Language Selection

English French German Italian Portuguese Spanish

Login

Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

Tootle – Lightning Fast GTK+3 Mastodon Client for Linux

Looking for a mastodon client for Linux? Tootle is a simple free and open-source GTK-based Mastodon client with dark mode support. Read more

Android Leftovers

FontManager 0.8 Released with Google Fonts Integration

The Font Manager 0.8.0 update introduces integration with Google Fonts, one of the largest online sources of freely licensed font families. Users can click the ‘G’ tool bar icon to instantly access more than 1,000 fonts distributed through Google’s type hub. Fonts can be display by name, recency, popularity, or ‘trending’, and filtered by font type, variation, and language support. Font families can be previewed instantaneously in an increasing-size ‘waterfall’ presentation (the exact text can be customised) or a big block of randomly placeholder text. Font size, colour, and background colour are all configurable too. Read more

Top 5 Linux Server Malware and Rootkits Scanners

The theory that convinced most of us to join the Linux OS universe is its impenetrable nature. We were excited that using a Linux Operating system did not require us to have an anti-virus installed on our systems. As the latter statements might be true, we should be careful of using too many sweeteners to build up assumptions about the Linux operating system security metrics. We would not want to deal with any diabetic outcomes in the practical world. The Linux operating system is risk-free on paper but characterized by vulnerabilities in a production environment. These vulnerabilities entail risk-centered and harmful programs incubating viruses, rootkits, and ransomware. If you invest your skills to be a Linux OS administrator, you need to sharpen your security measures skills, especially when dealing with production servers. Big brands continue to invest in coping with evolving new security threats targeting the Linux OS. The evolution of these measures propels the development of adaptive security tools. They detect the malware and other flaws in a Linux system and initiate useful, corrective, and preventive mechanisms to counter the viable system threats. Read more