Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Wednesday, 18 Jul 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

n/a
n/a

Jeeves the Butler gets the bullet

Filed under
Web

ASK JEEVES will become plain old Ask.com at the end of this month, Interactive Corporation said.

Gravee Search Engine

Filed under
Web

Gr@vee wants to be your new search engine/social bookmarking/tagging site. Competing against Google, MSN et al. is a rather tall order, but they are coming at it with some unique ideas.

CrossOver Office Now Shipping For Linspire

Filed under
Software

CodeWeavers and Linspire on Wednesday announced CrossOver Office for Linspire 5.0, the first time the software has been made available for the Linspire Linux OS.

Why Not Python?, Part 3

Filed under
HowTos

Now it's time for this new Python user to do the hard work--code the program to fill in the blanks of Sudoku puzzles.

The end of the (free) pipe dream?

Filed under
Web

Gervase Markham, our man from Mozilla, says that charging for sending e-mails could create a dangerous precedent on the previously free-to-access internet.

Firefox Exploit Emerges

Filed under
Security

An exploit that takes advantage of a recently-patched bug in Mozilla Corp.'s Firefox browser has gone public.

Review: SimplyMEPIS 3.4-3

Filed under
Linux
Reviews

SimplyMEPIS is a KDE-based, Debian-derived distro that focuses on desktop use. The previous stable release came out in May of 2005, but the newest version of SimplyMEPIS is scheduled for release today, and it looks like a great release for anyone who's interested in desktop Linux.

Northland Demo

Filed under
Gaming

Linuxgames.com reports, that Runesoft has released a demo for Northland, a strategy game developed by Funatics Software that features unit/structure management and adventure-style riddles.

Also: Enemy Territory: Quake Wars Preview

HP picks Red Hat for advanced telecoms server

Filed under
Linux

Red Hat Inc has announced that Hewlett-Packard Co has selected its Enterprise Linux operating system for its new Advanced Telecommunications Computing Architecture blade server.

Final Gnome 2.12 version released

Filed under
Software

The Gnome project Wednesday released version 2.12.3 of its popular Linux desktop, the final release in the 2.12 branch. Version 2.13 will be skipped, and the next edition, v2.14, is already well into development, the project said.

GooBuntu - Googles New OS

Filed under
Linux
Google

After initially downplaying reports that they will release their own operating system, Google has confirmed it is working on a desktop linux project called Goobuntu.

OpenOffice, IBM, and Redmond buses

Filed under
Misc

On the streets of Redmond, Wash. -- aka the center of all evil in the known universe -- you can now find buses bedecked with OpenOffice and Sun ads.

Nice Rewriting of the Factual History

Filed under
Web

Beranger has posted some interesting screenshots showing the vast differences in search engine results in and out of the iron information curtain.

Outdoor WiFi router runs x86 Debian Linux

Filed under
Linux

German networking equipment integrator Saxonia is shipping an x86-based outdoor WiFi router that runs Debian Sarge. The Meshnode router boots a 2.6.15 Linux kernel from CompactFlash, and offers lots of room to install most any normal x86 Debian package, the company says.

The Ultimate Media Server - Apache+SSL , PHP, MySQL and Jinzora

Filed under
HowTos

This guide will lead you through creating a secure ssl based webserver to be able to stream your multimedia across the World Wide Web. Before embarking on this journey I would highly recommend reading this documentation in it's fullest before executing any of it. You may find some pointers in the tips and tweaks section that you can make during installation that would make this install even easier and make it a one time install.

Where Did Firefox Come From?

Filed under
Moz/FF

I got involved with Mozilla because I loved the idea of working on something that had the potential to make an impact on millions of people. My friends and I lived in our browsers, so there was also a tangible payoff for contributions that made it into a shipping Netscape release.

Keep in touch (tcp keepalives etc.)

Filed under
HowTos

You can't please everyone, so you got to please yourself..(Ricky Nelson)

I don't imagine Ricky Nelson was thinking about tcp timeouts and keepalives in the 70's, and probably isn't still, but the subject comes up fairly often for me and never fails to be annoying.

n/a
Syndicate content

More in Tux Machines

Security: SSL, Microsoft Windows TCO, Security Breach Detection and SIM Hijackers

  • Why Does Google Chrome Say Websites Are “Not Secure”?
    Starting with Chrome 68, Google Chrome labels all non-HTTPS websites as “Not Secure.” Nothing else has changed—HTTP websites are just as secure as they’ve always been—but Google is giving the entire web a shove towards secure, encrypted connections.
  • Biggest Voting Machine Maker Admits -- Ooops -- That It Installed Remote Access Software After First Denying It [Ed: Microsoft Windows TCO]
    We've been covering the mess that is electronic voting machines for nearly two decades on Techdirt, and the one thing that still flummoxes me is how are they so bad at this after all these years? And I don't mean "bad at security" -- though, that's part of it -- but I really mean "bad at understanding how insecure their machines really are." For a while everyone focused on Diebold, but Election Systems and Software (ES&S) has long been a bigger player in the space, and had just as many issues. It just got less attention. There was even a brief period of time where ES&S bought what remained of Diebold's flailing e-voting business before having to sell off the assets to deal with an antitrust lawsuit by the DOJ. What's incredible, though, is that every credible computer security person has said that it is literally impossible to build a secure fully electronic voting system -- and if you must have one at all, it must have a printed paper audit trail and not be accessible from the internet. Now, as Kim Zetter at Motherboard has reported, ES&S -- under questioning from Senator Ron Wyden -- has now admitted that it installed remote access software on its voting machines, something the company had vehemently denied to the same reporter just a few months ago.
  • Bringing cybersecurity to the DNC [Ed: Microsoft Windows TCO. Microsoft Exchange was used.]
    When Raffi Krikorian joined the Democratic National Committee (DNC) as chief technology officer, the party was still reeling from its devastating loss in 2016 — and the stunning cyberattacks that resulted in high-level officials’ emails being embarrassingly leaked online.
  • Getting Started with Successful Security Breach Detection
    Organizations historically believed that security software and tools were effective at protecting them from hackers. Today, this is no longer the case, as modern businesses are now connected in a digital global supply ecosystem with a web of connections to customers and suppliers. Often, organizations are attacked as part of a larger attack on one of their customers or suppliers. They represent low hanging fruit for hackers, as many organizations have not invested in operationalizing security breach detection. As this new reality takes hold in the marketplace, many will be tempted to invest in new technology tools to plug the perceived security hole and move on with their current activities. However, this approach is doomed to fail. Security is not a "set it and forget it" type of thing. Defending an organization from a breach requires a careful balance of tools and operational practices -- operational practices being the more important element.
  • The SIM Hijackers

    By hijacking Rachel’s phone number, the hackers were able to seize not only Rachel’s Instagram, but her Amazon, Ebay, Paypal, Netflix, and Hulu accounts too. None of the security measures Rachel took to secure some of those accounts, including two-factor authentication, mattered once the hackers took control of her phone number.

GNU/Linux Desktops/Laptops and Windows Spying

  • Changes [Pop!_OS]

    For the last 12 years, my main development machine has been a Mac. As of last week, it’s a Dell XPS 13 running Pop!_OS 18.04.

    [...]

    Take note: this is the first operating system I’ve used that is simpler, more elegant, and does certain things better than macOS.

  • System76 Opens Manufacturing Facility to Build Linux Laptops
    As it turns out, System76 is making the transition from a Linux-based computer seller, into a complete Linux-based computer manufacturer. The Twitter photos are from their new manufacturing facility. This means that System76 will no longer be slapping their logo on other company’s laptops and shipping them out, but making their own in-house laptops for consumers.
  • Extension adding Windows Timeline support to third-party browsers should have raised more privacy questions
    Windows Timeline is a unified activity history explorer that received a prominent placement next to the Start menu button in Windows 10 earlier this year. You can see all your activities including your web browser history and app activity across all your Windows devices in one place; and pickup and resume activities you were doing on other devices. This is a useful and cool feature, but it’s also a privacy nightmare. You may have read about a cool new browser extension that adds your web browsing history from third-party web browsers — including Firefox, Google Chrome, Vivaldi, and others — to Windows Timeline. The extension attracted some media attention from outlets like MSPoweruser, Neowin, The Verge, and Windows Central.

Public money, public code? FSFE spearheads open-source initiative

Last September, the non-profit Free Software Foundation Europe (FSFE) launched a new campaign that calls for EU-wide legislation that requires publicly financed software developed for the public sector to be made publicly available under a free and open-source software license. According to the ‘Public Money, Public Code’ open letter, free and open-source software in the public sector would enable anyone to “use, study, share, and improve applications used on a daily basis”. The initiative, says the non-profit, would provide safeguards against public sector organizations being locked into services from specific companies that use “restrictive licenses” to hinder competition. The FSFE also says the open-source model would help improve security in the public sector, as it would allow backdoors and other vulnerabilities to fixed quickly, without depending on one single service provider. Since its launch, the Public Money, Public Code initiative has gained the support of 150 organizations, including WordPress Foundation, Wikimedia Foundation, and Tor, along with nearly 18,000 individuals. With the initiative now approaching its first anniversary, The Daily Swig caught up with FSFE spokesperson Paul Brown, who discussed the campaign’s progress. Read more

Best Tools to Access Remote Linux Desktop

Nowadays, you can’t carry your system or laptop everywhere. So to make the things more manageable, there is a service of remote access that gives you full access to your system from anywhere. It is made possible by the Microsoft that developed a remote desktop protocol (RDP), which offers a graphical interface to connect to a remote system over a network connection. Read more