Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Tuesday, 18 Jun 19 - Tux Machines is a community-driven public service/news site which has been around for over a decade and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

Quick Roundup

Type Title Author Replies Last Postsort icon
Story Ubuntu AIO DVD Has All Ubuntu 14.04 LTS Flavors on One Disk Rianne Schestowitz 09/05/2014 - 1:39am
Story AV Linux Dazzles Both Eyes and Ears Rianne Schestowitz 09/05/2014 - 1:34am
Story Chromebooks to go offline as Intel moves inside Rianne Schestowitz 09/05/2014 - 12:54am
Story KDE kicks off wallpaper contest for the next Plasma Rianne Schestowitz 09/05/2014 - 12:50am
Story Huawei launches ultra-slim Ascend P7 Android phone Rianne Schestowitz 09/05/2014 - 12:44am
Story Death of net neutrality: Is Mozilla barking up the wrong tree? Rianne Schestowitz 09/05/2014 - 12:39am
Story GoboLinux 015 Rianne Schestowitz 09/05/2014 - 12:30am
Story Secure Ubuntu Privacy Remix 12.04r1 (Protected Pangolin) Officially Released Rianne Schestowitz 09/05/2014 - 12:23am
Story Debian 7.5 “Wheezy” Live CD Now Available for Download Rianne Schestowitz 08/05/2014 - 8:48pm
Story Does Linux need more distributions and desktop environments? Rianne Schestowitz 08/05/2014 - 8:44pm

Sony confirms AMD deal

Filed under
Hardware

Sony has confirmed that it will bypass Intel and offer a Vaio notebook based on a mobile AMD chip - just weeks after admitting it's also building a machine around Transmeta's TM5600 chip.

USB devices offer an old-school way to steal data

Filed under
Security

Viruses and worms are commonly broadcast via the Internet, but criminal hackers are also focusing on faked USB devices that offer a desktop-by-desktop method of installing malicious code and stealing personal or private data.

Day for software freedom

Filed under
OSS

Linux Australia will organise the country's first Software Freedom Day on September 10, the organisation's president, Jonathan Oxer, said today.

FreeBSD 6.0 to target wireless devices

Filed under
BSD

FreeBSD is hoping to move beyond the server and desktop market by tackling wireless devices.

Apache Kick-Starts Open Source Web Services

Filed under
Software

Apache Synapse is another significant step in our path towards creating the best possible Web services middleware platform in Apache.

Utopia goes digital

Filed under
Web

Is the real world grating on you, with its wars, overheated summers and incessant Tom Cruise updates? Just hop online and create a digital you that lives in a utopian cyber-realm.

Millions of Windows Users Need To Clean Up Their Act.

Filed under
Microsoft

Speaking of Helios, he has blogged another biting piece of journalistic napalm upon Windows users in his efforts to convince them to try Linux.

Interview with Bruce Perens

Filed under
OSS

Nathaniel Brown, an Open Source evangelist in Canada, caught up with Perens and asked him about how Open Source can improve security, as well as other areas to keep enterprise managers interested in the Open Source option.

Sun Micro announces open-source DRM project

Filed under
Sci/Tech

Sun Microsystems Inc., weighing in on the fractious issue of protecting copyrighted digital content, on Sunday announced a project it calls the Open Media Commons initiative aimed at creating an open-source, royalty-free digital-rights management standard.

What's it going to be: Windows Vista or Linux? Or Mac OS X?

Filed under
OS

OMG! Softpedia has published an editorial by the Editor-in-Chief and the Linux-Editor showing their complete ignorance of Linux and sticking their feet in their collective winmouths. We need to sick Helios on 'em.

Revamped Yahoo Local Sites Still Lack Sizzling Specifics

Filed under
Web

District residents spent a lot of time cruising the Web for liquor stores and temporary employment last week -- or so it would seem from the new "top searches" feature Yahoo introduced Monday.

RSA Security Sees Hope in Online Fraud

Filed under
Security

Analysts, schmanalysts. More importantly, lots of factors are about to turn in RSA's favor, namely the need for more secure, traceable financial transactions in a world beset by online fraud and identity theft.

5 years after the bust, a sober, new reality

Filed under
Sci/Tech

"Web 1.0: arrogance. Web 2.0: humility."

As the tech economy revs up again, a post-recession character emerges:

Drunken optimism is out; sober reality is in.
Job hopping is out; loyalty is in.
Living to work is out; working to live is in.
Greed is out; gratitude is in.

n/a

Paying for parking via cell phones

Filed under
Sci/Tech

A Finnish company has been in Boston pitching its cashless cell phone parking meter technology, officials said.

Diversification Helps Spammer Make Fortune

Filed under
Security

Christopher Smith's neighbors didn't know exactly what he did for a living. But they knew well that he liked to collect expensive cars and set off fireworks at all hours.

M$ updating programs to better battles competitors

Filed under
Microsoft

Linux is just one of Microsoft's headaches. The software giant is facing competitive threats in nearly every part of its business.

Unlocking the enterprise for open source

Filed under
OSS

Bob Gatewood needed more control. The chief technology officer at Athena Healthcare was sick of multiple databases that contained the same customer record. He wanted to tightly integrate the company's customer data into its Web portal, its financial accounting system and its call center software.

Study Smart With These Sites

Filed under
Web

There's a wealth of free reference information -- even entire books -- on the Web that students will find useful. Here are some of the best links.

Dating website weeds out beauty from the beast

Filed under
Web

A new online dating service is attempting to weed out the wonderful from the weirdos by allowing only beautiful people to join up.

Syndicate content

More in Tux Machines

today's howtos

All Linux, all the time: Supercomputers Top 500

Starting at the top, two IBM-built supercomputers, Summit and Sierra, at the Department of Energy's Oak Ridge National Laboratory (ORNL) in Tennessee and Lawrence Livermore National Laboratory in California, respectively to the bottom -- a Lenovo Xeon-powered box in China -- all of them run Linux. Linux supports more hardware architectures than any other operating system. In supercomputers, it supports both clusters, such as Summit and Sierra, the most common architecture, and Massively Parallel Processing (MPP), which is used by the number three computer Sunway TaihuLight. When it comes to high-performance computing (HPC), Intel dominates the TOP500 by providing processing power to 95.6% of all systems included on the list. That said, IBM's POWER powers the fastest supercomputers. One supercomputer works its high-speed magic with Arm processors: Sandia Labs' Astra, an HPE design, which uses over 130-thousand Cavium ThunderX2 cores. And, what do all these processors run? Linux, of course. . 133 systems of the Top 500 supercomputers are using either accelerator or co-processor setups. Of these most are using Nvidia GPUs. And, once more, it's Linux conducting the hardware in a symphony of speed. Read more

Red Hat and SUSE Leftovers

  • Are DevOps certifications valuable? 10 pros and cons
  • Kubernetes 1.15: Enabling the Workloads
    The last mile for any enterprise IT system is the application. In order to enable those applications to function properly, an entire ecosystem of services, APIs, databases and edge servers must exist. As Carl Sagan once said, “If you wish to make an apple pie from scratch, you must first invent the universe.” To create that IT universe, however, we must have control over its elements. In the Kubernetes universe, the individual solar systems and planets are now Operators, and the fundamental laws of that universe have solidified to the point where civilizations can grow and take root. Discarding the metaphor, we can see this in the introduction of Object Count Quota Support For Custom Resources. In English, this enables administrators to count and limit the number of Kubernetes resources across the broader ecosystem in a given cluster. This means services like Knative, Istio, and even Operators like the CrunchyData PostgreSQL Operator, the MongoDB Operator or the Redis Operator can be controlled via quota using the same mechanisms that standard Kubernetes resources have enjoyed for many releases. That’s great for developers, who can now be limited by certain expectations. It would not benefit the cluster for a bad bit of code to create 30 new PostgreSQL clusters because someone forgot to add a “;” at the end of a line. Call them “guardrails” that protect against unbounded object growth in your etcd database.
  • Red Hat named HPE’s Partner of the Year at HPE Discover 2019
    For more than 19 years, Red Hat has collaborated with HPE to develop, deliver and support trusted solutions that can create value and fuel transformation for customers. Our work together has grown over these nearly two decades and our solutions now include Linux, containers and telecommunications technologies, to name just a few. As a testament to our collaboration, HPE has named Red Hat the Technology Partner of the Year 2019 for Hybrid Cloud Solutions.
  • Demystifying Containers – Part II: Container Runtimes
    This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications. Simple examples paired with the historic background will guide you from the beginning with a minimal Linux environment up to crafting secure containers, which fit perfectly into todays’ and futures’ orchestration world. In the end it should be much easier to understand how features within the Linux kernel, container tools, runtimes, software defined networks and orchestration software like Kubernetes are designed and how they work under the hood.
  • Edge > Core > Cloud: Transform the Way You Want
    For more than 25 years, SUSE has been very successful in delivering enterprise-grade Linux to our customers. And as IT infrastructure has shifted and evolved, so have we. For instance, we enabled and supported the move to software-defined data centers as virtualization and containerization technologies became more prevalent and data growth demanded a new approach.
  • SUSE OpenStack Cloud Technology Preview Takes Flight
    We are pleased to announce that as of today we are making a technology preview of a containerized version of SUSE OpenStack Cloud available that will demonstrate a future direction for our product. The lifecycle management for this technology preview is based on an upstream OpenStack project called Airship, which SUSE has been using and contributing to for some time. This follows our open / open policy of upstream first and community involvement.

NSA Back Doors in Windows Causing Chaos While Media is Obsessing Over DoS Linux Bug

  • U.S. Government Announces Critical Warning For Microsoft Windows Users
    The United States Department of Homeland Security's Cybersecurity and Infrastructure Security Agency (CISA) has gone public with a warning to Microsoft Windows users regarding a critical security vulnerability. By issuing the "update now" warning, CISA has joined the likes of Microsoft itself and the National Security Agency (NSA) in warning Windows users of the danger from the BlueKeep vulnerability. This latest warning, and many would argue the one with most gravitas, comes hot on the heels of Yaniv Balmas, the global head of cyber research at security vendor Check Point, telling me in an interview for SC Magazine UK that "it's now a race against the clock by cyber criminals which makes this vulnerability a ticking cyber bomb." Balmas also predicted that it will only be "a matter of weeks" before attackers started exploiting BlueKeep. The CISA alert appears to confirm this, stating that it has, "coordinated with external stakeholders and determined that Windows 2000 is vulnerable to BlueKeep." That it can confirm a remote code execution on Windows 2000 might not sound too frightening, this is an old operating system after all, it would be unwise to classify this as an exercise in fear, uncertainty and doubt. Until now, the exploits that have been developed, at least those seen in operation, did nothing more than crash the computer. Achieving remote code execution brings the specter of the BlueKeep worm into view as it brings control of infected machines to the attacker.
  • Netflix uncovers SACK Panic vuln that can bork Linux-based systems