Arch Linux Getting back to basics with Arch LinuxFeb 28, 2006
If you’re looking for a fast, stable system without the GUI goo, try Arch Linux.more »
Live Distro Roundup Highlights of the live Linux landscapeJan 31, 2006
Many fine live Linux distributions are waiting for you right now on the Internet. The right choice depends on what you need.more »
Plan 9 The Plan 9 network operating systemDec 31, 2005
In the eery, distant days before the birth of Linux, a strange alien system set out to fulfill the promise of Unix. Descendents of that system are still living. We caught one and dissected it.more »
Exclusive Klaus Knopper Interview The world according to Knoppix creator Klaus KnopperOct 31, 2005
Klaus Knopper still has big ideas for the little distro that has spawned many derivatives and changed the way we think of live Linux. I asked Klaus about the past, present, and future of Knoppix.more »
Practical Knoppix Expert techniques for getting more from KnoppixOct 31, 2005
Knoppix creator Klaus Knopper shares some tips for using Knoppix in the real world.more »
Suse Linux 10.0 What’s coming in Suse Linux 10.0Oct 31, 2005
Suse is still one of the most popular Linux distributions. Read on for an introduction to Novell’s new openSuse project and a sneak peak at what’s inside the next version of Suse Linux.more »
Gentoo Linux Installing and Managing Gentoo LinuxAug 31, 2005
Gentoo is a powerful and flexible Linux system that you can customize to fit perfectly into your environment. Our workshop describes how to set up Gentoo. We’ll also show you how to install and manage software on your Gentoo system with the popular Portage software management system.more »
Debian 3.1 sarge Exploring the long-awaited Debian 3.1 sargeAug 31, 2005
Debian developers coded, talked, and postponed deadlines for 35 months until Debian 3.1, alias Sarge, finally saw the light of the Linux day. The list of new features is impressive, including a new installer and many state of the art technologies.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.