Language Selection

English French German Italian Portuguese Spanish

Games: AssaultCube Release, Shadow Tactics: Blades of the Shogun - Aiko's Choice, and More

Filed under
Gaming
  • AssaultCube 1.3 Free Multiplayer Shooter is Finally Here

    AssaultCube hasn’t seen a new release since 2013, but now it’s back with AssaultCube 1.3 Lockdown Edition to the delight of all Linux fans.

    AssaultCube is a name which probably plenty of Linux users know but haven’t heard anything of in a long time. For those of you unaware, it’s a free multiplayer first-person shooter game, based on the CUBE engine. The game is available free of charge to download for Microsoft Windows, Linux and macOS.

    Although the main focus of AssaultCube is multiplayer online gaming, a single player mode consists of computer-controlled bots. The game has a ton of fan made maps, and the game comes with like 45.

  • Shadow Tactics: Blades of the Shogun - Aiko's Choice is out now | GamingOnLinux

    Shadow Tactics: Blades of the Shogun - Aiko's Choice, the new standalone addon to the very popular stealth tactics game Shadow Tactics is out now.

    Focusing on one of the main game's protagonists: the kunoichi adept Aiko. She is a master of camouflage and distracts enemies disguised as a geisha. While Aiko was certain that she left her old life behind, her former sensei, the cunning spymaster Lady Chiyo, reappears from the shadows to challenge her. Together with her friends—a group of deadly assassins—she sets out to hunt down the ghosts of her past.

  • Arch User Reacts To Linus Tech Tips Linux Challenge Pt 3 - Invidious

    We're back for the 3rd part of the Linux Tech Tips linux challenge and this week went surprisingly well, I mean really well I didn't even have anything to say about most of the video. For basic user tasks Linus and Luke have sort of got used to using Linux.

  • jJonathan Dowland: Sixth Annual UK System Research Challenges Workshop lightning talk

    in 2018 I talked about some hack I'd made to the classic computer game Doom from 1993. I've done several hacks to Doom that I could probably talk about except I've become a bit uncomfortable about increasingly being thought of as "that doom guy". I'd been reflecting on why it was that I continued to mess about with that game in the first place and I realised it was a form of expression: I was treating Doom like a canvas.

More in Tux Machines

IBM/Red Hat/Fedora Leftovers

  • Fedora Community Blog: CPE Weekly Update – Week of January 17th – 22nd
  • Friday's Fedora Facts: 2022-03 – Fedora Community Blog

    Here’s your weekly Fedora report. Read what happened this week and what’s coming up. Your contributions are welcome (see the end of the post)! I have weekly office hours on Wednesdays in the morning and afternoon (US/Eastern time) in #fedora-meeting-1. Drop by if you have any questions or comments about the schedule, Changes, elections, or anything else. See the upcoming meetings for more information.

  • Architecting the way: Andrew Block

    One of Andrew Block’s favorite things about Red Hat? Being able to contribute back to the open source community. He says, "As long as you are innovating and making yourself better, let’s go ahead and work better together." Block is among the first Distinguished Architects at Red Hat. Distinguished Architects are senior-level technical contributors who've continued to advance in their careers working directly with customers and applying experience and knowledge of Red Hat technologies. We had a chance to chat with Block about his experience working with Red Hat customers and the innovation that architects can help bring to their organizations.

  • Meet Red Hat’s bankers: Insights from Monica Sasso

    As you sit in a meeting room (virtual or in-person), take a moment to think through the perspectives, experiences and insights of those around you being brought to that meeting. We did just that and quickly realized the wealth of knowledge from our colleagues at the table from around the world, who were former financial services leaders. Our "bankers," as we call them, have a broad and deep understanding of financial services because they’ve experienced it first-hand.

  • Copr - look back at 2021

    We did eight releases of Mock. We moved Mock’s wiki to GitHub Pages to allow indexing by search engines https://rpm-software-management.github.io/mock/ and created a Fedora-based Jekyll container for local documentation testing (https://github.com/praiskup/jekyll-github-pages-fedora-container).

  • Contribute at the Fedora Linux 36 Test Week for Kernel 5.16

    The kernel team is working on final integration for kernel 5.16. This version was just recently released, and will arrive soon in Fedora. As a result, the Fedora kernel and QA teams have organized a test week from Sunday, January 23, 2022 through Sunday, January 29, 2022. Refer to the wiki page for links to the test images you’ll need to participate. Read below for details.

  • Irving Wladawsky-Berger: A Blockchain-based Framework for Safeguarding the Integrity of Real-World Assets

    Blockchains first came to light in 2008 as the architecture underpinning bitcoin, the best known and most widely held cryptocurrency. It’s a truly brilliant architecture built on decades-old fundamental research in cryptography, distributed data, game theory and other advanced technologies. The blockchain’s original vision was limited to enabling bitcoin users to transact directly with each other with no need for a financial institution or government agency to certify the validity of the transactions. But, like the Internet and other transformative technologies, blockchain has now transcended its original objectives. Blockchains are a kind of distributed ledger technologies (DLT), which also include non-blockchain DLTs. Over the past decade, an increasing number of people, including me, consider blockchains and DLTs as major next steps in the evolution of the Internet. In 2016 the World Economic Forum (WEF) named The Blockchain in its annual list of Top Ten Emerging Technologies citing its potential to fundamentally change the way markets and governments work. “Like the Internet, the blockchain is an open, global infrastructure upon which other technologies and applications can be built,” said the WEF. “And like the Internet, it allows people to bypass traditional intermediaries in their dealings with each other, thereby lowering or even eliminating transaction costs.”

  • Flathub to verify first-party apps and allow developers to collect monies | GamingOnLinux

    Flathub and Flatpak packages are the future of Linux apps according to more people and GNOME are continuing to invest in it. They have some big plans to improve it too. Writing in a new blog post on the GNOME Foundation website, they went over a number of things and not just Flathub related but that's what we're going to focus on for this article. The plans actually sounds pretty good! Firstly, Flathub is going to gain a way to process and verify apps from first-party teams. As in, developers who directly publish their app and manage the Flatpak package process for Flathub. A way to actually properly distinguish official apps from community builds will be quite important for so many reasons (security, privacy and so on). Not only that but GNOME want to give developers a way to collect donations and subscriptions too, which is also important to help make it more sustainable. Sounds like it's possible a way will be added for developers to share some of the revenue with Flathub too, ensuring it too is sustainable.

Audiocasts/Shows: Hackaday Podcast, Linux From Scratch, Linux Mint 20.3 "Una" Xfce, and More

  • Hackaday Podcast 152: 555 Timer Extravaganza, EMF Chip Glitching 3 Ways, A Magnetic Mechanical Keyboard, And The Best Tricorder Ever | Hackaday

    Join Hackaday Editor-in-Chief Elliot Williams and Managing Editor Tom Nardi as they bring you up to speed on the best stories and projects from the week. There’s some pretty unfortunate news for the physical media aficionados in the audience, but if you’re particularly keen on 50 year old integrated circuits, you’ll love hearing about the winners of the 555 Timer Contest. We’ll take a look at a singing circuit sculpture powered by the ESP32, extol the virtues of 3D printed switches, follow one hacker’s dream of building the ultimate Star Trek tricorder prop, and try to wrap our heads around how electronic devices can be jolted into submission. Stick around to the end as we take a close look at some extraordinary claims about sniffing out computer viruses, and wrap things up by wondering why everyone is trying to drive so far.

  • Linux From Scratch: Another Day, Another Compiler - Invidious

    We're back for more LFS, last week we didn't make a ton of progress but hopefully this week it goes at least a little bit better but I'm not making any promises

  • Linux Mint 20.3 "Una" Xfce overview | Light, simple, efficient. - Invidious

    In this video, I am going to show an overview of Linux Mint 20.3 "Una" Xfce and some of the applications pre-installed.

  • Noodlings 36 | The Wires and Tubes

    This is my segment where I like to look back in time and see how the world of technology has advanced and how things have stayed the same. I find we often forget how far we have come and how good we have it while not always remember how we got here. Having some historical perspective on computers and technology can help to drive some appreciation for what we have today.

Proprietary Security: Windows and McAfee

  • This Week In Security: NetUSB, HTTP.sys, And 2013’s CVE Is Back | Hackaday

    A serious problem has been announced in Windows Server 2019 and Windows 10, with some versions vulnerable in their default configurations. The problem is in how Windows handles HTTP Trailer packets, which contain extra information at the end of normal HTTP transfers. There is a PoC available that demonstrates a crash. It appears that an additional information leak vulnerability would have to be combined with this one to produce a true exploit. This seems to be a different take on CVE-2021-31166, essentially exploiting the same weakness, and working around the incomplete fix. This issue was fixed in the January patch set for Windows, so make sure you’re covered.

  • CISA Adds Four Known Exploited Vulnerabilities to Catalog | CISA

    CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerabilities listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.

  • McAfee Releases Security Update for McAfee Agent for Windows  | CISA

    McAfee has released McAfee Agent for Windows version 5.7.5, which addresses vulnerabilities CVE-2021-31854 and CVE-2022-0166. An attacker could exploit these vulnerabilities to take control of an affected system.

today's howtos

  • FTP server container Podman fast and right and 4 dirty steps

    FTP server container stands for “File Transfer Protocol” and is an excellent protocol for downloading files from a remote or local server or uploading files onto the server. Using FTP proves to be a primary task after it has been set up correctly. It works by having a server listening for connections (on port 21 by default) from clients. The clients can access a remote directory with their user account and then download or upload files there, depending on the permissions that have been granted to them. It’s also possible to configure anonymous authorization, which means users will not need their account to connect to the FTP server. On Centos Linux, there are many different FTP server containers and client software packages available. You can even use default GUI and command-line tools as an FTP client. In addition, a stylish and highly-configurable FTP server package is vsftpd, known for many Linux systems, including Centos. This guide will go over the step-by-step instructions to install vsftpd on Centos. We’ll also see how to configure the container FTP server through various settings, then use the command line, GNOME GUI, or FTP client software to connect to the FTP server. Creating FTP users tutorial.

  • How to Back Up Your Linux System With Rsync - JumpCloud

    It’s easy to take for granted the importance of having a server backup — until you experience a system failure, a natural disaster, or a malware attack. This can potentially paralyze your business through the loss of vital records such as financial and customer data. Your ability to recover will only be as good as your last backup. Server backups provide the much-needed confidence that data is not lost and can be recovered in case of any eventuality. However, each operating system has a different way to handle this, and while some provide built-in utilities to accomplish this, others must be established from the ground up. Like many other areas of management, Linux operating systems have more options, but require more knowledge to set them up successfully.

  • How to Deploy a Ghost Blog With Docker – CloudSavvy IT

    Ghost is a popular content creation platform that’s written in JavaScript with Node.js. The open-source software comes with everything you need to author, theme, publish, and maintain your own blog. Ghost is open-source software supported by the official Ghost(Pro) hosted service. You can install it on your own server by adding Node.js and using the Ghost CLI to set up your stack. Ghost is also available as a Docker image which bundles all the dependencies for you. In this guide, we’ll use Docker to quickly get a new Ghost blog operational. Install Docker and Docker Compose on your host before proceeding any further. While you can deploy Ghost using Docker alone, Compose makes it simpler to supply and manage the config values your site will need to get started.

  • How to Check Directory Size From the Linux Command Line – CloudSavvy IT

    While the Linux command ls can display the sizes of files, it doesn’t work properly with directories, which will always be displayed as 4096 bytes. You’ll need to use the du command to recurse into subdirectories and print out a total.

  • How to Change Your Linux Password

    Once you’ve set up a new Linux PC, one of your first tasks should be to change your Linux password. After all, one of the most important parts of keeping your computer secure is creating a secure password that others can’t guess or crack. Whether you’re running macOS, Windows, or Linux, it’s crucial to be mindful of your password and change it regularly. So, how do you change your password in Linux? It’s a pretty straightforward process, so let’s take a look.

  • How to install Roblox Player and Studio on a Chromebook

    Today we are looking at how to install Roblox Studio and the Windows version of Roblox on a Chromebook. Please follow the video/audio guide as a tutorial where we explain the process step by step and use the commands below.

  • Configure Filebeat-Elasticsearch Authentication - kifarunix.com

    This tutorial will take you through how you can configure filebeat-elasticsearch authentication. You realize that when you enable Elastic basic authentication, you need to valid user credentials to authenticate and validate access to restricted Elastic resources.