Doghouse: Meet the maddog Jon 'maddog' Hall writes about the communityAug 31, 2008
Jon 'maddog' Hall introduces himself and rolls out the first installment in his new monthly community-focused column.more »
PHP CLI Tips and Tricks PHPWomen Contest WinnerAug 19, 2008
PHPWomen.org recently held an article-writing contest on their Best Practices Forum. Authors of the two winning submissions each received copies of Zend Studio for Eclipse, a 1-year subscription to Linux Pro Magazine (which is called Linux Magazine outside North America), and the opportunity to feature their articles on the magazine websites. Congratulations goes to Gerard Sychay for his winning submission!more »
Our roving camera makes another stop at the LinuxWorld .org pavillion for a talk with the team from Infiscale, where we learned about some open source clustering solutions.more »
Joe Casad talks to Fedora Community Manager Karsten Wade.more »
Linux Pro Magazine's Editor in Chief, Joe Casad, sat down with Ubuntu's Community Manager, Jono Bacon, at this week's LinuxWorld in San Francisco.more »
Linux Pro Magazine's Editor in Chief, Joe Casad meets Joe "Zonker" Brockmeier at LinuxWorld in San Franciscomore »
Daniel Phillips has relaunched his Tux filesystem. After Tux2 failed due to patenting issues eight years ago, Phillips has now invited developers to collaborate on Tux3.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm