All presentations from the Open Source Forum at CeBIT 2012 are now available for free from the Linux Magazine video archive.more »
At the Linux New Media Awards 2012 prize giving ceremony for special achievements in the field of Linux and free software, Libre Office and Android each took two of a total of seven prizes.more »
Kernel News Hand-Picking PIDS; Massive Boot-Time Speedup; and Columns, Shmollums – the 80 characters per line dilemma.Mar 02, 2012
Chronicler Zack Brown reports on the latest news, views, dilemmas, and developments within the Linux kernel community.more »
According to Jonathan Riddell’s recent blog post, Canonical will cease funding Riddell’s development work on Kubuntu as of the 12.04 release.more »
The Linux New Media Awards are back! Organized by the publisher of Linux Magazine and Linux Pro Magazine, these awards recognize projects, organisations, people, and companies for their outstanding contributions to the Linux/FLOSS community.more »
Are you ready to assess your assets and limit your liabilities? Or maybe you just want to find out where your money goes. This month we look at Grisbi, GnuCash, and HomeBank finance managers.more »
The Open Source Forum returns to CeBIT 2012! CeBIT, the world's largest IT trade show will be held from March 6 to 10, 2012 in Hannover, Germany. As in previous years, the Forum will take place in Hall 2.more »
CeBIT welcomes open source projects to Hannover, Germany! The show organization and Linux Magazine are calling for open source projects to apply for free exhibit space at CeBIT Open Source 2012. Open source projects are provided with the opportunity to present their work to the CeBIT audience, just like commercial exhibitors.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm