For two years now Novell and Microsoft have been playing with the idea of interoperability between Linux and Windows. They hope to strengthen their partnership further through their announcement of the Advanced Management Pack for System Center Operations Manager 2007 R2 and a beta of the Moonlight Firefox rich media plug-in.more »
Market research firm Gartner discovered that most of the almost 300 organizations it surveyed employed Open Source software in one way or another, but that a general license enforcement policy was missing.more »
Open source developer Tobias Oetiker, in his presentation at the USENIX LISA conference in San Diego, described how he could help one thousand Windows users at Swisscom.com speed up their computers.more »
Puppet Manipulating your machines with PuppetNov 12, 2008
Learn how to save time and streamline your system administration with the help of Puppet, a centralized configuration management tool.more »
Custom NimbleX Building a custom Linux with the NimbleX Live CD GeneratorNov 12, 2008
If you want customization without all the fuss, then try building your own custom ISO image with the web-based Custom NimbleX Live CD Generator.more »
Linux From Scratch Creating a customized Linux with Linux From ScratchNov 12, 2008
Linux From Scratch helps you create a custom Linux system with everything you need and nothing more. And as you build your system, you’ll get an insider’s look at how Linux really works.more »
Command Line: Using udev Using udevNov 12, 2008
Learn how to create your own udev rules and deploy command-line tools to monitor and control udev events to clear your way through the Linux device jungle.more »
Workspace: Funambol Open source syncing, simplifiedNov 12, 2008
Keeping contact and calendar data in sync across devices and applications is not a new problem, but it is still a problem. Funambol offers an open source syncing solution.more »
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems