A few RPM developers from Red Hat and Novell met at the openSUSE Conference 2009 in September. The results of the meeting are now online.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Development of the next Kernel 2.6.31 has just begun, which leaves Linus Torvalds some time for blogging again. He's apparently in good spirits, at least as to the current source code management.more »
A Taste of Yum Exploring the yum package managerMay 31, 2009
Install and manage packages from the command line with the powerful yum package manager.more »
Likewise Easy Active Directory integration with Likewise OpenNov 30, 2008
Likewise Open provides smooth integration with Active Directory environments. We show you how to install and configure the admin-friendly authentication system.more »
Workspace: Subversion Document versioning with Subversion and OOoSVNJun 30, 2008
Even if you are not a programmer, you’ve probably heard of Subversion, a powerful tool for managing changes to software projects. Although Subversion is designed primarily for software developers, it can be useful to mere mortals as well.more »
Clients for Linspire's Click'n-Run Warehouse exist for Ubuntu, Freespire, and of course Linspire. Now, the Ubuntu derivative Linux Mint joins the ranks of supported Linux distributions.more »
The Debian Installer team has just released the first beta version of its installer for the next Debian release, Lenny.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm