Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 20 Jan 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Leftovers: Software Roy Schestowitz 23/09/2014 - 10:01pm
Story today's howtos Roy Schestowitz 23/09/2014 - 10:00pm
Story Leftovers: Gaming Roy Schestowitz 23/09/2014 - 9:58pm
Story Can Marten Mickos make 'Linux for the cloud' work for HP? Roy Schestowitz 23/09/2014 - 9:50pm
Story 50 Noteworthy New Open Source Projects Roy Schestowitz 23/09/2014 - 8:40pm
Story Salix Fluxbox 14.1 Is a Lightweight Modular Distro Based on Slackware Rianne Schestowitz 23/09/2014 - 8:32pm
Story Oracle and Canonical collaborate on support for Oracle Linux on Ubuntu Rianne Schestowitz 23/09/2014 - 8:22pm
Story Debian Switches Back To GNOME As Its Default Desktop Rianne Schestowitz 23/09/2014 - 8:08pm
Story 3 tools that make scanning on the Linux desktop quick and easy Roy Schestowitz 23/09/2014 - 8:05pm
Story Ubuntu 14.10 (Utopic Unicorn) Enters Final Beta Freeze Rianne Schestowitz 23/09/2014 - 7:59pm

Best Buy Selling Ubuntu: Now, the Bad News

Filed under
Ubuntu

workswithu.com: The Web is buzzing about Best Buy’s decision to stock Ubuntu Linux on its shelves. But I have to say, I’m not all that impressed by the news. Here’s why.

Also: I’ll have the #3 Value Meal, Super Size, with an order of Linux

The Perfect Server - OpenSUSE 11

Filed under
SUSE
HowTos

This is a detailed description about how to set up an OpenSUSE 11 server that offers all services needed by ISPs and hosters: Apache web server (SSL-capable), Postfix mail server with SMTP-AUTH and TLS, BIND DNS server, Proftpd FTP server, MySQL server, Dovecot POP3/IMAP, Quota, Firewall, etc. This tutorial is written for the 32-bit version of OpenSUSE 11, but should apply to the 64-bit version with very little modifications as well.

today's leftovers

Filed under
News
  • Have linux, will travel

  • Post-Gates: Microsoft, Competition and the Semantic Web
  • Why I Am Leaning Toward Debian
  • Bank of America may finally embrace Firefox
  • Can Open Source Drive Sustainable Innovation?
  • Italian lawyers use open source software to move online
  • Cheese : Easy to use WebCam application for Linux
  • Howto Schedule Bittorrents to Automatically Download in Ubuntu
  • FIRST: Water found on Moon
  • Announcing openSUSE Day at LinuxWorld Expo
  • MTN Huawei E220 on ubuntu linux
  • "Piggybacking" and the open-source trademark issue
  • The Open Source Mobile OS Battle Continues

How broken is Firefox 3.0

Filed under
Moz/FF

beranger.org: I thought it was me, but there are several reports of Firefox/Iceweasel 3.0 bugs, including missing images, right after they were loaded!

Drupal 6.3 and 5.8 released, fixing security issues

Filed under
Drupal

drupal.org: Drupal 6.3 and Drupal 5.8, maintenance releases fixing problems reported using the bug tracking system, as well as security vulnerabilities, are now available for download. Upgrading your existing Drupal 5 and 6 sites is strongly recommended.

Open-Source Business Policies: Everyone Is Making It Up As They Go Along

Filed under
OSS

cio.com: We know your company uses open-source applications. We also know many of you already have an open-source policy. Sort of. "Somewhat effective" policies are like "somewhat effective" security; clearly, there's more to be learned. CIO.com asked CIOs and other people in the trenches about what's working—and what's not.

Meet the People Who Have Trillions Riding on Linux this Fall

Filed under
Linux

Jim Zemlin: If you work around Linux regularly, in some ways the latest amazing news is… not that amazing. The New York Stock Exchange, where the world’s largest public companies trade their stocks, is now running on Linux. In addition the Chicago Mercantile Exchange also runs on Linux. While perhaps not as famous as the NYSE, the CME is one of the largest exchanges in the world. Even the Tokyo Stock Exchange is running on Linux. Why is this?

Palit GeForce 9600 GSO Sonic with Gentoo

Filed under
Hardware
Reviews

bioslevel.com: Palit is the second largest graphics manufacturer in the world. I'll be using the same system I've used in previous videocard reviews, and the system will be running both Windows Vista Business 64-bit with Service Pack 1 and Gentoo Linux 2008.0 64-bit. I'll look at some of the latest games in Windows, and look at a few similar benchmarks in Linux including results from the Phoronix Test Suite.

A Better Introduction to Linux User Interface

Filed under
Linux

linuxhaxor.net: Today I cam across a nice article by cnet on Linux user interface. The article obviously was geared towards new users who might be interested in Linux. For new users switching to Linux or even test-driving it has never been easier. But do we really think if we want to encourage new users towards linux, we can achieve it by showing an image of a Solitaire game and (oh my gosh!) a calculator?

Open source finally blooms at Google

Filed under
Google
OSS

Matt Asay: For all the bile that I and others have spewed at Google over the years for its adoption of open source, with little in the way of contributions back, it's amazing to see the trickle of open source from Google turn into an absolute flood.

Book Review - Beginning Ubuntu Linux, Third Edition

Filed under
Ubuntu

fosswire.com: It’s no coincidence that Ubuntu is now the most popular distribution of Linux for desktop PCs. It is one of the easiest distributions to set up and use for day-to-day tasks. Despite this, getting onto the ‘Linux ladder’, making your first steps into the world of Linux, can be daunting, especially without support.

some more howtos:

Filed under
HowTos
  • Update compiz fusion

  • Intel Wireless 3945abg on Gentoo
  • Using qemu on Windows
  • How to install Ubuntu on an MSI Wind laptop
  • Tip-add a option Delete to pop-up menu on Gnome
  • How to check what is running on your system
  • Enable Timed or Automatic Login on Ubuntu 8.04
  • Yum Download Only

New Linux-powered PowerStation dispels rumors Power Architecture's death

Filed under
Linux
Hardware

linux.com: Terra Soft, the developer of Yellow Dog Linux on the PowerStation platform, is pushing the limits of design and performance with the planned mid-July release of a quad core PowerPC deskside tower that returns the Power Architecture to both the workstation and server markets at a competitive price.

Killer Reiser In Jailhouse Interview: Sorry I Lied

Filed under
Reiser
Interviews

cbs5.com: In an exclusive interview with CBS News at the Santa Rita Jail in Dublin, 44-year-old Hans Reiser said he was sorry he lied on the witness stand during his trial when he maintained he had nothing to do with 31-year old Nina Reiser's death.

big sites picking up on Best Buy Ubuntu

Filed under
Ubuntu
  • Best Buy, Amazon selling Ubuntu for $20

  • Ubuntu Linux goes retail
  • Canonical and Valusoft bring Ubuntu plus support to Best Buy
  • Ubuntu's Best Buy
  • Best Buy stores to sell boxed version of Ubuntu Linux
  • Best Buy Is Selling Ubuntu
  • Ubuntu Linux at Best Buy

openSUSE Build Service 1.0 Released

Filed under
SUSE

opensuse.org: The 1.0 release provides all the features necessary to support building openSUSE in the public build systems and allowing direct contributions to openSUSE from all contributors. The openSUSE Build Service allows developers to create and maintain packages for openSUSE and many other Linux distributions, including CentOS, Debian, Fedora, Mandriva, Red Hat, and Ubuntu.

KDE 4.1 Improvements

Filed under
KDE

giannaros.org/blog: There are a lot of nice things in the upcoming 4.1, so I’ll just briefly mention a few of those visual ones which particularly interest me:

some howtos:

Filed under
HowTos
  • A Simple Guide to Making the Perfect Recording in Audacity

  • qGIS on Ubuntu Hardy
  • Vim Editing Multiple Files and Windowing Support Under Linux / UNIX
  • Fast, powerful Geany editor offers IDE features
  • Using Traps Outside Of Shell Scripts On Unix Or Linux
  • From noise to grain

Introducing wattOS - A Lightweight Ubuntu

Filed under
Linux

softpedia.com: wattOS... the last frontier, the lightweight Ubuntu-based operating system is now here! Faster than anything else out there, wattOS is not just another Ubuntu clone, it is powered by the Openbox window manager, a standards compliant, fast, lightweight and extensible window manager.

ISO to TMB: OOXML Appeals Should Be Denied

Filed under
OSS

groklaw.net: The processing of the ISO/IEC DIS 29500 project has been conducted in conformity with the ISO/IEC JTC 1 Directives, with decisions determined by the votes expressed by the relevant ISO and IEC national bodies under their own responsibility, and consequently, for the reasons mentioned above, the appeals should not be processed further.

Syndicate content

More in Tux Machines

Security: OpenSSL, IoT, and LWN Coverage of 'Intelpocalypse'

  • Another Face to Face: Email Changes and Crypto Policy
    The OpenSSL OMC met last month for a two-day face-to-face meeting in London, and like previous F2F meetings, most of the team was present and we addressed a great many issues. This blog posts talks about some of them, and most of the others will get their own blog posts, or notices, later. Red Hat graciously hosted us for the two days, and both Red Hat and Cryptsoft covered the costs of their employees who attended. One of the overall threads of the meeting was about increasing the transparency of the project. By default, everything should be done in public. We decided to try some major changes to email and such.
  • Some Basic Rules for Securing Your IoT Stuff

    Throughout 2016 and 2017, attacks from massive botnets made up entirely of hacked [sic] IoT devices had many experts warning of a dire outlook for Internet security. But the future of IoT doesn’t have to be so bleak. Here’s a primer on minimizing the chances that your IoT things become a security liability for you or for the Internet at large.

  • A look at the handling of Meltdown and Spectre
    The Meltdown/Spectre debacle has, deservedly, reached the mainstream press and, likely, most of the public that has even a remote interest in computers and security. It only took a day or so from the accelerated disclosure date of January 3—it was originally scheduled for January 9—before the bugs were making big headlines. But Spectre has been known for at least six months and Meltdown for nearly as long—at least to some in the industry. Others that were affected were completely blindsided by the announcements and have joined the scramble to mitigate these hardware bugs before they bite users. Whatever else can be said about Meltdown and Spectre, the handling (or, in truth, mishandling) of this whole incident has been a horrific failure. For those just tuning in, Meltdown and Spectre are two types of hardware bugs that affect most modern CPUs. They allow attackers to cause the CPU to do speculative execution of code, while timing memory accesses to deduce what has or has not been cached, to disclose the contents of memory. These disclosures can span various security boundaries such as between user space and the kernel or between guest operating systems running in virtual machines. For more information, see the LWN article on the flaws and the blog post by Raspberry Pi founder Eben Upton that well describes modern CPU architectures and speculative execution to explain why the Raspberry Pi is not affected.
  • Addressing Meltdown and Spectre in the kernel
    When the Meltdown and Spectre vulnerabilities were disclosed on January 3, attention quickly turned to mitigations. There was already a clear defense against Meltdown in the form of kernel page-table isolation (KPTI), but the defenses against the two Spectre variants had not been developed in public and still do not exist in the mainline kernel. Initial versions of proposed defenses have now been disclosed. The resulting picture shows what has been done to fend off Spectre-based attacks in the near future, but the situation remains chaotic, to put it lightly. First, a couple of notes with regard to Meltdown. KPTI has been merged for the 4.15 release, followed by a steady trickle of fixes that is undoubtedly not yet finished. The X86_BUG_CPU_INSECURE processor bit is being renamed to X86_BUG_CPU_MELTDOWN now that the details are public; there will be bug flags for the other two variants added in the near future. 4.9.75 and 4.4.110 have been released with their own KPTI variants. The older kernels do not have mainline KPTI, though; instead, they have a backport of the older KAISER patches that more closely matches what distributors shipped. Those backports have not fully stabilized yet either. KPTI patches for ARM are circulating, but have not yet been merged.
  • Is it time for open processors?
    The disclosure of the Meltdown and Spectre vulnerabilities has brought a new level of attention to the security bugs that can lurk at the hardware level. Massive amounts of work have gone into improving the (still poor) security of our software, but all of that is in vain if the hardware gives away the game. The CPUs that we run in our systems are highly proprietary and have been shown to contain unpleasant surprises (the Intel management engine, for example). It is thus natural to wonder whether it is time to make a move to open-source hardware, much like we have done with our software. Such a move may well be possible, and it would certainly offer some benefits, but it would be no panacea. Given the complexity of modern CPUs and the fierceness of the market in which they are sold, it might be surprising to think that they could be developed in an open manner. But there are serious initiatives working in this area; the idea of an open CPU design is not pure fantasy. A quick look around turns up several efforts; the following list is necessarily incomplete.
  • Notes from the Intelpocalypse
    Rumors of an undisclosed CPU security issue have been circulating since before LWN first covered the kernel page-table isolation patch set in November 2017. Now, finally, the information is out — and the problem is even worse than had been expected. Read on for a summary of these issues and what has to be done to respond to them in the kernel. All three disclosed vulnerabilities take advantage of the CPU's speculative execution mechanism. In a simple view, a CPU is a deterministic machine executing a set of instructions in sequence in a predictable manner. Real-world CPUs are more complex, and that complexity has opened the door to some unpleasant attacks. A CPU is typically working on the execution of multiple instructions at once, for performance reasons. Executing instructions in parallel allows the processor to keep more of its subunits busy at once, which speeds things up. But parallel execution is also driven by the slowness of access to main memory. A cache miss requiring a fetch from RAM can stall the execution of an instruction for hundreds of processor cycles, with a clear impact on performance. To minimize the amount of time it spends waiting for data, the CPU will, to the extent it can, execute instructions after the stalled one, essentially reordering the code in the program. That reordering is often invisible, but it occasionally leads to the sort of fun that caused Documentation/memory-barriers.txt to be written.

US Sanctions Against Chinese Android Phones, LWN Report on Eelo

  • A new bill would ban the US government from using Huawei and ZTE phones
    US lawmakers have long worried about the security risks posed the alleged ties between Chinese companies Huawei and ZTE and the country’s government. To that end, Texas Representative Mike Conaway introduced a bill last week called Defending U.S. Government Communications Act, which aims to ban US government agencies from using phones and equipment from the companies. Conaway’s bill would prohibit the US government from purchasing and using “telecommunications equipment and/or services,” from Huawei and ZTE. In a statement on his site, he says that technology coming from the country poses a threat to national security, and that use of this equipment “would be inviting Chinese surveillance into all aspects of our lives,” and cites US Intelligence and counterintelligence officials who say that Huawei has shared information with state leaders, and that the its business in the US is growing, representing a further security risk.
  • U.S. lawmakers urge AT&T to cut commercial ties with Huawei - sources
    U.S. lawmakers are urging AT&T Inc, the No. 2 wireless carrier, to cut commercial ties to Chinese phone maker Huawei Technologies Co Ltd and oppose plans by telecom operator China Mobile Ltd to enter the U.S. market because of national security concerns, two congressional aides said. The warning comes after the administration of U.S. President Donald Trump took a harder line on policies initiated by his predecessor Barack Obama on issues ranging from Beijing’s role in restraining North Korea to Chinese efforts to acquire U.S. strategic industries. Earlier this month, AT&T was forced to scrap a plan to offer its customers Huawei [HWT.UL] handsets after some members of Congress lobbied against the idea with federal regulators, sources told Reuters.
  • Eelo seeks to make a privacy-focused phone
    A focus on privacy is a key feature being touted by a number of different projects these days—from KDE to Tails to Nextcloud. One of the biggest privacy leaks for most people is their phone, so it is no surprise that there are projects looking to address that as well. A new entrant in that category is eelo, which is a non-profit project aimed at producing not only a phone, but also a suite of web services. All of that could potentially replace the Google or Apple mothership, which tend to collect as much personal data as possible.

today's howtos

Mozilla: Resource Hogs, Privacy Month, Firefox Census, These Weeks in Firefox

  • Firefox Quantum Eats RAM Like Chrome
    For a long time, Mozilla’s Firefox has been my web browser of choice. I have always preferred it to using Google’s Chrome, because of its simplicity and reasonable system resource (especially RAM) usage. On many Linux distributions such as Ubuntu, Linux Mint and many others, Firefox even comes installed by default. Recently, Mozilla released a new, powerful and faster version of Firefox called Quantum. And according to the developers, it’s new with a “powerful engine that’s built for rapid-fire performance, better, faster page loading that uses less computer memory.”
  • Mozilla Communities Speaker Series #PrivacyMonth
    As a part of the Privacy Month initiative, Mozilla volunteers are hosting a couple of speaker series webinars on Privacy, Security and related topics. The webinars will see renowned speakers talking to us about their work around privacy, how to take control of your digital self, some privacy-security tips and much more.
  • “Ewoks or Porgs?” and Other Important Questions
    You ever go to a party where you decide to ask people REAL questions about themselves, rather than just boring chit chat? Us, too! That’s why we’ve included questions that really hone in on the important stuff in our 2nd Annual Firefox Census.
  • These Weeks in Firefox: Issue 30