Want to know more about Debian Packaging, Git, Python Libraries and more? The Debian Women Project is sponsoring a series of online learning sessions on those topics.more »
Wikipedia Founder, Jimmy Wales, appeals to users for donations.more »
Speakers will be notified about their accepted talks by December 27.more »
For the third consecutive year, CeBIT Open Source invites projects to Hannover, Germany. The conference organizers and Linux Pro Magazine invite open source projects to apply for free exhibit space at CeBIT Open Source 2011.more »
Doghouse: Hack and Beer in Rio maddog goes to Rio for “Hack and Beer” and learns to appreciate the journey.Oct 26, 2010
The little boy behind me was really excited about his first airplane trip. When the plane started to take off, he gave a very loud countdown to “blast off!” It was refreshing to hear that much enthusiasm, particularly because air travel has become a “magic elevator” for me. The doors close in one location and open in another, but I have little excitement in the journey, only the destination.more »
Community Notebook Mentorship projects gear up for matchmakingOct 25, 2010
In our September issue, I wrote about mentors – specifically, how someone could find one.more »
Linux Magazine DVD Inlay The Complete Linux Magazine Archive!Sep 29, 2010
The complete history of Linux Magazine on DVD!more »
Special 10-year anniversary DVD! The Complete Linux Magazine ArchiveSep 28, 2010
The Linux Magazine archive DVD included with this issue contains the complete history of Linux Magazine.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm