocalypse'

  • Another Face to Face: Email Changes and Crypto Policy
    The OpenSSL OMC met last month for a two-day face-to-face meeting in London, and like previous F2F meetings, most of the team was present and we addressed a great many issues. This blog posts talks about some of them, and most of the others will get their own blog posts, or notices, later. Red Hat graciously hosted us for the two days, and both Red Hat and Cryptsoft covered the costs of their employees who attended. One of the overall threads of the meeting was about increasing the transparency of the project. By default, everything should be done in public. We decided to try some major changes to email and such.
  • Some Basic Rules for Securing Your IoT Stuff

    Throughout 2016 and 2017, attacks from massive botnets made up entirely of hacked [sic] IoT devices had many experts warning of a dire outlook for Internet security. But the future of IoT doesn’t have to be so bleak. Here’s a primer on minimizing the chances that your IoT things become a security liability for you or for the Internet at large.

  • A look at the handling of Meltdown and Spectre
    The Meltdown/Spectre debacle has, deservedly, reached the mainstream press and, likely, most of the public that has even a remote interest in computers and security. It only took a day or so from the accelerated disclosure date of January 3—it was originally scheduled for January 9—before the bugs were making big headlines. But Spectre has been known for at least six months and Meltdown for nearly as long—at least to some in the industry. Others that were affected were completely blindsided by the announcements and have joined the scramble to mitigate these hardware bugs before they bite users. Whatever else can be said about Meltdown and Spectre, the handling (or, in truth, mishandling) of this whole incident has been a horrific failure. For those just tuning in, Meltdown and Spectre are two types of hardware bugs that affect most modern CPUs. They allow attackers to cause the CPU to do speculative execution of code, while timing memory accesses to deduce what has or has not been cached, to disclose the contents of memory. These disclosures can span various security boundaries such as between user space and the kernel or between guest operating systems running in virtual machines. For more information, see the LWN article on the flaws and the blog post by Raspberry Pi founder Eben Upton that well describes modern CPU architectures and speculative execution to explain why the Raspberry Pi is not affected.
  • Addressing Meltdown and Spectre in the kernel
    When the Meltdown and Spectre vulnerabilities were disclosed on January 3, attention quickly turned to mitigations. There was already a clear defense against Meltdown in the form of kernel page-table isolation (KPTI), but the defenses against the two Spectre variants had not been developed in public and still do not exist in the mainline kernel. Initial versions of proposed defenses have now been disclosed. The resulting picture shows what has been done to fend off Spectre-based attacks in the near future, but the situation remains chaotic, to put it lightly. First, a couple of notes with regard to Meltdown. KPTI has been merged for the 4.15 release, followed by a steady trickle of fixes that is undoubtedly not yet finished. The X86_BUG_CPU_INSECURE processor bit is being renamed to X86_BUG_CPU_MELTDOWN now that the details are public; there will be bug flags for the other two variants added in the near future. 4.9.75 and 4.4.110 have been released with their own KPTI variants. The older kernels do not have mainline KPTI, though; instead, they have a backport of the older KAISER patches that more closely matches what distributors shipped. Those backports have not fully stabilized yet either. KPTI patches for ARM are circulating, but have not yet been merged.
  • Is it time for open processors?
    The disclosure of the Meltdown and Spectre vulnerabilities has brought a new level of attention to the security bugs that can lurk at the hardware level. Massive amounts of work have gone into improving the (still poor) security of our software, but all of that is in vain if the hardware gives away the game. The CPUs that we run in our systems are highly proprietary and have been shown to contain unpleasant surprises (the Intel management engine, for example). It is thus natural to wonder whether it is time to make a move to open-source hardware, much like we have done with our software. Such a move may well be possible, and it would certainly offer some benefits, but it would be no panacea. Given the complexity of modern CPUs and the fierceness of the market in which they are sold, it might be surprising to think that they could be developed in an open manner. But there are serious initiatives working in this area; the idea of an open CPU design is not pure fantasy. A quick look around turns up several efforts; the following list is necessarily incomplete.
  • Notes from the Intelpocalypse
    Rumors of an undisclosed CPU security issue have been circulating since before LWN first covered the kernel page-table isolation patch set in November 2017. Now, finally, the information is out — and the problem is even worse than had been expected. Read on for a summary of these issues and what has to be done to respond to them in the kernel. All three disclosed vulnerabilities take advantage of the CPU's speculative execution mechanism. In a simple view, a CPU is a deterministic machine executing a set of instructions in sequence in a predictable manner. Real-world CPUs are more complex, and that complexity has opened the door to some unpleasant attacks. A CPU is typically working on the execution of multiple instructions at once, for performance reasons. Executing instructions in parallel allows the processor to keep more of its subunits busy at once, which speeds things up. But parallel execution is also driven by the slowness of access to main memory. A cache miss requiring a fetch from RAM can stall the execution of an instruction for hundreds of processor cycles, with a clear impact on performance. To minimize the amount of time it spends waiting for data, the CPU will, to the extent it can, execute instructions after the stalled one, essentially reordering the code in the program. That reordering is often invisible, but it occasionally leads to the sort of fun that caused Documentation/memory-barriers.txt to be written.

US Sanctions Against Chinese Android Phones, LWN Report on Eelo

  • A new bill would ban the US government from using Huawei and ZTE phones
    US lawmakers have long worried about the security risks posed the alleged ties between Chinese companies Huawei and ZTE and the country’s government. To that end, Texas Representative Mike Conaway introduced a bill last week called Defending U.S. Government Communications Act, which aims to ban US government agencies from using phones and equipment from the companies. Conaway’s bill would prohibit the US government from purchasing and using “telecommunications equipment and/or services,” from Huawei and ZTE. In a statement on his site, he says that technology coming from the country poses a threat to national security, and that use of this equipment “would be inviting Chinese surveillance into all aspects of our lives,” and cites US Intelligence and counterintelligence officials who say that Huawei has shared information with state leaders, and that the its business in the US is growing, representing a further security risk.
  • U.S. lawmakers urge AT&T to cut commercial ties with Huawei - sources
    U.S. lawmakers are urging AT&T Inc, the No. 2 wireless carrier, to cut commercial ties to Chinese phone maker Huawei Technologies Co Ltd and oppose plans by telecom operator China Mobile Ltd to enter the U.S. market because of national security concerns, two congressional aides said. The warning comes after the administration of U.S. President Donald Trump took a harder line on policies initiated by his predecessor Barack Obama on issues ranging from Beijing’s role in restraining North Korea to Chinese efforts to acquire U.S. strategic industries. Earlier this month, AT&T was forced to scrap a plan to offer its customers Huawei [HWT.UL] handsets after some members of Congress lobbied against the idea with federal regulators, sources told Reuters.
  • Eelo seeks to make a privacy-focused phone
    A focus on privacy is a key feature being touted by a number of different projects these days—from KDE to Tails to Nextcloud. One of the biggest privacy leaks for most people is their phone, so it is no surprise that there are projects looking to address that as well. A new entrant in that category is eelo, which is a non-profit project aimed at producing not only a phone, but also a suite of web services. All of that could potentially replace the Google or Apple mothership, which tend to collect as much personal data as possible.

today's howtos

Mozilla: Resource Hogs, Privacy Month, Firefox Census, These Weeks in Firefox

  • Firefox Quantum Eats RAM Like Chrome
    For a long time, Mozilla’s Firefox has been my web browser of choice. I have always preferred it to using Google’s Chrome, because of its simplicity and reasonable system resource (especially RAM) usage. On many Linux distributions such as Ubuntu, Linux Mint and many others, Firefox even comes installed by default. Recently, Mozilla released a new, powerful and faster version of Firefox called Quantum. And according to the developers, it’s new with a “powerful engine that’s built for rapid-fire performance, better, faster page loading that uses less computer memory.”
  • Mozilla Communities Speaker Series #PrivacyMonth
    As a part of the Privacy Month initiative, Mozilla volunteers are hosting a couple of speaker series webinars on Privacy, Security and related topics. The webinars will see renowned speakers talking to us about their work around privacy, how to take control of your digital self, some privacy-security tips and much more.
  • “Ewoks or Porgs?” and Other Important Questions
    You ever go to a party where you decide to ask people REAL questions about themselves, rather than just boring chit chat? Us, too! That’s why we’ve included questions that really hone in on the important stuff in our 2nd Annual Firefox Census.
  • These Weeks in Firefox: Issue 30