Language Selection

English French German Italian Portuguese Spanish

Games: Half-Life: Alyx Update and More

Filed under
Gaming
  • Half-Life: Alyx now available on Linux with Vulkan

    Just like Valve said to us they would do so, Half-Life: Alyx is now available on Linux using the Vulkan graphics API. This arrives as part of a big update that went out today which also brings in modding tools and Steam Workshop support, it's going to be very fun to see what the community comes up with for Half-Life: Alyx.

    Half-Life: Alyx is Valve’s VR return to the Half-Life series. It’s the story of an impossible fight against a vicious alien race known as the Combine, set between the events of Half-Life and Half-Life 2. Playing as Alyx Vance, you are humanity’s only chance for survival.

  • Half-Life: Alyx Update Adds Native Linux Support, Vulkan Rendering

    On launch-day Valve had Half-Life: Alyx running on Linux via Steam Play while with the VR game's latest update is now a Linux-native build and Vulkan rendering support.

    Today's update to Half-Life: Alyx adds Steam Workshop support but also notable with this update is native Linux support using Vulkan. This update also makes Vulkan rendering on Windows optional as an alternative to Direct3D 11.

  • A quick look over recent and upcoming Linux game releases

    With so many games being released, announced and teased it's often hard to keep on top of things so we're here to help. Going over a good few pages and hundreds of articles, here's a quick round-up in case you've missed any.

    Just a note: this is nowhere near an exhaustive list, just a brief selection of titles we don't want you to miss.

  • How to use Xbox One controllers over Bluetooth on Linux

    Unlike other Bluetooth controllers, the Xbox One controller will not interact with Linux without modifications. The reason? The Bluetooth chip inside of it has a DRM feature enabled, which prevents it from pairing successfully.

    In this guide, we’ll go over how to disable the DRM feature that makes it impossible to pair your Xbox One controller to Linux over Bluetooth. Additionally, we’ll walk you through the pairing process.

Half-Life: Alyx gets a Linux release, level editing tools

  • Half-Life: Alyx gets a Linux release, level editing tools, Vulkan support, and more

    In addition, Steam Workshop support has arrived to the game as well, giving those who want to experience community-made modifications an easy way to find and install them with just one click.

    The new Linux version of Half-Life: Alyx uses the Vulkan rendering API. Valve says "AMD graphics and the Mesa RADV driver are recommended for best results" on the platform, and if Proton was used previously, users are recommended to uncheck the "Force the use of a specific Steam Play compatibility tool" box in the Alyx properties menu.

By UploadVR

‘Half-Life: Alyx’ Gets Workshop Support, Mod Tools And Linux

  • ‘Half-Life: Alyx’ Gets Workshop Support, Mod Tools And Linux Compatibility In Latest Update

    Official support for Half-Life: Alyx modding has finally arrived. Not only has Valve enabled the Steam Workshop for Alyx, it has launched the entire development suite of tools for the Source 2 engine into beta. Alyx itself now also supports Linux, thanks to the inclusion of the Vulkan rendering API.

    Valve announced the releases through the Alyx Steam page. At the time of writing, only hours after launch, there are already 62 mods released on the workshop. As with any other game, installing mods through the Workshop is as simple as clicking "Subscribe", and then they will become available in-game. Some of them look interesting, such as XenThug, and endless wave survival mode, and others… others give a butt to the famous Half-Life Garden Gnome. There's also an example mod made by the Alyx development team that gives a basic demo of things that can be created with the newly released Source 2 tools.

    More importantly, Valve has released the complete community creation suite for the Source 2 engine for the first time. Currently available as a beta, it includes everything from popular tools Hammer (a level editor) and Source Filmmaker to more specific tools like Particle Editor, AnimGraph (for animations) and ModelDoc (for making 3D models Source 2 engine-ready). It's important to note that, while Source 2 has already been used to a limited extent in Dota 2 (which also has its own modding tools), Dota Underlords and Artifact, these tools are specifically geared towards Alyx content creation at the moment.

Hot Hardware on Half-Life: Alyx

  • Half-Life: Alyx Is Coming To Linux Along With Modding Tools, Vulcan Support And More

    Gamers all around the world were extremely excited when Half-Life: Alyx was announced. After many years, fans were able to get back into the Half-Life universe. The game has been updated recently to include Steam Workshop support along with a beta release of community development tools. One of the best things about the update for fans is that it brings a native version of the game for the Linux, and optional support for Vulkan on Windows.

