Ask Klaus! Klaus Knopper answers your Linux questionsJul 02, 2013
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
- US gov embraces open data
- Apache Cdorked.A exploit discovered
- News Bites
New Intel CEO
- FSF scolds W3C
- Torvalds releases Kernel 3.9
- Xen new LF collaboration project
- Debian 7.0“wheezy” debuts
- Windows XP most likely to be victim of attack.
Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Kernel News Zack’s Kernel NewsApr 30, 2013
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
Coping with the UEFI Boot Process New SheriffApr 07, 2013
The UEFI boot specification offers new capabilities – and new headaches if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
The new Gnome release includes privacy and sharing settings, allowing more user control over access to personal information.more »
Is Wayland the New X? Looking into the Future of Display Server ProtocolsMar 25, 2013
Display server expert Daniel Stone explains what is really happening with the future of graphical display protocols on Linux.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems