Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Thursday, 16 Aug 18 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Best Linux distros for 2013 srlinuxx 06/06/2013 - 6:16pm
Story some leftovers: srlinuxx 06/06/2013 - 4:41pm
Story GNOME Shell 3.9.2 Is Ready srlinuxx 06/06/2013 - 5:02am
Story YaST Gets Rewritten - in Ruby srlinuxx 06/06/2013 - 3:03am
Story some odds & ends: srlinuxx 05/06/2013 - 8:13pm
Story How to customize Linux Mint 15 Cinnamon srlinuxx 05/06/2013 - 8:07pm
Story debian-multimedia.org grabbed by an unknown entity srlinuxx 05/06/2013 - 5:51pm
Story Mozillux: A Nice Linux Distro With a Unique Software Set srlinuxx 05/06/2013 - 5:06pm
Story Debian Wheezy vs Intel 4965AGN srlinuxx 05/06/2013 - 5:04pm
Story Linux Mint 15 Review – Close to Perfection srlinuxx 05/06/2013 - 5:02pm

Sony awards prizes to university programming students

Filed under
Gaming

Sony Computer Entertainment has awarded prizes to three students using PlayStation2-Linux development kits donated by Sony.

Linux Kernel IPv6 Denial of Service Vulnerability

Filed under
Security

Tetsuo Handa has reported a vulnerability in the Linux Kernel, which potentially can be exploited by malicious, local users to cause a DoS.

Quake 4 Screenshots

Filed under
Gaming

id software released the long awaited Quake4 Tuesday and promised Linux binaries within the week. They had them posted in 2 days! Such commitment to Linux users should be rewarded. Phoronix has posted many screenshots to tempt even the most passive of souls.

When is Debian not Debian?

Filed under
Linux

There are times when I just want to crack some open-source heads together.

Take, please take, for example, the current fit in Debian circles over whether the DCC Alliance can use the Debian name or trademark.

Linux-powered handheld gaming gadget due Nov. 30

Filed under
Gaming

Several online stores are accepting pre-orders for an inexpensive handheld Linux gaming device expected to ship Nov. 30. The Gamepark Holdings GP2X-F100 features dual ARM9 processors, USB 2.0, and a 3.5-inch color LCD.

OpenOffice.org 2.0: An Office Suite With No Horizons

Filed under
OOo

Mad Penguin™ is running the third of three interviews with some of the people who have been hunkered down in endless meetings or hunched over their keyboards to bring us such a splendid, robust, virus-free code base. Today's interview is with OOo community manager, Louis Suarez-Potts.

Novell layoffs coming?

Filed under
Misc

Novell may lay off 10 to 15 percent of its staff as early as Monday, according to sources close to the company. It appears that one or more of the larger shareholders in the company are becoming worried about Novell's future.

Super 'Firefox' previewed

Filed under
Software

A BROWSER based on the open source browser Firefox, called Flock, has just been released and claims to give a taste of what life would be like under Web 2.

Quake 4 retail Linux client/server patch v1.0.2147

Filed under
Gaming

As promised, id Software has released the Linux retail client/server patch for Quake 4, offering Penguin-powered gamers the opportunity to play this sci-fi first-person shooter sequel by Raven Software on their OS of choice.

OpenOffice celebrates turning 2.0

Filed under
OOo

Programmers released version 2 of OpenOffice.org on Thursday, a major overhaul to an open-source software suite that has recently become a more serious rival to Microsoft Office.

Open-source software seen gaining in Europe

Filed under
OSS

Open-source software is gaining ground in Europe and the developing world, with users attracted by lower costs and accessibility, according to a recent study and industry observers.

Open Source Software: It's Not (Only) About the Money

Filed under
OSS

Forget about the money. Saving a few hundred dollars per seat won't balance out a project. Instead, consider the merits of each type of software. You may still be surprised.

n/a

ISP-Server Setup - Ubuntu 5.10 "Breezy Badger"

Filed under
HowTos

This is a detailed description about the steps to be taken to setup a Ubuntu based server (Ubuntu 5.10 - Breezy Badger) that offers all services needed by ISPs and hosters (web server (SSL-capable), mail server (with SMTP-AUTH and TLS!), DNS server, FTP server, MySQL server, POP3/POP3s/IMAP/IMAPs, Quota, Firewall, etc.).

Newbie's Top Ten Commands

Filed under
Linux

Desktoplinux.com has dug up this useful and hilarious Newbie's Top 10 Commands List. It's about 5 years old now and was written by a once-upon-a-time good friend of mine. Although the author has dropped off the radar, his Top 10 List is forever.

Firefox exceeds 100 million downloads in one year

Filed under
Moz/FF

The Mozilla Foundation extended 100 million "thank you's" Wednesday to Firefox community members for "reigniting innovation on the Web.

Quake IV GNU/Linux FAQ

Filed under
Gaming

The Quake IV Linux FAQ has appeared online. Having hardware requirements, installation instructions, and other userful information, it's a page you might want to bookmark.

PHP Puts Web Apps, Wikis in Users' Hands

Filed under
Software

PHP, which was introduced in 1999 as Personal Home Page, has developed into a popular alternative or supplement to the Java and .Net enterprise application development platform, largely due to its relative simplicity of configuration, lack of licensing fees and ability to run on any operating system.

Also: HOWTO: Creating an Online Survey with PHP

Review: Linux in a Nutshell

Filed under
Reviews

Linux in a Nutshell, 5th Edition is a desk reference -- not something you'd read cover-to-cover, and you wouldn't want it to be your only source of Linux-related information, but it's handy to have around if you use the GNU/Linux operating system on a regular basis.

UK resists radical net overhaul

Filed under
Web

The firm that runs the .uk net domain name, Nominet, says there should be no radical change to the way that the internet is managed globally.

Syndicate content

More in Tux Machines

Android Leftovers

OSS Leftovers

  • 8 hurdles IT must overcome if they want open source success
    Open source software has the potential to drive innovation and collaboration across an enterprise, and can transform the way developers work together. "Open source is now part of the evaluation criteria when deciding on a software platform, so much so that it is expected," said Matt Ingenthron, senior director of engineering at Couchbase. "In this way, open source has somewhat faded into the background in a positive way. Just like no consumer would inquire if a mobile phone had internet access or text messaging, choosing an open source solution is almost always an option."
  • Sprint calls on open source analytics to prevent cyberfraud
    Mobile phone-related fraud is big business. Fraudsters, hackers, and other bad actors employ creative techniques to compromise networks, hijack user information, and piece together customer identities that are then sold for big bucks on the dark web. To protect its customers, Sprint needed to transform the way it detected and blocked fraudulent activity. “In the mobile phone business, there’s no markup on selling devices — our bread and butter is the network and the services that are delivered on that network, through the devices,” says Scott Rice, CIO of Sprint. “Identity theft is a huge problem and the ability for nefarious actors to use that theft of information to impersonate our customers means we were eating the costs of the devices and the costs of services delivery.”
  • Open Source Platform Delivers LDAP Integration
    The latest release of InfluxData, an open source platform for metrics, events, and other time series data, adds LDAP integration, new advanced analytics, and self-healing capabilities in the time series database platform. According to the company, time series data, collected and stored with InfluxData’s Time Series database platform is integral to observability and is becoming mission critical for organizations. Enhancements to InfluxEnterprise make it easier for administrators to keep this mission critical data available and secure by checking and verifying every requested action. This includes creating databases, storing data and running queries – against a user’s stored authorizations and role.
  • YOYOW-WeCenter Special Edition Release: Free and Open Source
    The YOYOW-WeCenter Special Edition, customized and developed by YOYOW and based on WeCenter Q&A community framework, has been released on GitHub. Compared to regular WeCenter frameworks, YOYOW is providing free open source services and will be continually iterating products and will be introducing an incentive mechanism. Each Q&A community can directly integrate into YOYOW's bottom layer network and enjoy the network services provided by YOYOW.
  • Add-on Recommended By Mozilla Caught Logging Users’ Browsing History
    According to the reports by Mike Kuketz, an independent security blogger from Germany and uBlock Origin, an add-on named “Web Security” has been caught collecting users’ browsing history. [...] Soon after this discovery by Hill, Kuketz added a post on his blog about the same extension pointing to the same strange behavior of the add-on. A user on Kuketz’s blog decoded the garbled data and found that the add-on was collecting users’ browsing history and sending it to a German server.
  • Zombies: Top 5 Open Source Vulnerabilities That Refuse To Die [Ed: Microsoft partner WhiteSource continues to stigmatise FOSS as a security nightmare, using bugs branded by other Microsoft partner for extra panic]
  • How a civic hacker used open data to halve tickets at Chicago's most confusing parking spot
    Matt Chapman used the Freedom of Information Act to get the City of Chicago's very mess parking ticket data; after enormous and heroic data normalization, Chapman was able to pinpoint one of the city's most confusing parking spots, between 1100-1166 N State St, which cycled between duty as a taxi-stand and a parking spot with a confusingly placed and semi-busted parking meter. After surveying the site and deducing the problem, Chapman contacted the alderman responsible for that stretch of North State Street, and, eight months later, the signage was cleaned up and made more intuitive. Followup data analysis showed that Chapman's work had halved the number of parking tickets issued on the spot, with 600-odd fewer tickets in the past 20 months, for a savings of $60,000 to Chicago motorists.
  • Bluespec, Inc. Releases a New Family of Open-Source RISC-V Processors
    Bluespec Inc. has released Piccolo, its first in a family of RISC-V open-source processors provided as a vehicle for open innovation in embedded systems. Piccolo is a 3-stage RV32IM processor whose small “footprint” is ideal for many IoT applications. The repository (https://github.com/bluespec/Piccolo) contains a royalty-free synthesizable Verilog core that can be easily integrated and deployed into an ASIC or FPGA. Bluespec, Inc. will actively maintain Piccolo. It also offers commercial-grade tools for the customization and verification of RISC-V cores. Configurations will be continually added to provide the full spectrum of embedded controller features. Companies or universities interested in contributing to the Piccolo project should contact Bluespec, Inc. (add contact – RISC-V open source support).

KDE Applications 18.08 Open-Source Software Suite Released, Here's What's New

Being in development for the past several months, KDE Applications 18.08 goes stable today and will hit the software repositories of various popular GNU/Linux distributions during the next few days. This is a major release and brings numerous new features and improvements across multiple apps, including Dolphin, Konsole, Gwenview, KMail, Akonadi, Cantor, Spectacle, and others. "We continuously work on improving the software included in our KDE Application series, and we hope you will find all the new enhancements and bug fixes useful," reads today's announcement. "More than 120 bugs have been resolved in applications including the Kontact Suite, Ark, Cantor, Dolphin, Gwenview, Kate, Konsole, Okular, Spectacle, Umbrello and more!" Read more

Security Leftovers

  • How to Protect Your PC From the Intel Foreshadow Flaws
  • AT&T Sued After SIM Hijacker Steals $24 Million in Customer's Cryptocurrency
    It has only taken a few years, but the press, public and law enforcement appear to finally be waking up to the problem of SIM hijacking. SIM hijacking (aka SIM swapping or a "port out scam") involves a hacker hijacking your phone number, porting it over to their own device (often with a wireless carrier employee's help), then taking control of your personal accounts. As we've been noting, the practice has heated up over the last few years, with countless wireless customers saying their entire identities were stolen after thieves ported their phone number to another carrier, then took over their private data. Sometimes this involves selling valuable Instagram account names for bitcoin; other times it involves clearing out the target's banking or cryptocurrency accounts. Case in point: California authorities recently brought the hammer down on one 20-year-old hacker, who had covertly ported more than 40 wireless user accounts, in the process stealing nearly $5 million in bitcoin. One of the problems at the core of this phenomenon is that hackers have either tricked or paid wireless carrier employees to aid in the hijacking, or in some instances appear to have direct access to (apparently) poorly-secured internal carrier systems. That has resulted in lawsuits against carriers like T-Mobile for not doing enough to police their own employees, the unauthorized access of their systems, or the protocols utilized to protect consumer accounts from this happening in the first place.
  • Voting Machine Vendors, Election Officials Continue To Look Ridiculous, As Kids Hack Voting Machines In Minutes
  • Security updates for Thursday