Doghouse – Migration Migrating from Windows to LinuxMar 15, 2013
maddog looks at the progress Linux has made in the past 12 years and considers what it would take to move Windows XP users to FOSS.more »
Interview – OpenDocument Documenting the OpenDocument FormatMar 15, 2013
We talk with Jean Hollis Weber, a volunteer with ODFAuthors, the LibreOffice Documentation team, and the Friends of OpenDocument Inc.more »
Table of Contents: 150 What's inside the May 2013 issueMar 15, 2013
This month, Rasp Pi becomes a multimedia system, then we look at three great tools to create, manage, and monitor your virtual environments.more »
May 2013: DVD Inlay Issue #150Mar 15, 2013
- Zend Studio 10 Announced
- Django 1.5 Released
- Tizen 2.0 Now Available
- Ruby 2.0 Released
- White House goes on record in support of freedom to jailbreak cell phones
- News Bites
10 RHEL 6.4 Released
- Yahoo ends telecommuting,
- Canonical UDS
- LG purchases WebOS from HP
11 Passwords Passé
- FIDO alliance seeks new authentication methods
- Largest Mersenne prime discovered
Welcome EditorialMar 15, 2013
Like any self-respecting Linux journalist, I’m often predisposed to take Microsoft to task. For the record, I do manage to spread it around, with occasional reflections on Apple and Google, because I truly believe our universe has room for more than one evil empire. But Microsoft is still the easiest mark. It used to be easy to make fun of Microsoft because they were so formidable and vast. Now it is easy to make fun of them because they get it wrong so often, and it is downright amusing to see so much hype and media attention going to such inelegant products.more »
Simon Voice Control Controlling Linux with voice inputFeb 22, 2013
Simon is a sophisticated speech recognition tool with easy access to two powerful speech recognition engines, Julius and CMU Sphinx.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm