Language Selection

English French German Italian Portuguese Spanish

Login

Please allow up to an hour or so to receive your initial password. If you don't receive an email from us within a comfortable amount of time, you may email and request a password at r at schestowitz dot com. Please be sure to include your registered username.

You may also wish to check your spam folders as your initial email may have been misidentified as spam. Please also note that yahoo.com will not accept mail from TuxMachines.org due to ISP regulation listing in Spamhaus.

Thanks!
Spaces are allowed; punctuation is not allowed except for periods, hyphens, and underscores.
A valid e-mail address. All e-mails from the system will be sent to this address. The e-mail address is not made public and will only be used if you wish to receive a new password or wish to receive certain news or notifications by e-mail.
Provide a password for the new account in both fields.

More in Tux Machines

Intel Compute Stick with Ubuntu Goes on Sale, Lower Specs than Windows Version

The Ubuntu 14.04 LTS flavored Intel Compute Stick is finally going on sale next week, and it joins the Windows version that was already made available a while back. Read more

Ubuntu MATE Project Donates Money to Geany, Transmission, and MATE Devs

The Ubuntu MATE team makes monthly donations to other projects that are being used by this distribution and this month's targets are Geany and Transmission, along with a couple of MATE developers. Read more

Ubuntu MATE hardware partnership with LibreTrend

Ubuntu MATE is an official flavour of Ubuntu focussed on usability and stability, which has gained massive traction in the Linux community over recent months. Inspired by the traditional GNOME 2 interface of classic Ubuntu releases, Ubuntu MATE is the perfect distribution for easing the transition between Microsoft Windows or Mac OS and Linux. Read more

Can Data Infrastructure Vendors Stop Hackers?

The ecosystem is based on Security-Enhanced Linux (SELinux), but it adds role-based access control with a policy for each role, so no one can get to the system root and the root can’t see user data. All access is logged, so any attempts to penetrate the system can be traced. Policies are based on roles such as security admin, audit admin and sysadmin, and each file is tagged with a security level so some users can see it while others can’t. Read more