Cover Intro: Kernel Tricks Promising projects from the Linux kernel communityNov 28, 2007
Developers are constantly looking for new ways to interact with the versatile Linux kernel. We study some innovative projects leading deep into kernel space.more »
Talking in an interview with InformationWeek Linus Torvalds revealed what features and functions we can look forward to from the Linux kernel in the near future, what direction development will take, and what his views are on the continual accusations by Microsoft.more »
Cliff Biffle, a US blogger, accuses Asus of infringements against the GPL with the software on ist Eee PC.more »
Back at the Kernel Summit in September Andi Kleen announced that he would no longer be maintaining the i386 and x86_64 branches if they were merged in the new x86 branch. A new patch shows that Kleen has kept his promise.more »
With numerous new drivers and functions and a whole bunch of improvements Linus Torvalds released the new 2.6.23 version of the Linux kernel in the early hours of Wednesday morning.more »
In a post on the Linux Kernel mailing list, Thomas Gleixner claims to have fixed ACPI suspend and resume problems. Linus Torvalds praised him for doing so, but also has his doubts.more »
Version 126.96.36.199 DKMS (Dynamic Kernel Module Support), a framework that facilitates the installation of Linux drivers, has just been released. Besides bugfixes the new release includes a method for creating Debian driver packages.more »
The smallest kernel, put together thanks to a collection of patches by the Linux-tiny project, weighs in at just 197KB. After two years of inactivity, maintainers Michael Opdenacker and other developers are looking to breath new life into the project.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm