Zarafa Linux groupware server natively serves Outlook clientsNov 12, 2008
Zarafa replaces Microsoft Exchange on a Linux server and collaborates with Outlook thanks to native MAPI support.more »
IMAP Proxies Managing mail traffic with an IMAP proxyNov 05, 2008
IMAP proxies like Perdition, Imapproxy, and Cyrus Aggregator help distribute mail to multiple IMAP servers. We examine some options for IMAP proxy in the Linux evironment.more »
OpenTimetool, a GPL-licensed project time recording tool is now available in version 2.2.2. A new module is ready for mobile phones and PDAs.more »
The Gutenprint project develops filters for the Common UNIX Printing System (CUPS) to operate with a range of commercial printers. Gutenprint 5.2.1 is now available with numerous changes and improvements.more »
In a recent report of the European Union's IDABC agency, numerous software tenders in Europe run against regulations in that they favor proprietary software. If it were up to the IDABC, the tendering organizations would be liable for these practices.more »
Information Appliance Associates have started a beta test program of a synchronization tool for Linux and Blackberry.more »
Sun Microsystems provides its own solution for identity management called OpenSSO. The software is available free as Open Source and becomes a Sun product with added support and services.more »
As an original founder of Open Source, Richard Stallman cautions in an interview with the British Guardian newspaper about the repercussions of cloud computing. His main objection: dependency and loss of control.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm