Language Selection

English French German Italian Portuguese Spanish

About Tux Machines

Monday, 18 Jan 21 - Tux Machines is a community-driven public service/news site which has been around for over a decade and a half and primarily focuses on GNU/LinuxSubscribe now Syndicate content

Search This Site

DOD offers $1b in contracts for auditors

Filed under
Misc

"The Defense Department's inspector general is paying nearly $1 billion to 20 auditing and IT firms to assist the department in improving its bleak financial systems picture."

U.S. government to buy Corel software

Filed under
Linux
Microsoft

"The Justice Department, which challenged Microsoft Corp. in courtrooms for nearly a decade over antitrust violations, will pay more than $2 million each year to buy business software from Corel Corp., a leading Microsoft rival."

VA Linux And Sun Wah Linux Join Forces

Filed under
Linux

"VA Linux Systems Japan K.K. (VA Linux), a provider of Linux solutions for the telecommunications and enterprise systems markets, announced a strategic alliance with Sun Wah Linux Limited (SWL) to jointly develop a universal Debian GNU/Linux

Bumbling Bully

Filed under
Legal

"Maybe SCO Group should be called "the gang that couldn't sue straight.""

"SCO Group of Lindon, Utah, became high-tech's most hated company after suing IBM over the free Linux operating system. Now Linux lovers everywhere can celebrate: SCO is having problems."

A Week with KDE 3.4rc1

Filed under
KDE
Reviews
-s

Well, what can I say that I haven't already said? Not the best way to start an article hoping to get read, but this has been the most uneventful week using kde yet, and I've been using kde quite a long time.

The Rock solidifies Doom movie role

Filed under
Movies
Gaming

"Actor Dwayne "The Rock" Johnson revealed more information on the upcoming Doom film, based on id Software's hit franchise. Johnson, who was on The Daily Show With Jon Stewart promoting the film Be Cool, was prodded by Stewart about another upcoming project."

Texas Gaming Festival: Quick Peek at the LAN Party

Filed under
Gaming

"The Texas Gaming festival is a successful LAN event that has been taking place in Dallas, Texas for the past few years. Over the years, it has become one of the top most visited and sponsored LAN events in the nation with attendance easily surpassing the 500-attendee attendance. This year was no different. In fact, this was perhaps the most successful attempt at a LAN event especially when ATI decided to launch its X850 XT PE 512MB graphics card officially."

Intel's knuckles rapped over AMD pricing practices

Filed under
Hardware

"A JAPANESE WEB reports that Intel will be found to have violated antimonopoly laws after it gave favourable prices to customers as long as they didn't use AMD processors."

The open-source key to lasting software

Filed under
OSS

Dan Bricklin, who helped kick-start the personal computer revolution in the 1980s as co-inventor of VisiCalc, recently named by [Boston] Governor Romney to a state information technology advisory panel, [states] open source is key to creating "Software That Lasts 200 Years."

Linux' use creeping up on Windows

Filed under
Linux
Microsoft

"Linux is a free operating system for computers that has been developed largely by volunteer programmers.

Linux is thriving, not just on the college campuses where it emerged, but in companies and institutions. Surveys show that Linux is used by 24 percent of computer servers. It is creeping up on Windows, which has 55 percent of that class of operating system software."

Quantum Computers May Be Easier to Build Than Predicted

Filed under
Hardware
Sci/Tech

"A full-scale quantum computer could produce reliable results even if its components performed no better than today's best first-generation prototypes, according to a paper in the March 3 issue in the journal Nature* by a scientist at the Commerce Department's National Institute of Standards and Technology (NIST)."

Open-Source Guru Says JCP Is Too Closed

Filed under
OSS

"While Sun Microsystems Inc. moves to open-source its Solaris operating system and releases key patents in a nod to the open-source community, the company still takes a rap for hampering open source in other ways."

A Windows crash you don't see everyday

Filed under
Microsoft
Humor

"Unbelievable as it's gonna sound... My friend's Windows XP CD... crashed while being inside his CD-ROM. This photo was taken immediately after the CD was ejected from the drive. Seriously, if this is not irony, then I don't know what is."

Link to photo.

FREE SOFTWARE MAGAZINE

Filed under
Misc

THE FREE MAGAZINE ON FREE SOFTWARE

"Welcome to the "Free Software Magazine" project. Free Software Magazine is the free magazine for the free software world, available on paper and in electronic format. If you wonder what free software is, you should read this article written by the Free Software Foundation."

Link.

State politicians proposing more game regulation

Filed under
Gaming
Legal

"Washington state bill would hold game companies responsible for "inspiring" real-life violence; Arkansas proposal literally keeps M-rated games out of kids' reach. Lawmakers across the country continue to propose legislation that would safeguard youths from the supposedly harmful effects of games that depict violence or that are rated "M" (for Mature content) by the Entertainment Software Ratings Board."

Getting the net off the ground

Filed under
Web

"Early attention to security issues might have given us a better internet today - or the project might never have taken off at all, says Robert Kahn."

Companies Should Give Online Consumers More Privacy

Filed under
Security

"To quell the privacy-invasion fears that are stunting the growth of e-commerce, Web marketers need to give consumers more control of the personal information collected about them, according to research by Naresh Malhotra, Regents' professor of marketing at Georgia Tech College of Management."

