Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 22 Oct 16 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Chakra 2011.09 review - Interesting and powerful srlinuxx 24/10/2011 - 10:28pm
Story Dead Cyborb episode 2 teased srlinuxx 24/10/2011 - 10:26pm
Story ZaReason Invenire 1220 Reviewed srlinuxx 24/10/2011 - 10:21pm
Story Review: Edubuntu 11.10 srlinuxx 24/10/2011 - 10:17pm
Story Sabayon Linux 7: A Review srlinuxx 24/10/2011 - 10:12pm
Story Things that I like in Gnome 3 srlinuxx 24/10/2011 - 10:10pm
Story Linux 3.1 is here srlinuxx 1 24/10/2011 - 8:15pm
Story Getting Bodhi Linux up to speed srlinuxx 24/10/2011 - 8:10pm
Story Linux 3.2 Kernel May Be Of A Worrying Size srlinuxx 24/10/2011 - 8:09pm
Story Are Updates the Dirty Linux Secret? srlinuxx 24/10/2011 - 8:07pm

Novell, Red Hat Compare Desktop Linux Programs

Filed under

Open-source rivals Novell and Red Hat are each highlighting initiatives to bring Linux-based functionality to the desktop.

SimplyMEPIS 6.5 Release Candidate 2 Screenshots

Filed under

The second release candidate for SimplyMEPIS 6.5 is now available. SimplyMEPIS 6.5 RC2 replaces QtParted with GParted, improvements to the MEPIS Xconfig assistant, and a fair amount of other changes beyond the original release candidate. SimplyMEPIS is another Ubuntu-based distribution.

Review: CRUX 2.3

Filed under

Turning away from the everything-and-the-kitchen-sink distributions for a moment I now turn my attention to a light-weight distribution aimed at being as simple as possible while still being up-to-date. CRUX 2.3, released on March 20, 2007, attempts to fulfill such a role.

Linux on the Desktop is Building Momentum

I have noticed that mention of Linux on the desktop seems to be building in the media, but it hasn't been clear if that noise correlated to more users actually switching to it. Based on the results of my admittedly unscientific poll, Linux does appear to be building momentum.

Debian, Red Hat patch numerous OpenOffice flaws

Filed under

Debian released a patch to fix multiple vulnerabilities in OpenOffice that open up the users' systems to compromise, Secunia reported on Wednesday.

One vulnerability was originally discovered by an anonymous researcher and reported to VeriSign’s iDefense Labs.

iDefense reported that research by Sean Larsson found additional flaws.

GNU/Linux on the desktop: a modest business proposal

Filed under

With the bickering about what Dell will and won’t do to provide Linux on their desktop machines, it seems to me there’s a much easier way to introduce GNU/Linux into the world. Scrap it!

Novell responds: 'Stop fixating on the patent deal'

Filed under

In case it's not abundantly clear, I despise Novell's patent pact with Microsoft. But, as Bruce Lowry wrote me today (because comments are turned off on the blog, due to a massive spike in comment spam), there may be some bright spots on the Novell horizon that I have not reported. I'm willing to "concede" that, and am happy to hear about it.

Where Fedora Went Wrong

Filed under

Last month Eric S. Raymond made a public announcement on the Fedora developer’s list that he was giving up on Fedora Core and that from now on Ubuntu is his distribution of choice. Actually it was more of a rant than an announcement. ESR’s scatter shot attack on Fedora was wrong in more ways than I care to comment about here.

Cleaning up after Kazehakase

Filed under

I really love Kazehakase: It’s light, it’s fast, it’s clean and it does things that Firefox hasn’t thought of yet, or maybe needs a plugin to do (like a Tab Tree rather than just a list of active tabs, or a thumbnailed history of closed pages).

Bruce Perens: Clearing up anti-GPL3 FUD

Filed under

There's been a lot of talk about GPL version 3: whether it goes too far to be acceptable to business, whether the Linux kernel developers will accept it, whether our community will fork or undergo unrest over it. Much of that talk is based on a poor understanding of the GPL3 terms, and with release of the new license imminent, it's time to clear that up.

What Novell could learn from Google

Filed under

There's an interesting story on Slashdot this morning about why (possibly) Google may have been spoiling for a YouTube fight, rather than hoping to avoid it. As the theory in the article goes, Google may have wanted to get sued to protect the viability of YouTube, rather than leaving the copyright fight to a company less able to fight back (financially and strategically):

VLC beyond the basics

Filed under

VideoLAN's VLC is a cross-platform media player with a simple interface that doesn't require a degree in rocket science to operate. That doesn't mean, however, that VLC is a simplistic application: it has a few tricks up its sleeve that can significantly extend its functionality and enhance your user experience. Here are a couple of VLC's nifty features you might want to try.

Having fun with netcat.

Filed under

Netcat or nc in short can be aptly described as one of those two letter command-line tools that have all of legendary UNIX magic and power.

nc however is a new program and does not share the age of well known programs like cat or dd. However its power and versatility make one think why no one came up with this before.

(K)Ubuntu vs openSUSE

Filed under

I’ve installed Kubuntu on my laptop recently and I must say I am pretty impressed. It has picked up most of m laptops hardware and the hibernation and media button functions I could never get working on openSUSE worked out of the box! Pretty cool! I have no doubt I could have got them working with openSUSE but I wasn’t willing to spend the time on it.

KDE Konqueror FTP PASV Response Handling Client-Side Port Scanning Vulnerability

Filed under

A vulnerability has been identified in KDE Konqueror, which could be exploited by attackers to gain knowledge of sensitive information.

Taking Open Source to the Next Channel Level

Filed under

Any time anybody brings up open source in the channel there's always a note of excitement because the opportunity to provide high-margin technical services around open-source solutions has always been an attractive concept to solution providers.But despite the hype and expectations, the real potential of open source in the channel has largely gone unrealized.

Go Daddy Donates to Open Source

Filed under

Domain registrar and Web hosting provider Go Daddy ( announced on Thursday it is supporting open source applications by giving cash donations totalling $20,000 to assist in further development of their applications. The company has donated $10,000 each to content management system Joomla ( and online community forum Simple Machines Forum (

Running Windows Under Ubuntu 7.04

Filed under

QEmu can run an OS inside another OS - for example, Windows under Linux. QEmu uses kqemu, an acceleration driver included in Ubuntu 7.04 Feisty Fawn to run Windows at usable speed. Ubuntu 7.04 Feisty Fawn also includes a new version of rdesktop that can be used to start individual desktop apps from the VM on your normal desktop.

Applying "The Art of War" to Open Source, Linux and BSD

Filed under

Ask most people who have made the switch to a libre software product like Linux or BSD and they'll tell you that we're in a fight with Microsoft and everything that the closed-source world represents. It's not just us - Microsoft certainly thinks we're in a battle as well.

Microsoft's stolen code and IP infringements

Filed under

With all of the FUD coming out of Redmond, Washington these days about Linux infringing on Microsoft's IP, I thought I'd do a little research and see if Microsoft has ever been guilty of stealing code or infriging on others' IP. The results weren't surprising. If you live in a glass house... you know the rest.

Examples of Microsoft stealing code and infringing on IP:

Syndicate content

More in Tux Machines

Linux 4.8.4

I'm announcing the release of the 4.8.4 kernel. And yeah, sorry about the quicker releases, I'll be away tomorrow and as they seem to have passed all of the normal testing, I figured it would be better to get them out earlier instead of later. And I like releasing stuff on this date every year... All users of the 4.8 kernel series must upgrade. The updated 4.8.y git tree can be found at: git:// linux-4.8.y and can be browsed at the normal git web browser: Read more Also: Linux 4.7.10 Linux 4.4.27

New Releases: Budgie, Solus, SalentOS, and Slackel

  • Open-Source Budgie Desktop Sees New Release
    The pet parakeet of the Linux world, Budgie has a new release available for download. in this post we lookout what's new and tell you how you can get it.
  • Solus Linux Making Performance Gains With Its BLAS Configuration
    - Those making use of the promising Solus Linux distribution will soon find their BLAS-based workloads are faster. Solus developer Peter O'Connor tweeted this week that he's found some issues with the BLAS linking on the distribution and he's made fixes for Solus. He also mentioned that he uncovered these BLAS issues by using our Phoronix Test Suite benchmarking software.
  • SalentOS “Luppìu” 1.0 released!
    With great pleasure the team announces the release of SalentOS “Luppìu” 1.0.
  • Slackel "Live kde" 4.14.21
    This release is available in both 32-bit and 64-bit architectures, while the 64-bit iso supports booting on UEFI systems. The 64-bit iso images support booting on UEFI systems. The 32-bit iso images support both i686 PAE SMP and i486, non-PAE capable systems. Iso images are isohybrid.

Security News

  • Free tool protects PCs from master boot record attacks [Ed: UEFI has repeatedly been found to be both a detriment to security and enabler of Microsoft lock-in]
    Cisco's Talos team has developed an open-source tool that can protect the master boot record of Windows computers from modification by ransomware and other malicious attacks. The tool, called MBRFilter, functions as a signed system driver and puts the disk's sector 0 into a read-only state. It is available for both 32-bit and 64-bit Windows versions and its source code has been published on GitHub. The master boot record (MBR) consists of executable code that's stored in the first sector (sector 0) of a hard disk drive and launches the operating system's boot loader. The MBR also contains information about the disk's partitions and their file systems. Since the MBR code is executed before the OS itself, it can be abused by malware programs to increase their persistence and gain a head start before antivirus programs. Malware programs that infect the MBR to hide from antivirus programs have historically been known as bootkits -- boot-level rootkits. Microsoft attempted to solve the bootkit problem by implementing cryptographic verification of the bootloader in Windows 8 and later. This feature is known as Secure Boot and is based on the Unified Extensible Firmware Interface (UEFI) -- the modern BIOS.
  • DDOS Attack On Internet Infrastructure
    I hope somebody's paying attention. There's been another big DDOS attack, this time against the infrastructure of the Internet. It began at 7:10 a.m. EDT today against Dyn, a major DNS host, and was brought under control at 9:36 a.m. According to Gizmodo, which was the first to report the story, at least 40 sites were made unreachable to users on the US East Coast. Many of the sites affected are among the most trafficed on the web, and included CNN, Twitter, PayPal, Pinterest and Reddit to name a few. The developer community was also touched, as GitHub was also made unreachable. This event comes on the heels of a record breaking 620 Gbps DDOS attack about a month ago that brought down security expert Brian Krebs' website, KrebsonSecurity. In that attack, Krebs determined the attack had been launched by botnets that primarily utilized compromised IoT devices, and was seen by some as ushering in a new era of Internet security woes.
  • This Is Why Half the Internet Shut Down Today [Update: It’s Getting Worse]
    Twitter, Spotify and Reddit, and a huge swath of other websites were down or screwed up this morning. This was happening as hackers unleashed a large distributed denial of service (DDoS) attack on the servers of Dyn, a major DNS host. It’s probably safe to assume that the two situations are related.
  • Major DNS provider Dyn hit with DDoS attack
    Attacks against DNS provider Dyn continued into Friday afternoon. Shortly before noon, the company said it began "monitoring and mitigating a DDoS attack" against its Dyn Managed DNS infrastructure. The attack may also have impacted Managed DNS advanced service "with possible delays in monitoring."
  • What We Know About Friday’s Massive East Coast Internet Outage
