Microsoft's current patent suit against navigation software maker TomTom has caused quite a stir in the Open Source arena and might turn into a wave of MS attacks on Linux.more »
In March (3-8, 2009), CeBIT will once again be opening its gates in Hannover, Germany. The world's largest and most renowned trade fair for the world of IT and telecommunications will be featuring Open Source topics in hall 6. The CeBIT Open Source Forum 2009 will be the venue of daily lectures on the use of Linux and free software - and you can watch them online, live and for free!more »
The GNU Project's Bourne Again Shell (bash) is now in its fourth major version, which provides numerous enhancements.more »
In his blog, "The Geek Stuff", software engineering manager Ramesh Natarajan offers tips and advice for Linux users.more »
Big Blue is now providing images for Amazon's cloud. A cloud software-as-service (SaaS) for SUSE Linux, among other products, is to follow.more »
CeBIT Open Source Project Lounge -- AllBSD FreeBSD and NetBSD -- Representing the BSD Operating SystemsFeb 10, 2009
FreeBSD and NetBSD are among the 15 projects that will present their work at CeBIT, sharing a booth and representing "Berkeley Software Distribution" operating systems. If you paid attention -- you're right, actually it's 16 projects at the Open Source Project Lounge.more »
Dag Wieers of Project Centos made a passionate plea for more private users to turn to the free Red Hat Enterprise clone, and stressed that commercial companies with non-critical machines could also benefit from Centos.more »
Virtualization specialist VMware has released a free Linux client for its VMware View desktop solution.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm