Enterprise-ready PaaS tool brings cloud-based development to private or hybrid cloud environments.more »
January 2013: DVD Inlay Issue #146Nov 28, 2012
Table of Contents: 146 What's inside the January 2012 issueNov 26, 2012
Getting Linux and Windows 8 to work together requires just a little know-how. We help you get started.more »
On the DVD: Gnome Ubuntu Remix 12.10 and Linux Mint 13 KDE This month's DVDNov 26, 2012
Canonical’s persistent efforts to perfect the new age Unity desktop for Ubuntu Linux has gotten them in trouble with lots of long-term users, but the Ubuntu project is always quick to point out to the critics: “This is Linux. If you don’t like the desktop, change it!”more »
Ask Klaus! Klaus Knopper answers your Linux questionsNov 26, 2012
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: email@example.com »
Slax 7 features KDE4 with an assortment of pre-installed software and recovery tools.more »
Linux Small Business Server Distros Linux Small Business DistrosNov 05, 2012
Admins of small businesses who want to cover all their infrastructure requirements with a single server are the target group of small business servers. In this article, we introduce three Linux distributions that meet this requirement.more »
The Coming KDE An Interview with Aaron SeigoNov 05, 2012
Aaron Seigo discusses KDE’s new approach to managing change and the changes coming up in the next few years.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm