Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Thursday, 16 Aug 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Black Lab Linux 4.1.8 released Rianne Schestowitz 23/11/2013 - 8:45pm
Story Leftovers: Gaming Roy Schestowitz 23/11/2013 - 8:43pm
Story Google Pays States , Newegg Tackles Troll & More Rianne Schestowitz 23/11/2013 - 8:38pm
Story GLib 2.38.2 Adds Workaround for Buggy D-Bus Daemons Rianne Schestowitz 23/11/2013 - 8:27pm
Story TurnKey Linux 13 Has Been Released Rianne Schestowitz 23/11/2013 - 8:21pm
Story K. Y. Srinivasan: From Serving Microsoft’s Agenda Inside Novell to Helping Microsoft Infiltrate and Control Linux Roy Schestowitz 23/11/2013 - 8:15pm
Story Best Practice Linux Guide: Data Security Rianne Schestowitz 23/11/2013 - 8:08pm
Story The Linux Mint Security Controversy Taken Out of Proportions, Distracting From Real Controversies Roy Schestowitz 23/11/2013 - 7:27pm
Story Winamp Petition Emerges as Microsoft Considers Purchase Roy Schestowitz 23/11/2013 - 12:27pm
Story Leftovers: KDE Roy Schestowitz 23/11/2013 - 10:07am

n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a

Understanding and Using file permissions

Filed under
HowTos

In GNU/Linux, file access is restricted. Users don't necessarily have the same rights when it comes to deleting, executing or even reading files. In fact, every file contain data such as its owner, its permissions and other information which defines exactly what can be done with it, and by whom.

Microsoft: Don't sell PCs without operating systems

Filed under
Microsoft

Naked PCs: Free software supporters are angry that Microsoft is putting pressure on PC vendors not to sell machines without an operating system installed.

How To Get Data For Mrtg Without Running SNMP Daemon?

Filed under
HowTos

Plotting traffic graphs is one of the most popular UNIX admin tasks. Mrtg is a great tool and it is widely used for plotting traffic graphs. It can be easily set up to plot statistics for any SNMP-enabled device. But sometimes we can not setup snmp daemon in Linux server because of small amount of memory or because of some another reasons. How we can plot our favourite graphs in such cases? Full Story.

LinuxWorld: Gentlemens' Agreement

Filed under
Linux

One thing you notice on the show floor this year (besides the smoke from the Unisys booth, that is), is the distinct lack of certain vendors. Namely, IBM and HP, who usually have some sort of show floor presence at LinuxWorld. Not this time.

LinuxWorld: GPL 3 And The Linux Kernel Devs

Filed under
Linux

The under-discussion GPL version 3 license is a bit of a hot potato. Some like it and others, such as Linux creator Linus Torvalds, do not.

Making GNOME Look Like OS X

Filed under
HowTos

The GNOME desktop environment offers a wide variety of choices when it comes to cosmetics; you can make it look like practically anything. In its default condition, GNOME is highly usable, but perhaps a little bland. If you've always admired the Apple OS X desktop theme and layout but aren't ready to drop a load of cash on an Apple machine, this article will show you how to make GNOME look and feel more like OS X.

2006: The year of desktop Linux?

Filed under
Linux

If ever there was a time for agencies to think about the operating system they deploy on their client systems, it's now. That's because Windows Vista is on the horizon, complete with steep hardware requirements and confusing upgrade pricing. So chances are you have an OS upgrade in your near-term plans. The question is, which OS will it be?

Open-Source Advocates: Microsoft's Development Model Is Failing

Filed under
Microsoft

Proponents of the free and open-source software development model are using the recently announced delays in the shipping of Microsoft's Windows Vista and Office 2007 products as an example of how the company's software engineering process simply does not work well.

n/a
n/a

AppArmor: Much Ado About Nothing

Filed under
SUSE

The most important question for AppArmor is to ask in which scenarios in can provide a reasonable security improvement. The problem is, there aren't many.

Linux, Lingerie Perfect Mix For Fashion Company

Filed under
Linux

ASX-listed underwear, fashion design and direct sales company UnderCoverWear (UCW) has revealed how building its business around Linux and open source increased IT flexibility while avoiding vendor lock-in.

Syndicate content

More in Tux Machines

Ubuntu, Debian, RHEL, and CentOS Linux Now Patched Against "Foreshadow" Attacks

Both Canonical and Red Hat emailed us with regards to the L1 Terminal Fault security vulnerability, which are documented as CVE-2018-3620 for operating systems and System Management Mode (SMM), CVE-2018-3646 for impacts to virtualization, as well as CVE-2018-3615 for Intel Software Guard Extensions (Intel SGX). They affect all Linux-based operating system and machines with Intel CPUs. "It was discovered that memory present in the L1 data cache of an Intel CPU core may be exposed to a malicious process that is executing on the CPU core. This vulnerability is also known as L1 Terminal Fault (L1TF). A local attacker in a guest virtual machine could use this to expose sensitive information (memory from other guests or the host OS)," reads the Ubuntu security advisory. Read more

Hands-on with Linux Mint Debian Edition 3 Beta

I have been out of touch for the past six months, because I accepted a teaching position in Amsterdam. The amount of time that required, and the weekly commute from Switzerland (yes, really, weekly), was vastly more than I expected, and left me no time to do justice to my blog. But now I am back again, and determined to manage my time more effectively and keep up with blogging. Although I haven't been writing, I certainly have been keeping up with news and developments in the Linux world. What really inspired me to get busy and write again was the announcement of LMDE 3 (Cindy) Beta. Hooray! How long have we been waiting for this? It feels like years. Oh, that's because it has been years. Read more

Security Leftovers

  • Theo on the latest Intel issues

    Theo de Raadt (deraadt@) posted to the tech@ mailing list with some background on how the latest discovered Intel CPU issues relate to OpenBSD.

    [...]

    These 3 issues (CVE-2018-3615, CVE-2018-3620, CVE-2018-3646) together are the currently public artifacts of this one bug.

  • Putting Stickers On Your Laptop Is Probably a Bad Security Idea

    Mitchell said political stickers, for instance, can land you in secondary search or result in being detained while crossing a border. In one case, Mitchell said a hacker friend ended up missing a flight over stickers.

  • Video Shows Hotel Security at DEF CON Joking About Posting Photos of Guests' Belongings to Snapchat

    But the room check captured on video suggests the walkthroughs are subject to abuse by hotel personnel who may use them as opportunity to snoop on guests or take and post images for amusement. And accounts of other searches that involved hotel security staff refusing to show ID or showing insufficient ID, and displaying bullying and threatening behavior to guests in occupied rooms, raises questions about the legality of the searches and the tactics and training of security personnel.

  • Researchers in Finland detect vulnerability in password management software
    Researchers identified a security gap in more than 10 applications used by millions around the world, including an app used by Finland's population registry.
  • Trump ends Obama-era rules on US-led cyberattacks: report
     

    The memorandum required that an extensive interagency process take place before the U.S. government embarks on any cyberattacks. Trump reversed the rules to try and ease some of those restrictions, which critics argued were detrimental to launching the attacks quickly, according to the Journal.

Android Leftovers