This Week in TUXEDO OS #19-2025 - TUXEDO Computers

  • Notebooks
    • Notebooks/Laptops with preinstalled and configured Linux and more. TUXEDO Computers are individually built computers and PCs being fully Linux-suitable, custom tailored Linux hardware so to say. We deliver all TUXEDOs ready to go so you only ha...
    • 10-14 inch
    • 15-16 inch
    • 17 inch
    • Immediate shipping
    • Business notebooks
    • Gaming-Notebooks
    • Mobility notebooks
    • Deep Learning AI
    • All Notebooks
  • Computers / PCs
    • Computers / PCs with Linux preinstalled & more TUXEDO Computers are individually built computers and PCs being fully Linux-suitable, custom tailored Linux hardware so to say :) We deliver all TUXEDOs ready to go so you only have to unwrap,...
    • Mini Systems
    • Midi Systems
    • Maxi Systems
    • AMD Systems
    • Intel Systems
    • All Systems
  • Accessories
    • Here you will find accessories, components and peripherals for your TUXEDO system. Nothing suitable found here? Get in touch with us directly!
    • Batteries
    • Displays
    • Dockingstations
    • Books
    • Input Devices & Peripherals
    • Bags & Sleeves
    • Notebook Power Supplies & Cords
    • Components & Complements
      • Cables
      • Drives
      • Hard Disk Drives 2.5"
      • Memory
      • PC Power Supplies
      • SSDs 2.5"
      • SSDs m.2 (SATAIII and NVMe)
      • WiFi, LAN & Mobile Network
      • Licenses
  • B2B
    • In this category you can find equipment for your company, office, school, university or educational institution and servers and solutions. Appliances with CRM, ERP and merchandise management, cloud storage, cloud server for self-hosting, services...
    • Business notebooks
    • Business computers
  • Novelties
  •  
    • Notebooks
      • 10-14 inch
      • 15-16 inch
      • 17 inch
      • Immediate shipping
      • Business notebooks
      • Gaming-Notebooks
      • Mobility notebooks
      • Deep Learning AI
      • All Notebooks
    • Computers / PCs
      • Mini Systems
      • Midi Systems
      • Maxi Systems
      • AMD Systems
      • Intel Systems
      • All Systems
    • Accessories
      • Batteries
      • Displays
      • Dockingstations
      • Books
      • Input Devices & Peripherals
      • Bags & Sleeves
      • Notebook Power Supplies & Cords
      • Components & Complements
        • Cables
        • Drives
        • Hard Disk Drives 2.5"
        • Memory
          • DDR4 DIMM
          • DDR4 SO-DIMM
          • DDR5 DIMM
          • DDR5 SO-DIMM
        • PC Power Supplies
        • SSDs 2.5"
        • SSDs m.2 (SATAIII and NVMe)
        • WiFi, LAN & Mobile Network
        • Licenses
    • B2B
      • Business notebooks
      • Business computers
    • Novelties
  • Settings

  • Deutsch
  • English

  • Customer Account

  • Log in
  ATTENTION: To use our store you have to activate JavaScript and deactivate script blockers!  
Thank you for your understanding!

This Week in TUXEDO OS #19-2025

Hello TUXEDO Fans and Open-Source Enthusiasts!

Our developer penguins in the Webdev igloo had nimble flippers, thanks to steaming fish soup and a hearty mackerel stew! And now, we’re proud to announce: Habemus RSS feeds! After a long wait, our developers have finally rolled out feeds for our This Week in TUXEDO OS column and our news updates. From now on, you can follow all the latest straight from the editorial igloo right in your RSS reader. A heartfelt thank you for your patience!

By the way, the latest TWIX is packed with exciting updates – including new drivers and a whole bunch of fixes for TUXEDO OS. So go ahead, take a look – our penguins haven’t just been cooking, they’ve been hard at work under the hood too!

Enjoy reading,
The TUXEDO OS Team

  • TUXEDO OS Updates
    • linux v6.11.0–114024.24~24.04.1tux1
    • tuxedo-drivers 4.13.0
    • tuxedo-tomte 2.50.1
    • mesa 25.0.5
    • nvidia-driver-550 550.163.01
  • Finally Here: Read the TWIX Feed with RSS Guard
    • Feed URLs for This Week in TUXEDO OS (TWIX)
    • More Feeds from TUXEDO Computers
  • TUXEDO OS Tips & Tricks: Grayscale Effect for KDE Plasma
    • Installing the Grayscale Effect
    • Enabling the Effect
    • Setting a Toggle Shortcut
    • Uninstalling the Effect
  • Ubuntu Security Updates

Note: We would like to keep you updated on the latest developments in TUXEDO OS with the TWIX series and introduce you to exciting applications as well as practical tips related to the KDE desktop and TUXEDO OS. However, this section should not be a one-way street: your feedback, ideas, and suggestions for improvement are very welcome! For this purpose, we have created a thread on Reddit, where you can reach us directly.

TUXEDO OS Updates

linux v6.11.0–114024.24~24.04.1tux1

  • Rebased to the latest Ubuntu kernel
  • Bluetooth fix for the Atlas XL Intel

tuxedo-drivers 4.13.0

  • Fix: Touchpad toggle key now works correctly on the NB02 under Wayland
  • Fix: Webcam switch on the Aura 14/15 Gen4 no longer disappears from the interface when disabled in BIOS
  • New: Added recommendation for udev-hid-bpf to resolve keyboard issues on the Sirius 16 Gen1/2
  • Fix: Resolved build issues with Linux kernels 6.14 and 6.15

tuxedo-tomte 2.50.1

  • Reduced package management blocking time after system startup
  • Minimized number of desktop notifications for an improved user experience

mesa 25.0.5

  • Fixed Mesa crashes under KWin Wayland with the Radeon 6600XT
  • Resolved graphical artifacts in WWE 2K23
  • Corrected heavy aliasing when Variable Rate Shading (VRS) is enabled on AMD GPUs with RADV
  • Fixed Vulkan issues after waking from suspend on Radeon RX 9070
  • Addressed „ring gfx_0.0.0 timeout“ error after standby on RX 9070
  • Fixed failed CL conformance test vector_swizzle in the radeonsi driver
  • Corrected erroneous output from the clinfo tool under Rusticl
  • Eliminated crashes and GPU resets in Ghost of Tsushima on RDNA 3 GPUs
  • Fixed graphical glitches (colored rectangles) in Final Fantasy XIV caused by the Vulkan driver

nvidia-driver-550 550.163.01

  • Patched CVE-2025–23244, CVE-2025–23245, and CVE-2025–23246 (more info)
  • Fixed an issue that could cause Render Offload applications to crash with KDE Frameworks 6

Finally Here: Read the TWIX Feed with RSS Guard

RSS feeds are a convenient way to automatically subscribe to content from websites – perfect for staying up to date with new blog posts, news, or online columns like our This Week in TUXEDO OS series. With an RSS reader like RSS Guard, you can manage such feeds locally – no cloud connection required, open source, and easy on system resources.

With RSS Guard, you can keep an eye on new posts in the This Week in TUXEDO OS column – clearly presented, easily subscribed, and directly readable in your feed reader.
With RSS Guard, you can keep an eye on new posts in the This Week in TUXEDO OS column – clearly presented, easily subscribed, and directly readable in your feed reader.

To add the This Week in TUXEDO OS (TWIX) feed in RSS Guard, go to Feeds » Add item » Add new feed. Enter the desired feed URL in the Source field and adjust the other options if needed. Then click Fetch it now under Retrieve metadata to load the feed information. Close the dialog with OK and update all feeds via Feeds » Fetch all.

Tip: To have RSS Guard automatically update your feeds in the future, enable the option under Tools » Settings » Feeds & articles for automatic fetching.

The RSS feeds from TUXEDO Computers are now live and give you a convenient way to stay on top of all the latest content. A complete overview of all available feeds – including direct links and usage tips – can be found in our dedicated article: Subscribe to TUXEDO via RSS Feed.

Feed URLs for This Week in TUXEDO OS (TWIX)

  • German
  • English

More Feeds from TUXEDO Computers

News & Blog

  • German
  • English
  • Product Releases & Devices
  • German
  • English

TUXEDO OS Tips & Tricks: Grayscale Effect for KDE Plasma

Especially in dark environments or during extended work sessions, reducing screen colors can be quite soothing. A full grayscale mode helps reduce eye strain and minimize visual distractions – particularly on color-heavy websites or in vibrant applications.

On TUXEDO OS with KDE Plasma 6, you can enable such an effect system-wide. Currently, however, it’s not available directly through the KDE System Settings download section and needs to be installed manually.

The grayscale effect desaturates the screen (or just inactive windows). It can be toggled on and off easily via a keyboard shortcut.

Installing the Grayscale Effect

Open a terminal and run the following commands:

wget https://github.com/lliurex/kwin-grayscale-effect/archive/refs/heads/plasma6.zip
unzip plasma6.zip
cd kwin-grayscale-effect-plasma6
kpackagetool6 --type KWin/Effect --install kwin6_effect_grayscale
cp kwin6_effect_grayscale/metadata.json ~/.local/share/kwin

Note: This installs the effect only for the currently logged-in user. No system-wide changes or global configuration paths are affected. If you want to enable the effect for other users, repeat the installation in their user sessions.

Enabling the Effect

Once installed, you can activate the effect via System Settings: Open System Settings and navigate to Window Management » Desktop Effects. Look for the Grayscale effect (listed under Accessibility) and enable it, then click Apply.

Click the configure icon next to the effect to fine-tune its behavior – for example, exclude panels, apply the effect only to inactive windows, or adjust the intensity.

Advanced settings let you tweak the effect – for specific window areas or to reduce grayscale intensity.
Advanced settings let you tweak the effect – for specific window areas or to reduce grayscale intensity.

Setting a Toggle Shortcut

To easily switch between color and grayscale mode, you can create a custom keyboard shortcut:

  1. Open System Settings » Keyboard » Shortcuts
  2. Click Add New » Command or Script…
  3. Use the following command:
bash -c 'qdbus6 org.kde.KWin /Effects org.kde.kwin.Effects.isEffectLoaded kwin6_effect_grayscale | grep -q true && qdbus6 org.kde.KWin /Effects org.kde.kwin.Effects.unloadEffect kwin6_effect_grayscale || qdbus6 org.kde.KWin /Effects org.kde.kwin.Effects.loadEffect kwin6_effect_grayscale'
  1. Give it a name like Toggle Grayscale.
  2. Assign a convenient key combination – for example, Ctrl + Meta + C, which is also common on Windows.
A custom shortcut lets you quickly toggle between full color and grayscale – without having to go through System Settings.
A custom shortcut lets you quickly toggle between full color and grayscale – without having to go through System Settings.

Uninstalling the Effect

If you decide to remove the effect later on, run the following commands in the terminal:

kpackagetool6 --type KWin/Effect --remove kwin6_effect_grayscale
rm -r ~/.local/share/kwin/kwin6_effect_grayscale

Afterward, the effect will no longer appear in System Settings. As before, this removal only applies to the current user session.

Ubuntu Security Updates

The security updates listed here from Ubuntu are directly integrated into TUXEDO OS:

  • USN-7504–1: LibreOffice vulnerability: LibreOffice could accept fraudulent digital signatures.
    IDs: CVE-2025–2866
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7503–1: h11 vulnerability: python-h11 could be made to expose sensitive information over the network.
    IDs: CVE-2025–43859
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7501–2: Django vulnerability: Django could be made to crash if it received specially crafted network traffic.
    IDs: CVE-2025–32873
    Affects: Ubuntu 18.04 ESM

  • USN-7502–1: Horde Css Parser vulnerability: Horde Css Parser could be made to crash or run programs as your login if it opened a specially crafted file.
    IDs: CVE-2020–13756
    Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7501–1: Django vulnerability: Django could be made to crash if it received specially crafted network traffic.
    IDs: CVE-2025–32873
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7490–3: libsoup vulnerabilities: Several security issues were fixed in libsoup.
    IDs: CVE-2025–32913, CVE-2025–32909, CVE-2025–32906, and 6 others
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7489–2: Linux kernel (Real-time) vulnerability: The system could be made to crash under certain conditions.
    IDs: CVE-2025–21813
    Affects: Ubuntu 24.10

  • USN-7500–2: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2024–56653, CVE-2025–21953
    Affects: Ubuntu 22.04 LTS

  • USN-7496–5: Linux kernel (Azure FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
    Affects: Ubuntu 18.04 ESM

  • USN-7496–4: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2024–56650, CVE-2024–36015, CVE-2024–56642, and 30 others
    Affects: Ubuntu 14.04 ESM

  • USN-7496–3: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
    Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7495–3: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664, CVE-2024–26689
    Affects: Ubuntu 20.04 ESM

  • USN-7494–5: Linux kernel (Azure FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664
    Affects: Ubuntu 22.04 LTS

  • USN-7494–4: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7500–1: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2024–56653, CVE-2025–21953
    Affects: Ubuntu 24.04 LTS

  • USN-7499–1: Linux kernel (Azure) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2025–21813, CVE-2025–21953
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7498–1: Linux kernel vulnerability: The system could be made to crash or run programs as an administrator.
    IDs: CVE-2024–56598
    Affects: Ubuntu 14.04 ESM

  • USN-7496–2: Linux kernel (FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
    Affects: Ubuntu 18.04 ESM

  • USN-7496–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52741, CVE-2023–52927, CVE-2024–56631, and 30 others
    Affects: Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7497–1: CarrierWave vulnerabilities: Several security issues were fixed in CarrierWave.
    IDs: CVE-2021–21305, CVE-2023–49090
    Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM

  • USN-7490–2: libsoup regression: USN-7490–1 introduced a regression in libsoup. ID: CVE-2025–32912
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7488–1: Python vulnerabilities: Several security issues were fixed in Python.
    IDs: CVE-2024–11168, CVE-2024–6232, CVE-2024–9287
    Affects: Ubuntu 24.10, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM, Ubuntu 14.04 ESM

  • USN-7495–2: Linux kernel (FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664, CVE-2024–26689
    Affects: Ubuntu 20.04 ESM

  • USN-7495–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664, CVE-2024–26689
    Affects: Ubuntu 20.04 ESM, Ubuntu 18.04 ESM

  • USN-7494–3: Linux kernel (Real-time) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664
    Affects: Ubuntu 22.04 LTS

  • USN-7494–2: Linux kernel (FIPS) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664
    Affects: Ubuntu 22.04 LTS

  • USN-7494–1: Linux kernel vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2023–52927, CVE-2023–52664
    Affects: Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7493–1: Linux kernel (Raspberry Pi) vulnerabilities: The system could be made to crash under certain conditions. ID: CVE-2024–58081
    Affects: Ubuntu 24.04 LTS

  • USN-7492–2: Linux kernel (Real-time) vulnerability: The system could be made to crash or run programs as an administrator. ID: CVE-2024–56653
    Affects: Ubuntu 24.04 LTS

  • USN-7492–1: Linux kernel vulnerability: The system could be made to crash or run programs as an administrator. ID: CVE-2024–56653
    Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7489–1: Linux kernel vulnerability: The system could be made to crash under certain conditions.
    IDs: CVE-2025–21813
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS

  • USN-7486–1: FastCGI vulnerability: FastCGI could be made to crash or execute arbitrary code.
    IDs: CVE-2025–23016
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS

  • USN-7485–1: LibRaw vulnerabilities: LibRaw could be made to crash if it received specially crafted input.
    IDs: CVE-2025–43961, CVE-2025–43964, CVE-2025–43962, and 1 other
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7484–1: OpenJDK 24 vulnerabilities: Several security issues were fixed in OpenJDK 24.
    IDs: CVE-2025–30691, CVE-2025–30698, CVE-2025–21587
    Affects: Ubuntu 25.04, Ubuntu 24.10

  • USN-7483–1: OpenJDK 21 vulnerabilities: Several security issues were fixed in OpenJDK 21.
    IDs: CVE-2025–30691, CVE-2025–30698, CVE-2025–21587
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7482–1: OpenJDK 17 vulnerabilities: Several security issues were fixed in OpenJDK 17.
    IDs: CVE-2025–30691, CVE-2025–30698, CVE-2025–21587
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM

  • USN-7481–1: OpenJDK 11 vulnerabilities: Several security issues were fixed in OpenJDK 11.
    IDs: CVE-2025–30698, CVE-2025–21587, CVE-2025–30691
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM

  • USN-7480–1: OpenJDK 8 vulnerabilities: Several security issues were fixed in OpenJDK 8.
    IDs: CVE-2025–30698, CVE-2025–21587, CVE-2025–30691
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM, Ubuntu 16.04 ESM

  • USN-7479–1: MySQL vulnerabilities: Several security issues were fixed in MySQL.
    IDs: CVE-2025–30722, CVE-2025–30689, CVE-2025–21579, and 24 others
    Affects: Ubuntu 25.04, Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7476–1: Scrapy vulnerabilities: Several security issues were fixed in python-scrapy.
    IDs: CVE-2024–3574, CVE-2024–1892, CVE-2024–1968, and 3 others
    Affects: Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM, Ubuntu 18.04 ESM

  • USN-7478–1: Corosync vulnerability: Corosync could be made to crash if it received specially crafted network traffic.
    IDs: CVE-2025–30472
    Affects: Ubuntu 24.10, Ubuntu 24.04 LTS, Ubuntu 22.04 LTS, Ubuntu 20.04 ESM

  • USN-7477–1: c-ares vulnerability: c-ares could be made to crash if it received specially crafted network traffic.
    IDs: CVE-2025–31498
    Affects: Ubuntu 25.04, Ubuntu 24.10

  • USN-7475–1: Linux kernel (Xilinx ZynqMP) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2022–0995, CVE-2024–56658, CVE-2025–21993, and 13 others
    Affects: Ubuntu 22.04 LTS

  • USN-7461–3: Linux kernel (Xilinx ZynqMP) vulnerabilities: Several security issues were fixed in the Linux kernel.
    IDs: CVE-2024–53237, CVE-2021–47119, CVE-2024–56651, and 8 others
    Affects: Ubuntu 20.04 ESM

Service & Support

Welcome to TUXEDO Support - how can we help you?

Linux at TUXEDO

Are you wondering if Linux is right for you? Our team will be happy to answer your questions and explain details about the free operating system at TUXEDO.
Let the advantages and services convince you!

Hardware

Notebook, PC, both - and which model? Our technical service team also provides advice on selection, equipment and puts together suitable offers for your technical requirements.

Questions and Answers

Frequently asked questions and the corresponding answers can be found here. If you cannot find a solution to your problem here, it is also worth taking a look at the instructions section.


Find out more

Instructions and Tips

Most situations can be solved quickly and easily by yourself. This saves you time and you can use your device directly again. We provide you with instructions, first steps and short tips for all TUXEDO models.


Find out more

System Recovery

Even in the case of a case, you don't have to rely on us: Your device can be reset to the factory settings - completely automatically! Everything is included with your order and you can get started right away.


Find out more

Technical Service

Our competent technicians are also happy to help with service requests. You have different possibilities to contact us. We are personally there for you Monday to Friday from 9 am to 1 pm and from 2 pm to 5 pm. But also outside these times, you can contact our team with your request by e-mail.
An extra function is available in your customer account for repair requests (RMA).

 

Contact

We are personally there for you Monday to Friday from 9 am to 1 pm and from 2 pm to 5 pm (German time). But also outside these times you can contact our team with your request by e-mail. Please include your customer number, the model name of your laptop or PC and as detailed a description of your request as possible. The more details you give us, the faster we can process your request!

We might not be able to answer questions about third party hardware or software. For questions about popular open source software (Thunderbird, Filezilla...) please contact a forum e.g. ubuntuforums.org. The research effort for application specific setup is immense and not manageable at the current time. Basic compatibility questions e.g. are of course still welcome!

An extra function is available in your customer account for repair requests (RMA).

 

Image of Tux

Linux compatible
image of 5 years warranty badge

Up to 5 Years Warranty
stylized image of a Rocket

Immediately ready for use
image of germany with a wrench in the center

Assembled in Germany
image of germany with a section sign in the center

German Data Privacy
stylized image of a tech support worker

German Tech Support

Guidance

  • Service & Support
  • B2B


Mo - Fr: 9-13 & 14-17h
+49 (0) 821 / 8998 2992

About TUXEDO

  • Why TUXEDO
  • TUXEDO Control Center
  • TUXEDO Tomte
  • TUXEDO WebFAI
  • TUXEDO OS
  • TUXEDO Aquaris
  • Individual logos and keyboards

Help & Support

  • Downloads & Drivers
  • System Diagnostics
  • Frequent questions (FAQ)
  • Instructions
  • Help with my device
  • Revocation right
  • Shipping costs & delivery times
  • Payment methods

News & more

  • News & Blog
  • Press
  • Newsletter
  • Event Calendar
  • Jobs & Career
  • Sponsoring

Community


Your Linux specialist since 2004

  • Accessibility
  • Privacy policy
  • Imprint
  • Battery disposal
  • Conditions of Use

Shipping costs & delivery times

We ship your order to almost all countries, in Europe mostly even free of charge! The respective shipping costs and the cost threshold above which we will cover the costs for you can be found here or for international shipping in the table below.

