Language Selection

English French German Italian Portuguese Spanish

Login

Enter your Tux Machines username.
Enter the password that accompanies your username.

More in Tux Machines

Whatever Happened To Ubuntu Light?

Amidst the onslaught of Intel-based netbooks in the late 2000s was a custom instant-on OS from Canonical. Ubuntu Light was to be a proverbial glint of free software at the end of a tunnel crowded by clones. It was a way for OEMs to add extra value to their Windows devices and differentiate themselves from competitors. It was a way for users to dip their toes into Ubuntu rather than drown at the deep end. And yet…you are probably having a hard time recalling it. Read more

7 Essential Skill-Building Courses for the Open Source Jobs Market

Dice and The Linux Foundation recently released an updated Open Source Jobs Report that examines trends in open source recruiting and job seeking. The report clearly shows that open source professionals are in demand and that those with open source experience have a strong advantage when seeking jobs in the tech industry. Additionally, 87 percent of hiring managers say it’s hard to find open source talent. Read more

Everything you need to know about Linux Commands

It won't be long after starting to use Linux that you ask a question and the answer begins with, "Open a terminal and..." At this point, you may be thrown into an alien environment with typed Linux commands instead of cheery-looking icons. But the terminal is not alien, it's just different. You are used to a GUI now, but you had to learn that, and the same applies to the command line. This raises an obvious question: "I already know how to use a windowed desktop, why must I learn something different?" Read more

Red Hat: The Answer is always the same: Layers of Security

There is a common misperception that now that containers support seccomp we no longer need SELinux to help protect our systems. WRONG. The big weakness in containers is the container possesses the ability to interact with the host kernel and the host file systems. Securing the container processes is all about shrinking the attack surface on the host OS and more specifically on the host kernel. Read more