    To enable Vulkan on Windows, go to the main menu, then Options > Performance > Advanced (gear icon) > Rendering API, and choosing Vulkan. While support for Linux is welcome, the big news is that the tools in the Steam Workshop update allow players to create new levels, models, textures, and animations. Steam Workshop also lets fans browse what modders have built and play those custom mods. With support for community modding, the gates are open for everything from entirely new districts for City 17 to designing new combat encounters.

Half Life: Alyx Lands on Linux

  • Half Life: Alyx Lands on Linux

    I mentioned it already a few days ago on Mastodon/Twitter (that’s why you should follow us there), Half Life Alyx, the latest VR sensation, has finally landed on Linux, not too long after the Windows version. Based on anecdotal reports it seems like it works much better in its native client than with Proton. That’s a relief, since VR is at the extreme spectrum of performance needs and does not allow for much margin to keep the illusion going. Here’s how the game runs according to this video on Youtube...

    [...]

    I like the fact that they also released the Vulkan backend support for Windows, while early reports seem to indicate DX11 is better so far on Windows (less stutters). Since the game will be updated after release we should expect the performance profile of Vulkan to improve somewhat as well on Windows.

    Personally I would be interested to hear from anyone reading this article who has tried Alyx on Linux, what kind of configuration they used, and what kind of performance they can expect on Linux with Nvidia-based and AMD-based setups.

Valve adds Steam Workshop, Linux support...

  • Valve adds Steam Workshop, Linux support to Half-Life: Alyx

    Yes, level editing is really cool, but the big news here is native support for Half-Life: Alyx, a VR video game, on Linux.

    Half-Life: Alyx has been out for around six weeks, and it’s been very well received. It’s something of a surprise, given that Valve isn’t really known for developing games anymore, but it’s welcome. (Perhaps we’ve probably got the former Campo Santo team to thank for that.)

    But when Valve does develop games, one thing that’s universally lauded is the company’s support for tinkering. While the likes of Konami and Nintendo are playing copyright whack-a-mole with fan projects, Valve flings open the doors to its engines, level editors, and modding tools. Even fan-made remakes like Black Mesa get a curt but approving nod from Papa Newell.

    Prepare for unforeseen consequences, then, as Valve throws open the doors to Steam Workshop for Half-Life: Alyx.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

All about Kubernetes

Kubernetes is an enterprise-grade container-orchestration system designed from the start to be cloud-native. It has grown to be the de-facto cloud container platform, continuing to expand as it has embraced new technologies, including container-native virtualization and serverless computing. Kubernetes manages containers and more, from micro-scale at the edge to massive scale, in both public and private cloud environments. It is a perfect choice for a "private cloud at home" project, providing both robust container orchestration and the opportunity to learn about a technology in such demand and so thoroughly integrated into the cloud that its name is practically synonymous with "cloud computing." Read more Also: Provision Kubernetes NFS clients on a Raspberry Pi homelab A beginner's guide to Kubernetes container orchestration

Security and Proprietary Issues

  • Surprise Capital One court decision spells trouble for incident response

    Break in case of emergency: Language is everything. Delineate clearly in all written comms between a ‘potential incident’ - and an actual one. Don’t start turning one of the hundreds of security events you see into a ‘security incident’ before the most essential facts are understood. Halpert’s threshold for incidents that need to be covered by legal privilege are: a) An incident that gives rise to an obligation to notify a regulator, or a contractual obligation to notify a business partner; or b) An incident that exposed trade secrets or otherwise would affect the share price of a company; or c) An incident that would cause significant reputational hit to the company; or d) An incident in which a crime is committed.

  • Judge rules Capital One must hand over Mandiant's forensic data breach report

    It’s a significant ruling that effectively affords the attorneys suing Capital One with a breakdown of which bank behaviors were successful, and which failed. It’s common for Fortune 500 companies to keep incident response firms like Mandiant on retainer, though it’s rare for those firms’ insights on high profile breaches to be made public. Similar rulings in the future could provide aggrieved customers with ammunition to seek higher pay-outs in court.

