Language Selection

English French German Italian Portuguese Spanish


Get it done with GNOME Do 0.8.1

Filed under
Software GNOME Do is an open source launcher utility for the Linux desktop. Its new dock interface combines Mac-like polish and usability with highly efficient keyboard control, and we put it through its paces.

the best Linux newsreaders

Filed under
Software Ah, Usenet newsgroups… Online communication and file sharing for the masses, still equal today to what it was before the advent of blogs, instant messaging and P2P networks.

Don’t fear the fsync!

Filed under
Software After reading the comments on my earlier post, Delayed allocation and the zero-length file problem, it’s become very clear to me that there are a lot of myths and misplaced concerns about fsync() and how best to use it.

Ubuntu: Understanding The Media Codec Problems

Filed under

doctormo.wordpress: My problem is how he is lumping MP3 encoding and decoding into the closed-source pile and this is something that frustrates me terribly.

ext4, application expectations and power management

Filed under
Software There's been a certain amount of discussion about behavioural differences between ext3 and ext4[1], most notably due to ext4's increased window of opportunity for files to end up empty due to both a longer commit window and delayed allocation of blocks in order to obtain a more pleasing on-disk layout.

fwbuilder: Manage Firewalls Professionally

Filed under
Software Everyone knows about netfilter/iptables. Unfortunately, managing a security policy with it remains a non-trivial task for several reasons. What is needed is a tool that lets an administrator define the security policy on a higher level of abstraction and hide the internal structure of the target firewall platform.

Intro to V4L2

Filed under
Software This articles describes the Linux's V4L2 (Video for Linux 2) interface, along with the first steps toward developing a device driver that uses the interface. It is based on Linux 2.6.28, and may not apply to other kernel versions.

Midori: Extremely Fast and Standards-Compliant

Filed under
Software Midori is a lightweight GTK web browser which uses the popular WebKit rendering engine. I installed it on my Eee PC netbook to see if it could replace Firefox for light browsing.

5 Compiz Effects That Are Actually Useful

Filed under
Software Compiz has a lot of nice effects that are mostly useless. In my quest to find a work place without distraction compiz effects doesn’t really fit it. Here are five effects that I actually found useful:

Popcorn - Popularity Contest (for RPM)

Filed under
Software A few days ago I came across Feature #305877. What is it about? Well, Debian has the Popularity Contest, which tracks installed packages, how often they are used and sends an anonymized report once a week to their server.

Syndicate content

More in Tux Machines

KTU exams to run on open source software

All examinations of the A.P.J. Abdul Kalam Technological University (KTU) — which run on an online platform — would switch to open source software from the second semester onwards. For the first semester examinations, the KTU would use a proprietary, Microsoft, software. In response to demands from student organisations, the KTU has pushed back its first semester examinations by two days. The first of the examinations would now begin on December 4 instead of December 2. The first of the results would be published on December 19. Read more Also: KTU goes ahead with exam outsourcing

CMS News

Security Leftovers

  • Friday's security updates
  • Researchers poke hole in custom crypto built for Amazon Web Services
    Underscoring just how hard it is to design secure cryptographic software, academic researchers recently uncovered a potentially serious weakness in an early version of the code library protecting Amazon Web Services. Ironically, s2n, as Amazon's transport layer security implementation is called, was intended to be a simpler, more secure way to encrypt and authenticate Web sessions. Where the OpenSSL library requires more than 70,000 lines of code to execute the highly complex TLS standard, s2n—short for signal to noise—has just 6,000 lines. Amazon hailed the brevity as a key security feature when unveiling s2n in June. What's more, Amazon said the new code had already passed three external security evaluations and penetration tests.
  • Social engineering: hacker tricks that make recipients click
    Social engineering is one of the most powerful tools in the hacker's arsenal and it generally plays a part in most of the major security breaches we hear about today. However, there is a common misconception around the role social engineering plays in attacks.
  • Judge Gives Preliminary Approval to $8 Million Settlement Over Sony Hack
    Sony agreed to reimburse employees up to $10,000 apiece for identity-theft losses
  • Cyber Monday: it's the most wonderful time of year for cyber-attackers
    Malicious attacks on shoppers increased 40% on Cyber Monday in 2013 and 2014, according to, an anti-malware and spyware company, compared to the average number of attacks on days during the month prior. Other cybersecurity software providers have identified the December holiday shopping season as the most dangerous time of year to make online purchases. “The attackers know that there are more people online, so there will be more attacks,” said Christopher Budd, Trend Micro’s global threat communications manager. “Cyber Monday is not a one-day thing, it’s the beginning of a sustained focus on attacks that go after people in the holiday shopping season.”

Openwashing (Fake FOSS)