Table of Contents: 152 What's inside the July 2013 issueMay 20, 2013
We look at SharePoint integration and show you how to manage Active Directory from Linux. But first, a special story on a dangerous new class of intrusion tools.more »
- US gov embraces open data
- Apache Cdorked.A exploit discovered
- News Bites
New Intel CEO
- FSF scolds W3C
- Torvalds releases Kernel 3.9
- Xen new LF collaboration project
- Debian 7.0“wheezy” debuts
- Windows XP most likely to be victim of attack.
Richard Stallman calls for the W3C to remain independent of vendor interests.more »
Doghouse – Device Drivers Teaching how to write device driversApr 30, 2013
maddog considers the benefits of teaching students how to write device drivers.more »
- RunRev Releases Open Source Version of LiveCode
- HP Launches Moonshot Server
- Offensive Security Releases Kali Linux
- TeamViewer Version 8 for Linux Now Available
- Gnome 3.8 released
- Aereo wins battle to stream broadcast TV
openSUSE 12.3 Out
- New browser engine
- Pirates on the run
- Ubuntu reduces non‑LTS support
- OpenDaylight open source framework
- ASF promotes CloudStack
Table of Contents: 151 What's inside the June 2013 issueApr 30, 2013
The Nepomuk semantic desktop has matured with the KDE 4 series. We look at how you can use Nepomuk to structure information about the files, folders, and applications on your system. Then, discover Qt build tool Qmake, social media data mining, and the e-commerce services of eBay and Amazon.more »
Lightweight KDE Desktop Project KDE Gets a RefitApr 19, 2013
An openSUSE project called KLyDE plans to streamline the KDE desktop.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm