Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Saturday, 25 Jan 20 - Tux Machines is a community-driven public service/news site which has been around for over a decade and a half and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story FEDORA ACTIVITY DAY (FAD) PHNOM PENH 2014 Rianne Schestowitz 10/09/2014 - 6:29am
Story Poisoning Rats, Understanding Debian, and New OpenSSL Policy Rianne Schestowitz 10/09/2014 - 6:22am
Story 6 questions to accelerate open source in non-tech companies Rianne Schestowitz 10/09/2014 - 6:15am
Story GNOME Software 3.14 Will Work On Arch Linux With PackageKit Rianne Schestowitz 10/09/2014 - 1:32am
Story Free Software Foundation statement on the new iPhone, Apple Pay, and Apple Watch Rianne Schestowitz 10/09/2014 - 1:12am
Story Leftovers: Software Roy Schestowitz 09/09/2014 - 9:39pm
Story Leftovers: Gaming Roy Schestowitz 09/09/2014 - 9:38pm
Story The Linux desktop-a-week review: ratpoison Roy Schestowitz 09/09/2014 - 9:33pm
Story OwnCloud: Fiddly but secure host-from-home sync 'n' share Roy Schestowitz 09/09/2014 - 8:54pm
Story Void Linux Drops Systemd & Switches To LibreSSL Rianne Schestowitz 09/09/2014 - 8:27pm

The Linux Box Show: Aaron Seigo on KDE's Future

Filed under
KDE
-s

KDE developer Aaron J. Seigo on The Linux Box Show speaks of the new Appeal project and what that means for kde 4.0. He outlines three main principals for the Appeal project and that adds up to more eye candy and functionality for all.

Linux/Windows celebrity deathmatch anyone?

Filed under
Linux
Microsoft

Comparisons of Linux versus Windows (and open source to close source) just ain't what they used to be. In the old days, it was just one invective after another coming from both sides of the fence. But now, after a string of various reports (some of questionable nature) showing Windows and Linux in a virtual dead heat on issues relating to security and total cost of ownership, researchers are having their names dragged through the mud as well.

PSP sells 600,000 in first week

Filed under
Gaming

PSP adds $150 million to Sony coffers in seven days; performance noted as good, not great by analysts.

US nuclear waste could provide terror target

Filed under
Security

A large cloud of lethal radioactive fallout could be released by a terrorist attack on the nuclear waste stored at up to 103 reactors in the US, according to an expert report for the US National Academy of Sciences.

Oh great, let's give 'em ideas! Tongue

Open-Source Referees Change the Rules

Filed under
OSS

The Open Source Initiative board on Wednesday adopted a new way of approving open-source licenses, as well as a new classification system for existing licensees, at its meeting at the Open Source Business Conference in San Francisco.

Mandrakesoft Announces Name Change!

Filed under
MDV

After spending weeks balancing pros and cons, Mandrakesoft has decided to change its name!

And the winner is...

Moore on 40 years of his dictum

Filed under
Hardware

Gordon Moore is one of the founding fathers of Silicon Valley and one of the few still alive.

His famous dictum turns 40 on April 19. He spoke to reporters recently about the electronics industry's progress, artificial intelligence, the emergence of China and the early days of the industry.

The Evolution Of Web Search

Filed under
Web

Conceived by Tim Berners-Lee, a computer scientist generally considered the father of the World Wide Web, the semantic Web isn't an entirely new network. It's a vision of a world where "tags," or code, is hidden inside Web pages to help computers understand meaning.

Sony patent takes first step towards real-life Matrix

Filed under
Sci/Tech

IMAGINE movies and computer games in which you get to smell, taste and perhaps even feel things. That's the tantalising prospect raised by a patent on a device for transmitting sensory data directly into the human brain - granted to none other than the entertainment giant Sony.

Fewer permissions are key to Longhorn security

Filed under
Microsoft

M$ has finally tried to implement some form of the built in security features that makes Linux superior. Will this help tame the Wild West environment it created on the internet? Is it too little too late?

NoGravity Linux Game Port

One of the most prolific games of the BeOS platform was SpaceGirl now renamed to No Gravity. The game has now being ported to Linux and also it has been fully open sourced in February 2005 by realtech VR.

qwest linux dsl routers

Filed under
Linux

the interesting thing about these new actiontec routers is that they run linux. most people have a single static ip, so it would be sort of neat to have your dsl router run a small static web site. better yet, install ssh and use it as a tunneling server.

REVIEWS: 'Chaos,' 'God of War' deliver

Filed under
Reviews
Gaming

For a strategic, methodical approach to action games, "Tom Clancy's Splinter Cell: Chaos Theory" is worth the $50. For the same price, "God of War" is a frenzied, breathless experience that'll leave your fingers ached and cramping.

DNS attacks on the up

Filed under
Security

The SANS Institute's Internet Storm Centre (ISC) has said that domain name system attacks are becoming more widespread since they were first reported last month.

First responders to get biometric IDs

Filed under
Sci/Tech

About 200,000 first responders in the Washington region will be issued biometric smart card IDs under a new program to be deployed by the Homeland Security Department. The new cards will be requiring computerized data images of two index fingers, among other specifications.

Engineers turn to 'soft offices'

Filed under
Sci/Tech

Offices of the future could become havens of peace and tranquillity instead of hotbeds of slamming drawers and rattling filing cabinets.

New Logo

Filed under
Site News

Just wanted to post a big THANK YOU to jrangels for donating his time and wonderful talent to make us a great new logo and header background image here at tuxmachines.org. You might know his work from being offered on kde-look.org or from being the primary graphic artist for pclinuxos. His newest work for that distro is on display in the tuxgallery. Mosey on by and take a look before you leave.

Thanks again Jose.

yagoohoogle.com?

Filed under
Web

Can't decide which is a better search engine, yahoo or google? Well, wonder no more, yagoohoogle.com is online. It's actually a little more than a joke as it actually queries both search sites and produces results from both in a split window browser. Kinda cool. Example.

Linux still seen as most secure

Filed under
Linux

Last year's Yankee Group TCO study attracted criticism when it became clear that that the sample group was taken from a mailing list aimed at Windows system administrators.

Last year's Web-based survey was funded and carried out by Sunbelt Software, a vendor of Windows utilities, which publicised the survey solely through a mailing list called W2Knews, billing itself as "the World's first and largest e-zine designed for NT/2000 System Admins and Power Users". In the 16 February edition of W2Knews, which launched the survey, the company said it and Yankee Group were "surveying Windows Sites" to see how they were "responding to the Linux phenomenon and the TCO question".

Linux 'not just for power users'

Filed under
Linux

In a report published by research and analysis firm Quocirca, entitled "Migrating to Linux on the Desktop", the company found not only was it a myth that you had to be a power user to cope with Linux, the complete opposite is true.

Syndicate content

More in Tux Machines

Security Leftovers: BlueTooth, Spectre/Meltdown and Huawei Disputes

  • BlueTooth Security Risks

    Security risks involving bluetooth vulnerabilities include techniques known as: bluebugging, bluesnarfing, bluejacking, denial of service and exploits for different holes. When a device is configured in discoverable an attacker may try to apply these techniques. Today mobile security was strongly increased and most attacks fail, yet sometimes security holes are discovered and new exploits emerge. As mobile devices prevent the user from installing unmonitored software freely most of attacks are difficult to carry out. This tutorial describes the most common Bluetooth attacks, the tools used to carry out these attacks and the security measures users can take to prevent them. [...] While bluetooth attacks aren’t widely used (when compared with other types of attacks like phishing or DDOS) almost every person carrying a mobile device is a potential victim, therefore in our countries most people are exposed, also through bluetooth, to sensitive data leak. On the other hand most manufacturers already patched devices to protect them from almost all attacks described above, but they only can issue a fix after the vulnerability was discovered and published (like with any vulnerability). While there is not defensive software the best solution is to keep the device turned off in public spaces, since most attacks require a short range you can use the device safely in private places. I hope you found this tutorial on Bluetooth Security Risks useful. Keep following LinuxHint for more tips and updates on Linux and networking.

  • Arm Has Many Changes On Tap For Linux 5.6 From Spectre/Meltdown Bits To New RNG

    While the Linux 5.5 kernel isn't even released yet, it's ideally coming out on Sunday should there not be a one week delay. But in any event Arm's Will Deacon has already sent in the pull request of the ARM architecture changes for Linux 5.6.

  • The Pentagon pushes back on Huawei ban in bid for ‘balance’

    Huawei may have just found itself an ally in the most unexpected of places. According to a new report out of The Wall Street Journal, both the Defense and Treasury Departments are pushing back on a Commerce Department-led ban on sales from the embattled Chinese hardware giant. That move, in turn, has reportedly led Commerce Department officials to withdraw a proposal set to make it even more difficult for U.S.-based companies to work with Huawei. Defense Secretary Mark Esper struck a fittingly pragmatic tone while speaking with the paper, noting, “We have to be conscious of sustaining those [technology] companies’ supply chains and those innovators. That’s the balance we have to strike.”

today's howtos

Devices/Embedded With GNU/Linux

Easy Librem 5 App Development: Flashlight

In my first post on easy application development on the Librem 5 I discussed how to turn a simple shell script that takes a screenshot into a full graphical app with only a few extra lines of code. In this post I will follow up with an even simpler application that took about twenty minutes to write with much of that time involved in reading documentation. My Bright Idea The interesting thing about smart phones is how many other devices they have replaced beyond a regular phone. For instance, there used to be a market for small, pocket-sized digital cameras, but now many people just use the cameras on their smart phones. While some people still do keep a pocket flashlight with them, many people just use the light on their smart phone. I realized that a flashlight app would be another great way to showcase just how easy it is to develop applications for the Librem 5. As applications go the requirements are pretty simple: you need a button to turn on the light, a button to turn off the light, and a button to close the app. Read more