Language Selection

English French German Italian Portuguese Spanish

Games: The Universim, Artifact 2.0 and Lots More

Filed under
Gaming
  • Prepare for toxic rain and lots of fire in The Universim

    The Universim, the game that mixes in a god sim with a city-builder has expanded once again and in quite a big way with the environment.

    Crytivo's "new breed" of god game certainly isn't boring, and now your decisions make even more of an impact on the environment when you're building up your civilization. You now have to deal with toxic rain, polluted water and more if you let the environment start getting ruined. Since it's something of a god game though, your god powers can help you avert a true disaster if you have enough god points stored up. This is part of their ongoing attempts to make The Universim a lot more dynamic.

  • Humble has a big Spring Sale Encore, save on Humble Choice

    Humble Bundle announced they're doing a little encore of their Spring Sale for this weekend and there's some pretty huge discounts going on some great games.

    Their monthly Humble Choice bundle has it's own special deal going too, for new subscribers you can now get 40% off the price of the Premium plan (the top tier of it). This brings the price down from £15.99 / $19.99 to £8.99 / $12 a month which is good value.

  • You can sign up for the Artifact 2.0 Beta now, plus a video

    Valve have opened up the process to get into the Beta for Artifact 2.0, the revamp of their failed competitive card game.

    They already blogged before about what they will be doing, with people who purchased before March 30 having priority but we didn't know exactly how they will do it. Now we do! They've put up a page on the official Artifact website where you can login with Steam and put yourself into the draw for access to the 2.0 Beta. It's a nice simple process at least.

  • Stylish literary mystery Sarawak will be in the Steam Game Festival

    We have another confirmed game that will have a Linux demo available for the Steam Game Festival, and it's the very clever and stylish looking interactive fiction Sarawak.

    It was announced only recently and covered here on GOL back in April, with a curious setting split between Oxford and Borneo. They announced yesterday on Twitter, that they will also be putting up a demo for the SGF that runs between June 9 -15.

  • The Steam Spring Cleaning event is up to get you to play your old games

    Surprisingly, Valve are running an event that is not trying to get you to buy new games. To be fair though, it's not the first time. The Steam Spring Cleaning 2020 event is now live.

    Running from now until May 28, the idea is to get you to play through your existing games and clear out your backlog. This links in with their recent Play Next feature to suggest games to you, which graduated from Steam Labs to appear on the Steam Store and as a shelf in your Steam Library. It also pulls in Remote Play Together, for games to share online with friends.

  • Spaceship colony sim Space Haven arrives in Early Access

    Build a spaceship, look after your crew and travel the stars in Space Haven as it's now available in Early Access and it's good.

    Embark on a space voyage with your ragtag crew of civilians in search of a new home. Build spaceships tile by tile, create optimal gas conditions, manage the needs and moods of their crew, encounter other space-faring groups, and explore the universe in this spaceship colony sim.
    The developer, Bugbyte, ran a successful Kickstarter campaign little over a year ago to raise $260,189. Since then they've been pushing out Alpha builds to backers, and they provided us with an early copy too. Many builds later, many hours played and it's clearly shaping up to be an impressive game.

Pawnbarian turns Chess into a card-based roguelike

  • Pawnbarian turns Chess into a card-based roguelike

    Originally a short web-version you could have tried on itch.io, it's now becoming a much bigger game that's getting a proper desktop release. The developer sent word to us on Twitter about the demo now being on Linux, so I took a look to see what all the fuss is about. After playing it for a couple of hours I'm completely hooked in.

    It's incredibly clever, quite simple but also thoroughly entertaining. Each level is a dungeon crawling puzzle, and you know where you don't want to end the turn as it tells you where you will get damage so it's up to you to use your cards to get in, do some damage and get out.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

today's leftovers

  • Run Every Distro At Once | LINUX Unplugged 417

    Yabba Dabba Distro! Run every major distribution on one native host. How we hijacked a Fedora install and turned it into the ultimate meta Linux box. Plus Valve and AMD team up to improve Linux performance and the duct-tape solution holding our server together.

  • Win a $10,000 Thelio Major Workstation!

    The computer and operating system are the most powerful tools in existence. The Launch into Learning season encourages STEM and creative professionals like you to hone their craft, learn a new skill, or make something they’re proud to share. This year, we’re empowering one lucky user with a $10,000 Thelio Major workstation. The complete package includes a Launch keyboard, an MX Master 3 wireless mouse, a 27” 1440p IPS display, and a decked-out Thelio Major.

  • U.S. medical entities fall prey to Pysa threat actors, but many haven’t disclosed it – at least, not yet.
  • Damage control: Microsoft deletes all comments under heavily criticized Windows 11 upgrade video
  • C++ Vector Iterators – Linux Hint

    The main iterators in C++ are Input Iterator, Output Iterator, Forward Iterator, Bidirectional Iterator, and Random Access Iterator. Reverse Iterator is not really an iterator; it is an iterator adaptor. There are some variants to iterators, like a constant iterator. An iterator is an elaborated pointer. Like a pointer, it points to objects of the same type in memory at different times. All iterators are dereferenceable, except for the output iterator that is dereferenceable only for a set of types. Dereferenceable means the value pointed to by the pointer or iterator can be obtained using the indirection operator, *. An integer can be added to some iterators in the same way, and for the same purpose, the integer would be added to a pointer. The questions for this article are: What are these iterators? Which of these iterators are used with the C++ vector? How are these iterators used with the C++ vector? This article answers all these questions in a simplified way. At the end of this article, when all these questions would have been answered, C++ vector iterators will be intuitive and natural (for the reader).

  • Security breaches where working from home is involved are costlier, claims IBM report

    Firms looking to save money by shifting to more flexible ways of working will need to think carefully about IT security and the additional cost of breaches linked to staff working from home. That's according to the latest annual "Cost of a Data Breach Report" conducted by Ponemon Institute along with IBM Security, which found that the average total cost of a remote-working data breach was more than $1m higher than cyberattacks where remote working wasn't a factor.

  • IBM Cloud took the evening off – 23 services were hard to provision for eight hours

    IBM cloud has experienced a significant Severity One outage – the rating Big Blue uses to denote the most serious incidents that make resources in its cloud unavailable to customers. The impact was indeed severe: IBM stated that users might not be able to access its catalogue of cloudy services or provision affected services.

Hardware From Vecow and Arduino

  • Vecow unveils Intel Atom x6211E based fanless Box PC & Pico-ITX motherboard

    Vecow EPBC-1000 2.5-inc/Pico-ITX single board computer powered by an Intel Atom x6211E Elkhart Lake processor, and found in the company’s PBC-1000 ultra-compact fanless embedded box PC, is designed for edge applications such as intelligent control, energy management, M2M, In-Vehicle Infotainment (IVI), factory automation, and any AIoT or Industry 4.0 applications.

  • This massive five-axis CNC machine is 3D-printable | Arduino Blog

    CNC (Computer Numerical Control) mills, routers, and lathes are indispensable manufacturing tools. If you need a part that adheres to tight tolerances, you turn to a CNC machine. Industrial CNC equipment is usually large, heavy, and very expensive. But small models exist for light-duty hobby jobs. This DIY device designed by Brian Brocken stands out because it is huge, has five axes, and is 3D-printable.

  • Hacking an old Nintendo Zapper into a wireless remote | Arduino Blog

    Those of us who have experienced the Nintendo Zapper while playing games such as Duck Hunt will probably have fond memories of it. However, with the rapid disappearance of CRT TVs and the aging of the physical mechanisms, YouTuber DuctTape Mechanic wanted to give an old Zapper a new lease on life. His modification integrated a small RF transmitting module into the top of the device, allowing it to be switched on by the trigger’s microswitch. With everything in place inside the Zapper, he moved onto the receiver.

Top 5 Software Tools for Linux with Data Encryption

Data encryption is a must-have feature in today’s world of cybersecurity. It allows you to encode your data making it unintelligible to someone who doesn’t have the authorized access. To be more secure online, it might be a good idea to opt for software that comes with this useful feature by default. Read more

today's howtos

  • How to automount volumes for Docker containers

    There are so many reasons you want to use volumes for your container deployments. The primary reason is to ensure persistent storage. Say, for example, you're deploying a WordPress instance via a Docker container. Not only do you want to give that container enough storage space to house all of the data it will require (especially as it scales), you want to make sure that data remains in play, even after the container is stopped or restarted. For that, you would use volumes.

  • How to install Adrift on a Chromebook

    Today we are looking at how to install Adrift on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • How to Install and Use Telnet on Ubuntu 20.04 - LinuxCapable

    Telnet is a protocol that allows you to connect to remote computers (called hosts) over a TCP/IP network using a client-server protocol to establish a connection to Transmission Control Protocol port number 23 In the following tutorial, you will learn how to install Telnet on Ubuntu 20.04 and 21.04.

  • How to Install phpMyAdmin on Rocky Linux 8

    phpMyAdmin is a web app for administering MySQL or MariaDB. With phpMyadmin, you can perform various database management tasks, and execute SQL queries from a graphical interface via a web browser. It is free, open-source, and written in the PHP language.

  • Junichi Uekawa: Wrote a tool to parse /sys/block/*/stat.

    Wrote a tool to parse /sys/block/*/stat. It's probably impossible for a human brain to appreciate the numbers so I made a web page that you can paste the contents and parse it from JS to emit some processed numbers. Probably iostat is the tool you want, but hey, sometimes you need this kind of stuff.

  • All zip and unzip File Operations on Linux – Linux Hint

    This tutorial explains all zip and unzip operations under Linux with practical examples and easy function descriptions.

  • How to find all failed ssh login attempts in Ubuntu – Linux Hint

    One of the normal tasks of administrators is to keep track of successful and failed login attempts to ensure that the environment is free of unwanted and illegal intrusions. Administrators can also look through the logs to see if there have been any security problems on the servers. A log file is created whenever someone tries to log in to a server using SSH. You may see the requested login date, timestamp, user account, and IP address. SSH was created as a protocol for creating connections between two systems that rely on a client/server architecture, allowing administrators and users to access the server or computer remotely. This protocol is most commonly used by the system and network administrators and anyone who wants to administer a computer remotely. One of the most prominent benefits is that it is in charge of encrypting the link session to improve security by prohibiting attackers from reading unencrypted passwords. The rsyslog daemon in Linux keeps track of every attempt to login to an SSH server and records it in a log file. Combining, showing, and filtering log files is the most basic approach for listing all failed SSH login attempts on Ubuntu. In this article, we will find all failed ssh login attempts in Ubuntu 20.04 Linux system.

  • How to install a specific Python version on Ubuntu – Linux Hint

    It is often the case that we install a program on our system, and it turns out that it’s the wrong version. This can lead to compatibility and performance issues since it may not communicate with third-party modules properly. Similar is the case with Python, and as vigilant programmers, we must figure out the correct version that we need. Therefore, in this guide, we will show you how to install a specific version of Python on your Ubuntu system.