Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Friday, 18 Oct 19 - Tux Machines is a community-driven public service/news site which has been around for over a decade and a half and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Mozilla Claims Early Win in Browser Phishfight

Filed under
Moz/FF

A new study sanctioned by Mozilla declares Firefox 2 as a big winner over Microsoft's IE 7 in the battle to block ID theft scam sites, but weaknesses in both browsers confirm that the battle against phishing has only just begun.

What really happened to Ubuntu's Edgy artwork

Filed under
Ubuntu

Casual Ubuntu users may have registered surprise when they first booted the distribution's Edgy Eft release this past October. Back at the beginning of the Edgy development cycle, much was made of the formation of a new, dedicated Art Team to develop a fresh look for the backgrounds and splash screens of the startup process. But when Edgy hit the shelves, the artwork was scarcely different from that of its predecessor, Dapper Drake.

Red Hat Stock Climbing Back

Filed under
Linux

Red Hat shares have come scratching back from their worst levels following the twin announcements that Oracle plans to offer maintenance service to Red Hat Linux users while Microsoft has teamed up with Novell to offer ways for companies to run both Windows and Novell’s Suse Linux on the same boxes.

Finity Flight II Episode III: Beast's Will Released

Filed under
Gaming

Finity Flight II is a multiplatform high flying adventure tale in the form of a top-down shooter. In each weekly episode you will find new challenges to hone your skills on and a new portion of the on-going story:

Apache project keeps pace with Java changes

Filed under
Software

The open-source Java effort Apache Harmony has graduated to a full-fledged Apache project. Apache Harmony, started last year, is creating an open-source version of Java Platform Standard Edition (Java SE), software for making Java programs on PCs.

Ubuntu for your parents, uncles and aunts. No tech support anymore!

Filed under
Ubuntu

During my visit to India last month, I promised myself that I would accomplish one important task. I would do everything in my power to eliminate the tech support role that I was playing to my parents. You see, my parents had inherited (ah, sweet pun) a desktop computer from me and in my absence had taken the help of local young men who gleefully installed Microsoft Windows software (pirated, of course).

Also: Ubuntu 6.10 x86_64 saves the day too!

Diverse extensions keep Firefox ahead

Filed under
Moz/FF

In the past few weeks, Microsoft and Mozilla both released the latest versions of their Web browsers, Internet Explorer 7 and Firefox 2.0, respectively. The new IE is a gigantic (and much needed) upgrade from its predecessor, while almost all of IE's improvements were aimed to provide features that have already been included in Firefox for quite some time. Being an open-source program, one of Firefox's biggest advantages over the competition, Firefox supports "extensions." Here's a list of my 10 favorite extensions:

City of Vienna Deploys Red Hat Enterprise Linux

Filed under
Linux

Red Hat today announced that the city of Vienna has selected Red Hat Enterprise Linux as the platform of choice for its servers. Austria’s capital is using the operating system for both mission-critical applications such as database servers and other systems including file servers.

Quicktip - how to hide your Grub menu on boot

Filed under
HowTos

If you’ve got a machine that boots via grub and you’d like to hide the menu when it’s booting up there’s a simple little edit you can do to accomplish this.

*Full Tip*

The 15 Commands Essential For Unix

Filed under
HowTos

Learning UNIX is a seemingly daunting task, there are thousands of commands out there, each with hundreds of options. But in reality you only need to know a few of them.

Linspire Offers Free Services To Desktop Linux Users

Filed under
Misc

Linspire announced the first of many free services offered to desktop Linux users. FreeLinuxEmail, an IMAP email and Net file storage service developed by Messaging Engine of Melbourne, Australia, provides desktop Linux users a free server-based email and file storage service that works with both web-based and client-based email. IMAP is a superior email protocol over POP systems offered by most free email services.

Drupal claims second prize in the 2006 Packt Open Source CMS Award

Filed under
Drupal

Packt Publishing has announced the winners of their 2006 Open Source CMS Award, and Drupal has been awarded second place. The award comes with a cash prize of $3,000. The Joomla! project took first place, with Plone coming in third.

Ubuntu Developer Summit report: X.org improvements, driver controversy, and bling

Filed under
Ubuntu

X.org received a lot of attention and discussion at UDS, which is appropriate for such a desktop-focused distro. Binary drivers were a hot topic at the summit. Ubuntu developers also discussed how to provide a more robust configuration system for X.org, and what to do when problems arise with X.

Network traffic analyzer for Your Ubuntu System

Filed under
HowTos

Darkstat is a network statistics gatherer.Effectively, it’s a packet sniffer which runs as a background process on a cable/DSL router, gathers all sorts of useless but interesting statistics,and serves them over HTTP.

Also: Monitor Servers and Clients using Munin in Ubuntu

Ten people create 80 per cent of spam

Filed under
Security

TEN WELL AIMED silver bullets would take care of 80 per cent of the world's spam, according to the anti-spam organisation Spamhause. According to Security Pro News, Spamhause thinks that there are only ten people that are responsible for most of the spam in the world.

How to keep a detailed audit trail of what’s being done on your Linux systems

Filed under
HowTos

Intrusions can take place from both authorized (insiders) and unauthorized (outsiders) users. My personal experience shows that unhappy user can damage the system, especially when they have a shell access. Some users are little smart and removes history file (such as ~/.bash_history) but you can monitor all user executed commands.

Interview with Wez Furlong at php|works Toronto

Filed under
Interviews

Wez Furlong is Chief Architect at OmniTI, Inc. and a PHP core developer responsible for the streams abstraction layer, the PDO extension, and the SQLite extension among others. I caught up with him at the php|works conference where he presented a seminar on PHP Data Objects (PDO).

Open source in plain English

Filed under
OSS

Much of the debate about open source has been in technical terms, or increasingly in political terms. I'm not criticising either approach, but I suspect many potential open source converts are left cold by discussions that border on the religious in their fervour. What many companies really need is a direct and clear discussion about the tangible benefits of open source, without the political baggage.

Novell Answers Questions from the Community

Filed under
SUSE

Since the announcement of the Novell-Microsoft agreement on November 2, we have been flooded with questions from the open source community about what this deal means to the Linux, the open source community, and even what this deal means for Novell. We will use this page to answer as many of those questions as possible. Check back frequently, as we will continue to add more answers as quickly as possible.

Linux: should you make the switch

Filed under
Linux

So here it is, just two months left in 2006, and you’re still running Windows on your computer. There must be something wrong with you, right? If you don’t have the money for a new computer (i.e. a Mac), but you still want to depart from Windows for a while, then your best bet is Linux.

Syndicate content

More in Tux Machines

Security: Linux, Docker and Guix

  • Unpatched Linux bug may open devices to serious attacks over Wi-Fi

    The flaw is located in the RTLWIFI driver, which is used to support Realtek Wi-Fi chips in Linux devices. The vulnerability triggers a buffer overflow in the Linux kernel when a machine with a Realtek Wi-Fi chip is within radio range of a malicious device. At a minimum, exploits would cause an operating-system crash and could possibly allow a hacker to gain complete control of the computer. The flaw dates back to version 3.10.1 of the Linux kernel released in 2013.

  • Docker Attack Worm Mines for Monero
  • Insecure permissions on profile directory (CVE-2019-18192)

    We have become aware of a security issue for Guix on multi-user systems that we have just fixed (CVE-2019-18192). Anyone running Guix on a multi-user system is encouraged to upgrade guix-daemon—see below for instructions. Context The default user profile, ~/.guix-profile, points to /var/guix/profiles/per-user/$USER. Until now, /var/guix/profiles/per-user was world-writable, allowing the guix command to create the $USER sub-directory. On a multi-user system, this allowed a malicious user to create and populate that $USER sub-directory for another user that had not yet logged in. Since /var/…/$USER is in $PATH, the target user could end up running attacker-provided code. See the bug report for more information. This issue was initially reported by Michael Orlitzky for Nix (CVE-2019-17365).

In 2019, multiple open source companies changed course—is it the right move?

Free and open source software enables the world as we know it in 2019. From Web servers to kiosks to the big data algorithms mining your Facebook feed, nearly every computer system you interact with runs, at least in part, on free software. And in the larger tech industry, free software has given rise to a galaxy of startups and enabled the largest software acquisition in the history of the world. Free software is a gift, a gift that made the world as we know it possible. And from the start, it seemed like an astounding gift to give. So astounding in fact that it initially made businesses unaccustomed to this kind of generosity uncomfortable. These companies weren't unwilling to use free software, it was simply too radical and by extension too political. It had to be renamed: "open source." Once that happened, open source software took over the world. Recently, though, there's been a disturbance in the open source force. Within the last year, companies like Redis Labs, MongoDB, and Confluent all changed their software licenses, moving away from open source licenses to more restrictive terms that limit what can be done with the software, making it no longer open source software. Read more Also: Network Time Foundation Joins Open Source Initiative

Red Hat: OpenShift, RHEL, Dependency Analytics, vDPA and More

  • Red Hat Expands the Kubernetes Developer Experience with Newest Version of Red Hat OpenShift 4

    Red Hat, Inc., the world's leading provider of open source solutions, today announced Red Hat OpenShift 4.2, the latest version of Red Hat’s trusted enterprise Kubernetes platform designed to deliver a more powerful developer experience. Red Hat OpenShift 4.2 extends Red Hat’s commitment to simplifying and automating enterprise-grade services across the hybrid cloud while empowering developers to innovate and enhance business value through cloud-native applications.

  • RHEL and Insights combo illuminates threats and spotlights performance for Red Hat systems

    When Red Hat Inc. officially rolled out its Red Hat Enterprise Linux 8, or RHEL 8, operating system in May, the open-source software company also included Red Hat Insights with every subscription for the new release. Based on data supplied by one of the company’s top executives, that has proven to be a wise decision. Insights is a software as a service product that works from a rules-based engine to offer continuous connected analysis of registered Red Hat-based systems. “We’ve seen an 87% increase since May in the number of systems that are linked in,” said Stefanie Chiras (pictured), vice president and general manager of the RHEL Business Unit at Red Hat. “We’re seeing a 33% increase in coverage of rules-based and a 152% increase in customers who are using it. That creates a community of people using and getting value from it, but also giving value back because the more data we have the better the rules get.”

  • What’s new in Red Hat Dependency Analytics

    We are excited to announce a new release of Red Hat Dependency Analytics, a solution that enables developers to create better applications by evaluating and adding high-quality open source components, directly from their IDE. Red Hat Dependency Analytics helps your development team avoid security and licensing issues when building your applications. It plugs into the developer’s IDE, automatically analyzes your software composition, and provides recommendations to address security holes and licensing problems that your team may be missing. Without further ado, let’s jump into the new capabilities offered in this release. This release includes a new version of the IDE plugin and the server-side analysis service hosted by Red Hat.

  • Breaking cloud native network performance barriers

    Up until now we have covered virtio-networking and its usage in VMs. We started with the original vhost-net/virtio-net architecture, moved on to the vhost-user/virito-pmd architecture and continued to vDPA (vHost Data Path Acceleration) where the virtio ring layout was pushed all the way into the NIC providing wiresspeed/wirelatency to VMs. We now turn our attention to using vDPA for providing wirespeed/wirelatency L2 interfaces to containers leveraging kubernetes to orchestrate the overall solution. We will demonstrate how Containerized Network Functions (CNFs) can be accelerated using a combination of vDPA interfaces and DPDK libraries. The vDPA interfaces are added as a secondary interface to containers using the Multus CNI plugin. This post is a high level solution overview describing the main building blocks and how they fit together. We assume that the reader has an overall understanding of Kubernetes, the Container Network Interface (CNI) and NFV terminology such as VNFs and CNFs.

  • Top 5 stress reliefs for sysadmins

Purism shows off more pictures of Librem 5 Phone and PureOS UI

As the first batch of the Librem 5 phones starts reaching its respectful owners, we can now have a better look at the product from its pictures taken by the customers. Before we check them out, let’s get to know a bit more about these phones. The Librem 5 smartphones are powered by PureOS, which is a Linux-based mobile operating system. The brains behind this product, namely Purism, have made it their top priority to offer such phones that provide security, privacy, and freedom to the customers. Accordingly, this product has been made for people who want to have complete control over their phones. You should check out this article if you want to know more about the Librem 5 smartphones. Now coming back to the news, people who have ordered this phone are in for a treat as the Librem 5 comes with a black anodized aluminum case. Not only it’s stylish, but it also maintains high radio reception quality – thanks to its non-metal backing. It accompanies easier-to-slide, flush hardware kill switches. Read more Also: Nathan Wolf: New Life to Rock Candy Gamepad for PS3 | Another Repair