    Friday morning is prime time for some casual news reading, tweeting, and general Internet browsing, but you may have had some trouble accessing your usual sites and services this morning and throughout the day, from Spotify and Reddit to the New York Times and even good ol’ For that, you can thank a distributed denial of service attack (DDoS) that took down a big chunk of the Internet for most of the Eastern seaboard. This morning’s attack started around 7 am ET and was aimed at Dyn, an Internet infrastructure company headquartered in New Hampshire. That first bout was resolved after about two hours; a second attack began just before noon. Dyn reported a third wave of attacks a little after 4 pm ET. In all cases, traffic to Dyn’s Internet directory servers throughout the US—primarily on the East Coast but later on the opposite end of the country as well—was stopped by a flood of malicious requests from tens of millions of IP addresses disrupting the system. Late in the day, Dyn described the events as a “very sophisticated and complex attack.” Still ongoing, the situation is a definite reminder of the fragility of the web, and the power of the forces that aim to disrupt it.
  • Either IoT will be secure or the internet will be crippled forever
    First things first a disclaimer. I neither like nor trust the National Security Agency (NSA). I believe them to be mainly engaged in economic spying for the corporate American empire. Glenn Greenwald has clearly proven that in his book No Place to Hide. At the NSA, profit and power come first and I have no fucking clue as to how high they prioritize national security. Having said that, the NSA should hack the Internet of (insecure) Things (IoT) to death. I know Homeland Security and the FBI are investigating where the DDoS of doomsday proportions is coming from and the commentariat is already screaming RUSSIA! But it is really no secret what is enabling this clusterfuck. It’s the Mirai botnet. If you buy a “smart camera” from the Chinese company Hangzhou XiongMai Technologies and do not change the default password, it will be part of a botnet five minutes after you connect it to the internet. We were promised a future where we would have flying cars but we’re living in a future where camera’s, light-bulbs, doorbells and fridges can get you in serious trouble because your home appliances are breaking the law.
  • IoT at the Network Edge
    Fog computing, also known as fog networking, is a decentralized computing infrastructure. Computing resources and application services are distributed in logical, efficient places at any points along the connection from the data source (endpoint) to the cloud. The concept is to process data locally and then use the network for communicating with other resources for further processing and analysis. Data could be sent to a data center or a cloud service. A worthwhile reference published by Cisco is the white paper, "Fog Computing and the Internet of Things: Extend the Cloud to Where the Things Are."
  • Canonical now offers live kernel patching for Ubuntu 16.04 LTS users
    Canonical has announced its ‘Livepatch Service’ which any user can enable on their current installations to eliminate the need for rebooting their machine after installing an update for the Linux kernel. With the release of Linux 4.0, users have been able to update their kernel packages without rebooting, however, Ubuntu will be the first distribution to offer this feature for free.
  • ​The Dirty Cow Linux bug: A silly name for a serious problem
    Dirty Cow is a silly name, but it's a serious Linux kernel problem. According to the Red Hat bug report, "a race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system."
  • Ancient Privilege Escalation Bug Haunts Linux
  • October 21, 2016 Is Dirty COW a serious concern for Linux?
  • There is a Dirty Cow in Linux
  • Red Hat Discovers Dirty COW Archaic Linux Kernel Flaw Exploited In The Wild
  • Linux kernel bug being exploited in the wild
  • Update Linux now: Critical privilege escalation security flaw gives hackers full root access
  • Linux kernel bug: DirtyCOW “easyroot” hole and what you need to know
  • 'Most serious' Linux privilege-escalation bug ever discovered
  • New 'Dirty Cow' vulnerability threatens Linux systems
  • Serious Dirty Cow Linux Vulnerability Under Attack
  • Easy-to-exploit rooting flaw puts Linux PCs at risk
  • Linux just patched a vulnerability it's had for 9 years
  • Dirty COW Linux vulnerability has existed for nine years
  • 'Dirty Cow' Linux Vulnerability Found
  • 'Dirty Cow' Linux Vulnerability Found After Nine Years
  • FakeFile Trojan Opens Backdoors on Linux Computers, Except openSUSE
    Malware authors are taking aim at Linux computers, more precisely desktops and not servers, with a new trojan named FakeFile, currently distributed in live attacks. Russian antivirus vendor Dr.Web discovered this new trojan in October. The company's malware analysts say the trojan is spread in the form of an archived PDF, Microsoft Office, or OpenOffice file.

today's howtos