Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Wednesday, 20 Feb 19 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Today in Techrights Roy Schestowitz 26/12/2013 - 11:15am
Story Linus Torvalds’ Leadership Defines 2013 As The Year Of Linux Roy Schestowitz 26/12/2013 - 10:12am
Story Ubuntu desktop is so 2013... All hail 2014 Ubuntu mobile Roy Schestowitz 26/12/2013 - 10:10am
Story Your favorite Linux apps? Roy Schestowitz 26/12/2013 - 10:07am
Story $59 open SBC runs Linux on quad-core Exynos Rianne Schestowitz 25/12/2013 - 10:21pm
Story Seven free, open source video editors for Linux Roy Schestowitz 24/12/2013 - 4:08pm
Story Canonical Shows Off New Dual Boot Feature For Ubuntu In Latest Developer Preview Roy Schestowitz 24/12/2013 - 4:04pm
Story Mobile Threat Monday: Analyzing Android Apps with Santoku Linux Roy Schestowitz 24/12/2013 - 4:02pm
Story 5 top Linux and open source stories in 2013 Roy Schestowitz 24/12/2013 - 3:56pm
Story Mandriva Moving Forward With PCLinuxOS and Mageia Roy Schestowitz 24/12/2013 - 2:29pm

Hollywood seeks iTunes for film

Filed under
Movies
Sci/Tech

In other movie news, Sony Pictures Digital Entertainment is trying to develop and own the next iTunes--but for films.

Taking the Film out of the Film Industry

Filed under
Movies
Sci/Tech

Wired.com is running a story about how Mark Cuban, co-owner of Landmark Theatres, is converting his theaters to all digital playback of movies. Starting with theaters in San Francisco and Dallas, he plans to change all 60 to the "first all-digital theater empire".

Mandrake Thinking Name Change?

Filed under
MDV

There's an interesting thread running on one of the mandrake mailing lists discussing the possibility of an upcoming name change since their buy out of Connectiva. Seems there may be some truth to the rumors as a whois it might prove.

The Guide to 'The Hitchhiker's Guide to the Galaxy'

Filed under
Movies
Web

The Hitchhiker's Guide to the Galaxy

Learn all about Vogons, Deep Thought, and Pan Galactic Gargle Blasters in the guide to 'The Hitchhiker's Guide to the Galaxy.'

Do You Like to "Blog"?

Filed under
Web

Some blogs are endless diatribes from people with too much time on their hands, yet others are interesting and news breaking. I personally don't read too much unless they make headlines in revealing some new technology or the like. But if you like to blog or read other's blogs, here might be a site for you.

O'Reilly Releases "Linux Network Administrator's Guide, Third Edition"

Filed under
Linux
Misc

Perhaps it's not a Linux system administrator's bible, but it's nearly so. For a decade, Linux administrators have regularly consulted their own dog-eared but prized copies of this book for the facts and guidance they need to do their jobs. Now in its third edition, the "Linux Network Administrator's Guide" (O'Reilly) by Tony Bautts, Terry Dawson, and Gregor N. Purdy, brings sys admins up to date with an in-depth look at all of the essential networking software and utilities that come with the operating system, including basic infrastructure (TCP/IP, wireless networking, and firewalling) and the other popular services on Linux systems.

Growing Up With Computers

Filed under
Hardware

As another birthday comes closer with its ugly reminder of how short life is, it makes me think of you younger folks.

Because while you grew up with computers, my situation was just the opposite - computers grew up with me.

Power-hungry PCs cost users dear

Filed under
Hardware

People who cannot be bothered to turn off their computers properly are costing both the environment and their own pockets dear, a study has concluded.

Federal Agency Nixes Your Right to Privacy

Filed under
Security
Web

Today I have the unfortunate responsibility of informing you that there has been a decision made by bureaucrats of a Federal agency that takes away your right to privacy as guaranteed by the United States Constitution.

This decision was unilaterally made by the National Telecommunications and Information Association ("NTIA") -- http://www.ntia.doc.gov/ -- without hearings that would determine the impact on those affected, and delivered without notice -- in short, the NTIA decision was made without due process of any kind. This is exactly how our government is not supposed to work.

Wintec AMP-X PC2-5400 DDR2

Filed under
Hardware
Reviews

With technology advancing at a rapid rate, Intel has moved to the DDR2 memory subsystem. It seems Intel views DDR2 as the upgrade path for the best performance gains in conjunction with their newest, current and future processors. On the other hand, AMD continues to stay with DDR and may move up to DDR2 in the future since their processor requirements for memory are different with the memory controller on the die. Today, we will examine and test the first DDR2 PC2-5400 modules at Xtreme Resources on the Intel 925XE platform with Wintec's AMPX PC2-5400 1GB dual channel kit and see how it fares.

Time For a New Video Card?

Filed under
Hardware
3D Graphics Price-Performance Shootout

When you're making a buying decision, choice is good. But is it even better to have too many choices? Yes, if you're armed with good information, and after reading this story, you'll be loaded for bear.

Carmack going mobile with Doom RPG

Filed under
Gaming
Sci/Tech

Following the release of Doom 3, many speculated what project its creator John Carmack would take on next. However, few would have guessed that project would be...a mobile phone game?

'Matrix Online' a new virtual reality

Filed under
Web
Gaming

You've watched the movies. Now you can jack in and play it - no cranial implants required. After months of testing and two years since the sequels, the persistent virtual reality of "The Matrix Online" is available for U.S. gamers.

Gentoo 2005.0 All About Security

Filed under
Gentoo
Reviews

Sean Michael Kerner has written up a nice article on internetnews.com about Gentoo 2005.0 with quotes from Chris Gianelloni including future plans for embedded devices and such. A nice read.

Cingular, AT&T Wireless ring up most complaints

Filed under
Sci/Tech

Cingular Wireless and Redmond-based AT&T Wireless, which merged late last year to form the nation's largest cellular carrier, together had the worst complaint record in 2004, according to information obtained by Consumers Union and released yesterday.

Spam King bankrupted by Microsoft

Filed under
Microsoft
Security
Legal

A Colorado company sued by Microsoft Corp. under anti-spam laws has filed for Chapter 11 bankruptcy.

At a Glance: MGM v. Grokster

Filed under
Web
Legal

On March 29, the U.S. Supreme Court will hear arguments in Metro-Goldwyn-Mayer Studios Inc. v. Grokster Ltd., a landmark case that specifically addresses the legality of peer-to-peer Internet file-sharing services, but has broad implications for any technology that could potentially be used to infringe on copyrighted materials.

Opteron Memory Timings Tested

Filed under
Hardware
Reviews

When building any modern computer, the choice of which memory to use is a major consideration. After all, why spend a mint on the latest CPU and motherboard, only to slow it down a bit with anything but the best memory available?

Nvidia working on 90 series of drivers

Filed under
Software

WE LEARNED that Nvidia is working on a fresh set of drivers codenamed series 90. The company just released its 70 series of drivers that brought features such as Pure Video and better SLI compatibility.

Safety Cheat Sheet

Filed under
Security
Web

If people didn't fall for online scams, online scammers would take up another line of work. And really, it isn't terribly hard to protect yourself. If you do one thing today, print out the following list and tape it to your computer.

Syndicate content

More in Tux Machines

Graphics: TuxClocker and VK_EXT_depth_clip_enable

  • TuxClocker: Another GPU Overclocking GUI For Linux
    Adding to the list of third-party GPU overclocking utilities for Linux is TuxClocker, a Qt5-based user-interface currently with support for NVIDIA graphics cards and experimental support for AMD GPUs.  TuxClocker is a Qt5 overclocking tool that supports adjusting not only the memory/core frequencies but also the power limit, fan speed, and other tunables based upon the GPU/driver in use. There is also graph monitors to show the power and temperature limit, where supported, among other features.  TuxClocker offers similar functionality to other third-party, open-source Linux GPU overclocking software though where as most utilities focus just on NVIDIA or AMD hardware, TuxClocker is pursuing both. Currently their stable release supports just NVIDIA GPUs but the development code has AMD Radeon support in the works.
  • Intel Wires VK_EXT_depth_clip_enable Into Their Vulkan Driver, Helping DXVK
    Intel's open-source ANV Vulkan driver now supports the VK_EXT_depth_clip_enable that was designed in part to help the DXVK project for mapping Direct3D atop of the Vulkan API.

Programming Leftovers

  • Packaging PyQt5 apps with fbs
    fbs is a cross-platform PyQt5 packaging system which supports building desktop applications for Windows, Mac and Linux (Ubuntu, Fedora and Arch). Built on top of PyInstaller it wraps some of the rough edges and defines a standard project structure which allows the build process to be entirely automated. The included resource API is particularly useful, simplifying the handling of external data files, images or third-party libraries — a common pain point when bundling apps.
  • Infrastructure monitoring: Defense against surprise downtime
    There are a number of tools available that can build a viable and strong monitoring system. The only decision to make is which to use; your answer lies in what you want to achieve with monitoring as well as various financial and business factors you must consider. While some monitoring tools are proprietary, many open source tools, either unmanaged or community-managed software, will do the job even better than the closed source options. In this article, I will focus on open source tools and how to use them to create a strong monitoring architecture.
  • GSlice considerations and possible improvements
    The paper Mesh: Compacting Memory Management for C/C++ Applications is about moving memory allocations for compaction, even though the memory pointers are exposed. The idea is to merge allocation blocks from different pages that are not overlapping at page offsets, and then letting multiple virtual page pointers point to the same physical page. Some have asked about the applicability to the GSlice allocator.
  • plprofiler – Getting a Handy Tool for Profiling Your PL/pgSQL Code
  • Reading and Writing Files in Python (Guide)
  • Today is a Good Day to Learn Python

Security Leftovers

  • Wi-Fi ‘Hiding’ Inside USB Cable: A New Security Threat On The Rise?
    Today, the world has become heavily reliant on computers owing to the various advantages they offer. It has thus become imperative that we, as users, remain updated about the various threats that can compromise the security of our data and privacy. A recent report published by Hackaday details a new threat that might just compromise the integrity of devices. At first glance, the O.MG cable (Offensive MG Kit) looks like any other USB cable available in the market. It is what lurks within that is a cause for concern.
  • WiFi Hides Inside a USB Cable [Ed: There are far worse things, like USB devices that send a high-voltage payload to burn your whole motherboard. Do not use/insert untrusted devices from dodgy people.]
  • The Insights into Linux Security You May Be Surprised About
    Linux has a strong reputation for being the most secure operating system on the market. It’s been like that for many years, and it doesn’t seem like Windows or macOS are going to overtake it anytime soon. And while the operating system’s reputation is well-deserved, it can also be harmless experienced users. The problem is that some seem to put too much trust in the capabilities of Linux by default. As a result, they often don’t pay enough attention to the manual aspect of their security. Linux can help you automate your workflow to a large extent, but it still requires a manual touch to keep things going well. This is even truer when it comes to security.
  • One Identity Bolsters Unix Security with New Release of Authentication Services
    Unix systems (including Linux and Mac OS), by their very nature, have distinct challenges when it comes to security and administration. Because native Unix-based systems are not linked to one another, each server or OS instance requires its own source of authentication and authorization.
  • Book Review – Linux Basics for Hackers
    With countless job openings and growth with no end in sight, InfoSec is the place to be. Many pose the question, “Where do I start?” Over his years of training hackers and eventual security experts across a wide array of industries and occupations, the author ascertains that one of the biggest hurdles that many up-and-coming professional hackers face is the lack of a foundational knowledge or experience with Linux. In an effort to help new practitioners grow, he made the decision to pen a basic ‘How To’ manual, of sorts, to introduce foundational concepts, commands and tricks in order to provide instruction to ease their transition into the world of Linux. Out of this effort, “Linux Basics for Hackers” was born.
  • Security updates for Wednesday

today's howtos