 


Free shipping within Germany

There are no shipping costs within Germany for goods worth €100 or more.

 

7.99 € shipping cost at max!

No matter how many small articles you order, such as USB stick card reader, LAN adapters or fan articles, with us, you pay a maximum of 7.99 € shipping costs.

  • 7.99 € shipping fee for all orders below 100 € of goods
  • Free shipping from 100 € total value of goods

You can check all occurring shipping costs or if we even deliver for free right before sending your order!

 


International delivery

Here are the shipping costs as well as the amount threshold for your order. The threshold is referring to the total amount of your order, which enables free shipping.
 

Taxes and customs outside the EU:

For orders outside the EU there might be additional duties, taxes or charges needed to be paid by the customer. These don't have to be paid to the supplier, but to local authorities. Please check for any details with your local customs or tax authorities before ordering! But as a benefit you don't have to pay German taxes, this means you save up to 19%!
Due to the Brexit and the associated changes, there may be delays of several days in customs clearance on site for deliveries to the UK. This is not within our sphere of influence, so we ask for your understanding.

 

 
⚠️   Countries to which we unfortunately cannot ship, and information on how you can still order from us, can be found here!
Country Shipping Fee Free Shipping From
Albania 99,00 EUR -
Andorra 59,00 EUR -
Belarus Temporarily no delivery possible 59,00 EUR -
Belgium 8,49 EUR 100 EUR
Bulgaria 15,99 EUR 160 EUR
Denmark 8,49 EUR 100 EUR
Estonia 15,99 EUR 160 EUR
Faroe Islands 129,00 EUR -
Finland 14,99 EUR 150 EUR
France 9,99 EUR 120 EUR
Greece 22,90 EUR -
United Kingdom 9,99 EUR 120 EUR
Hong Kong 199,00 EUR -
India 199,00 EUR -
Ireland 14,99 EUR 150 EUR
Island 129,00 EUR -
Italy 9,99 EUR 120 EUR
Japan 99,00 EUR -
Canada 99,00 EUR -
Croatia 34,90 EUR 500 EUR
Latvia 15,99 EUR 160 EUR
Lithuania 15,99 EUR 160 EUR
Luxembourg 8,49 EUR 100 EUR
Macau 199,00 EUR -
Malta 34,90 EUR 500 EUR
Macedonia 59,00 EUR -
Moldova 199,00 EUR -
Monaco 19,00 EUR -
Montenegro 99,00 EUR -
Netherlands 8,49 EUR 100 EUR
Norway 14,99 EUR 150 EUR
Austria 8,49 EUR 100 EUR
Poland 15,99 EUR 160 EUR
Portugal 14,99 EUR 150 EUR
Romania 15,99 EUR 160 EUR
San Marino 9,99 EUR 120 EUR
Sweden 14,99 EUR 150 EUR
Switzerland 13,99 EUR 150 EUR
Serbia 34,90 EUR 500 EUR
Singapore 199,00 EUR -
Slovakia 15,99 EUR 160 EUR
Slovenia 15,99 EUR 160 EUR
Spain (without Canary Islands) 14,99 EUR 150 EUR
Czech Republic 15,99 EUR 160 EUR
Ukraine Temporarily no delivery possible 129,00 EUR -
Hungary 15,99 EUR 160 EUR
USA including Hawaii 99,00 EUR -
United Arabic Emirates 199,00 EUR -
Cyprus 34,90 EUR 500 EUR
Qatar 199,00 EUR -
⚠️ Countries to which we unfortunately cannot ship, and information on how you can still order from us, can be found here!

 


Time of delivery

If not stated differently in the article's description, we deliver goods in:

  • 7-10 working days within Germany
  • 10-12 working days outside Germany

For orders paid in advance, the delivery time starts with receipt of the payment. Please keep in mind that there is no delivery on Sundays or on holidays.
For goods delivered as download, there will be no shipping fees due.
Access data for downloads are sent out via e-mail 1-3 working days after contract formation. For orders with advanced payment, we will deliver after receiving the payment. You can download the item by using the link sent to you via e-mail.

Self-pick-up of orders is not possible, unfortunately.