Gas getting pricier, oil demand rises

Filed under
Misc

"With the petroleum industry pumping just barely enough fuel to keep the world's economic engine humming, a buying frenzy on oil markets is setting the stage for sharply higher gasoline prices as early as next week.

Protection management, copy control

Filed under
Legal

"This week, in Dublin, the Digital Video Broadcasting Project held its annual meeting to discuss progress on its latest set of specifications for digital television. Much of its work has to do with technical details such as codecs and data formats, but a key section called Content Protection/Copy Management (CPCM) is about controlling how high-definition digital broadcasts may be recorded, copied, or redistributed.

Big Brother is Watching your Toyota Sienna

Filed under
Security

"The 2005 Toyota Sienna (I'm not sure about earlier models) has an Event Data Recorder (EDR) which is a black box of sorts (sans the audio recording). In the event of a crash, near crash, or airbag deployment, it records various data such as vehicle speed, engine speed, driver seat position, gear selector position, etc."

Syndicate content

More in Tux Machines

JingOS arrives as China’s first Linux Distro, offers iPadOS-like features and functions

JingOS was built with the idea of improving the functionality and productivity of a tablet overall. So, the team behind the new operating system took inspiration from the Cupertino based giant’s iPadOS platform to offer a simple/clean, yet productive and efficient UI design that can ensure that your tablets are a mini computer that one can work on, on the go. JingOS is not only a tablet OS but a full function Linux distro. Read more

9to5Linux Weekly Roundup: January 17th, 2021

Thank you everyone for following 9to5Linux on social media; we’re nearing 6K followers on Twitter and that’s only possible thanks to you guys! Thank you again to everyone who donated so far to help me keep this website alive for as long as possible. This week has been quite interesting despite the fact that no major releases were planned. We saw the launch of a new PinePhone Linux phone edition, the release of the Flatpak 1.10 and Wine 6.0 software, and much more. Read more

Security Leftovers

  • New coalition aims to combat growing wave of ransomware attacks [iophk: Windows TCO]

    The California-based nonprofit aims to produce recommendations that will help governments and the private sector tackle the scourge of ransomware attacks.

    [Attackers] have increasingly used these types of attacks -- which involve accessing and encrypting the victim’s network and demanding payment to allow access again -- to hit major targets, with city governments in Atlanta, Baltimore and New Orleans severely impaired by ransomware attacks over the past two years.

    More recently, hospitals have become a target during the COVID-19 pandemic, with cyber criminals seeing vulnerable hospitals as easy targets more likely to pay a quick ransom as health care systems struggle to keep up with coronavirus cases. In some instances, the cyberattacks have been blamed for deaths due to delayed care.

  • This tiny shortcut can completely crash your Windows 10 device

    A zero-day exploit has been discovered that can crash your Windows 10 device – and, even more worrying, can be delivered inside a seemingly harmless shortcut file. The vulnerability can corrupt any NTFS-formatted hard drive and even be exploited by standard and low privilege user accounts.

    Security researcher Jonas Lykkegaard referenced the vulnerability on Twitter last week and had previously drawn attention to the issue on two previous occasions last year. Despite this, the NTFS vulnerability remains unpatched.

    There are various ways to trigger the vulnerability that involve trying to access the $i30 NTFS attribute on a folder in a particular way. One such exploit involves the creation of a Windows shortcut file that has its icon location set to C:\:$i30:$bitmap. Bleeping Computer found that this triggered the vulnerability even if users did not attempt to click on the file in question. Windows Explorer’s attempts to access the icon path in the background would be enough to corrupt the NTFS hard drive.

  • This Easily-Exploitable Windows 10 NTFS Bug Can Instantly Corrupt Your Hard Drives

    Jonas says that this Windows 10 bug isn't new and has been around since the release of Windows 10 April 2018 Update, and remains exploitable on the latest versions, as well. BleepingComputer shared that the problematic command includes $i30 string, a Windows NTFS Index Attribute associated with directories.

    [...]

    After running the command, Windows 10 will start displaying prompts to restart the device and repair the corrupted drive. Apparently, the issue also impacts some Windows XP versions and similar NTFS bugs have been known for years but are yet to be addressed by the Windows maker.

  • Nidhi Razdan, Phishing, And Three Hard Lessons

    Nidhi Razdan, a career journalist, became a victim of an elaborate phishing attack that made her quit her 21-year-old job and part with many of her personal details.

  • Windows Finger command abused by phishing to download malware

    Attackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims' devices. The 'Finger' command is a utility that originated in Linux/Unix operating systems that allows a local user to retrieve a list of users on a remote machine or information about a particular remote user. In addition to Linux, Windows includes a finger.exe command that performs the same functionality.

Security Auditing Tools For Ubuntu

Malware, where aren’t thou found? Well, even our wonderful Ubuntu can be infected. So what can we do about it? Hope and pray we keep our system safe and better yet, audit our systems regularly for malwares and rootkits. There are 4 system auditors for Ubuntu that we will review - lynis, rkhunter, chkrootkit, and clamav. [...] Oddly enough, there aren’t many tools to scan for malware out there for Linux. Why? I’m not sure. However, these 4 tools are more than enough to detect malwares, rootkits, and viruses. Read more Also: Windows Finger command abused by phishing to download malware