  • Retrotech: The Novell NetWare Experience

    In the simplest terms possible, NetWare was a dedicated network operating system. It was designed around fast and reliable network operations at the expense of almost everything else. Novell had invested massive amounts of research in figuring out how to do fast I/O and minimizing any delays from hardware related sources. The end result was a very lean system that remained stable and performant with a large number of clients attached. As networking was Novell's bread and butter, NetWare had excellent support for everything: clients were available for DOS, Windows, UNIX, Macintosh, OS/2 and probably other platforms I've never even heard of.

    The early history of NetWare is very muddled, and pre-2.0 versions have been lost to time. This compounded with poor documentation has made it very difficult to trace the early history of the product. However, while NetWare was not the first (or only) network product for IBM PCs, it quickly became the largest, displacing IBM's PC Network, and laughed at Microsoft's LAN Manager, and IBM OS/2 LAN Server.

    While NetWare did compete on UNIX, Sun had already gotten their foot in the door by porting NFS and making it the de-facto solution for all UNIXs of the era, as well as Linux. Meanwhile, Apple held onto AppleTalk which itself survived well into the early 2000s when NetWare had already disappeared into the aether. The explosion of Wintel PCs throughout the 90s had given NetWare a market position that should have been very difficult to dislodge.

    The full story of NetWare's fall from grace is a story for another time, but I do want to go into the more technical aspects that were both the boon and bane of NetWare. Much of NetWare's success can be attributed to its own IPX protocol which made networking plug and play and drastically lowered latencies compared to NetBIOS or even TCP/IP.

  • Polish malspam pushes ZLoader malware

    When enabling macros on the malicious Excel spreadsheet, the victim host retrieved the ZLoader DLL as shown in the previous section, saved the DLL to the victim's Documents folder, and ran it using rundll32.exe.

  • Microsoft Defender SmartScreen is hurting independent developers

    But what is SmartScreen?

    SmartScreen collects installation data from all Windows users in order to establish “reputation”. If the program does not have an established good reputation, you get this big warning message. By this time most users have deleted the .exe already thinking it is a malware, but SmartScreen can be bypassed by clicking on “More info” then “Run anyway”.

    The digital signature racket

    But let’s say you bite the bullet, you buy yourself an overpriced piece of prime numbers generated by a computer, sign your code and re-publish your application. You can now start getting users to install your app right? Wrong.

    But how do you build reputation? First of all, Microsoft needs to be able to gather information on who has published the app, and this is done by a code signing certificate. The most obvious implication is that unsigned apps will always trigger SmartScreen. The more insidious implication is that acquiring a code signing certificate is a big expense for an individual developer. There is currently no “Let’s Encrypt” equivalent to code signing certificates; so you have to purchase it from trusted authorities. The price range is wide but a certificate only valid for a year will typically go for about $100.

  • #Privacy: Michigan State University struck by ransomware attack

    It remains unclear as to how and when the attack happened, and what the ransom demand is.

    NetWalker is one of twelve ransomware gangs who threaten to publish data in revenge if organisations refuse to pay the ransom demand.

    MSU have not official disclosed the incident, however, an MSU spokesperson, Dan Olsen shared the following statement to EdScoop: “We are aware of a possible intrusion and we are actively looking into it.”

  • MSU: We won't pay [attacker] demanding ransom, threatening university over records

    University officials believe the latest breach occurred on Memorial Day and took relevant computer systems offline within hours of the intrusion, according to a news release. It compromised data associated with the Department of Physics and Astronomy, and information technology teams are coordinating with law enforcement to understand the scope of the breach. Investigators are notifying and providing support to affected MSU affiliates as they are identified.

    The cybersecurity breach, known as a ransomware attack, first became public May 27 when a [cr]acker-affiliated blog posted screenshots of files allegedly belonging to MSU affiliates. Images circulating on social media include a redacted passport and a list of transactions related to physics and astronomy projects. They also show a countdown clock that warns of “secret data publication” less than one week from when the screenshots were taken.

  • Michigan State target of ransomware attack threatening to release university data

    The ransom demanded was not specified, but the ransomware gang is prepared to release the university's documents.

    The NetWalker, a newer form of ransomeware sometimes labeled as Mailto, blog post threatened publication of 'secret' documents dated with a countdown clock with close to a week remaining.

  • Malware Team NetWalker Launches Ransomware Attack Against Weiz

    The Malware team NetWalker launched a new ransomware attack against the Austrian village of Weiz which affected the public service system and leaked a lot of the stolen data from building applications as we are about to read more in the following latest cryptocurrency news.

    According to the cybersecurity firm Panda Security, the Malware team managed to enter the town’s public network through phishing emails related to the Coronavirus pandemic. The subject of the emails which was ‘’information about the coronavirus’’ was used to bait the employees of the public infrastructure of the city into clicking on malicious links which triggered the ransomware.

    Panda Security claims that the ransomware attack belongs to a new version of a ransomware family that spreads by using VBScripts. If the infection is successful, it will spread through the entire windows network to which the infected machine is related. The report details that the ransomware terminates and services under Windows which encrypts files on all available disks thus eliminating the backups.

  • Inside a ransomware gang’s attack toolbox

    The crooks deployed a pirated copy of the Virtual Box virtual machine (VM) software to every computer on the victim’s network, plus a VM file containing a pirated copy of Windows XP, just to have a “walled garden” for their ransomware to sit inside while it did its cryptographic scrambling.

    But that’s far from everything that today’s crooks bring along for a typical attack, as SophosLabs was able to document recently when it stumbled upon a cache of tools belonging to a ransomware gang known as Netwalker.

  • Researchers Dive Into Evolution of Malicious Excel 4.0 Macros

    For more than five months, Lastline security researchers have tracked the evolution of malicious Excel 4.0 (XL4) macros, observing the fast pace at which malware authors change them to stay ahead of security tools.

    A central part of many organizations’ productivity tools, Excel opens the door for phishing attacks where victims are tricked into enabling macros in malicious documents, which can results in the attackers gaining a foothold on the network, in preparation for additional activities.

    During their five-month research, Lastline observed thousands of malicious samples, clustered into waves that provide a comprehensive picture of how the threat has evolved in both sophistication and evasiveness.

  • MSU won't pay ransom to [cr]acker who stole financial documents, personal information

    EdScoop reported the ransomware attack on May 27 and provided screenshots from a blog on the dark web, showing what appear to be a student's passport, MSU financial documents and files from the MSU network, as well as a countdown that had about one week remaining as of May 27.

  • Attackers Target 1M+ WordPress Sites To Harvest Database Credentials

    Attackers were spotted targeting over one million WordPress websites in a campaign over the weekend. The campaign unsuccessfully attempted to exploit old cross-site scripting (XSS) vulnerabilities in WordPress plugins and themes, with the goal of harvesting database credentials.

    The attacks were aiming to download wp-config.php, a file critical to all WordPress installations. The file is located in the root of WordPress file directories and contains websites’ database credentials and connection information, in addition to authentication unique keys and salts. By downloading the sites’ configuration files, an attacker would gain access to the site’s database, where site content and credentials are stored, said researchers with Wordfence who spotted the attack.

    Between May 29 and May 31, researchers observed (and were able to block) over 130 million attacks targeting 1.3 million sites.

  • Denial of service attacks against advocacy groups skyrocket

    Distributed denial-of-service attacks against advocacy organizations increased by 1,120% since a Minneapolis police officer killed George Floyd by kneeling on his neck, sparking demonstrations throughout the U.S.

    In figures published Tuesday, the internet security firm Cloudflare said it blocked more than 135 billion malicious web requests against advocacy sites, compared to less than 30 million blocked requests against U.S. government websites, such as police and military organizations. The company did not disclose which websites were affected, specifically.

Reading about open source in French

English speakers have so many wonderful open source resources that it's easy to forget that communications in English aren't accessible to everyone everywhere. Therefore, I've been looking for great open source resources in Spanish and French, so I can recommend them when the need arises. One I've been looking at recently is LinuxFr.org, which seems to be a fine "agora" for all sorts of interesting conversations in French about open source specifically and open everything else as well. Read more

Open Source Password Manager Bitwarden Introduces Two New Useful Features: Trash Bin & Vault Timeout

Bitwarden is unquestionably one of the best password managers available for Linux. It’s also a cross-platform solution — so you can use it almost anywhere you like. You can also read our review of Bitwarden if you want to explore more about it. Now, coming back to the news. Recently, Bitwarden introduced two new major features that makes it even better. Read more