Emulating classic gaming consoles on Fedora Linux
Many computer games from the 1980s and 1990s enjoy cult status. Graphics and sound were not very advanced back then, which forced the producers to impress gamers with good ideas and a convincing level of design. Emulators let you run those classic games on a Linux PC.
If you wanted to play video games 25 years ago, you would typically attach a small box to the TV in the family living room. It was either a game console or a handy home computer, and you used a gamepad or joystick as a controller. With the right software, you can do all this and more in Fedora: Fans can even try those old DOS games again.
Thirty years ago, PCs with the then-popular MS-DOS operating system did not really feel as if they were made for fun. However, resourceful games developers tweaked the limited graphical capabilities to the max, and over the years the current graphics cards increasingly displayed more colors. Millions of people spent many hours trying to save the world in the Commander Keen platform game, or they engaged in dangerous battles in Doom. Now, DOSbox lets Linux run DOS games.
You can install DOSbox by clicking on the graphical package manager in Fedora. Before starting, however, it makes sense to create a subfolder in your own home directory (e.g.,
mkdir ~/dosgames/), to which you then copy the desired games.
Buy this article as PDF
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.