Want to know more about Debian Packaging, Git, Python Libraries and more? The Debian Women Project is sponsoring a series of online learning sessions on those topics.more »
Wikipedia Founder, Jimmy Wales, appeals to users for donations.more »
Speakers will be notified about their accepted talks by December 27.more »
For the third consecutive year, CeBIT Open Source invites projects to Hannover, Germany. The conference organizers and Linux Pro Magazine invite open source projects to apply for free exhibit space at CeBIT Open Source 2011.more »
Doghouse: Hack and Beer in Rio maddog goes to Rio for “Hack and Beer” and learns to appreciate the journey.Oct 26, 2010
The little boy behind me was really excited about his first airplane trip. When the plane started to take off, he gave a very loud countdown to “blast off!” It was refreshing to hear that much enthusiasm, particularly because air travel has become a “magic elevator” for me. The doors close in one location and open in another, but I have little excitement in the journey, only the destination.more »
Community Notebook Mentorship projects gear up for matchmakingOct 25, 2010
In our September issue, I wrote about mentors – specifically, how someone could find one.more »
Linux Magazine DVD Inlay The Complete Linux Magazine Archive!Sep 29, 2010
The complete history of Linux Magazine on DVD!more »
Special 10-year anniversary DVD! The Complete Linux Magazine ArchiveSep 28, 2010
The Linux Magazine archive DVD included with this issue contains the complete history of Linux Magazine.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.