A critical vulnerability has been discovered in the Rsync file synchronization tool.more »
Three new branches in Opensuse's build service provide various OpenOffice packages: stable, unstable and extras. This replaces the previous OpenOffice build service.more »
A critical vulnerability has been discovered in the Opera Web browser.more »
IP Telephony Intro Exploring VoIP in LinuxAug 15, 2007
Using a headset and a webcam to make phone calls is easy, interactive, and even free, thanks to VoIP. In this month's cover story, we'll help you choose a VoIP softphone, and we'll show you how to configure your own Asterisk exchange server.more »
IBM has now released the new version of the Lotus Notes Groupware and Collaboration Suite for Linux servers. Besides numerous enhancements and a new, Java-based architecture, the Red Hat Enterprise Linux 5 now provides a Linux distribution-based platform for the server.more »
The Compiz project has just released the first developer version of its 3D window manager after the reunion with Beryl.more »
Red Hat Linux has just released a beta version of its Red Hat Developer Studio. The developer environment, which is based on Eclipse, is targeted at facilitating the development of new applications for Red Hat solutions, and migrating existing applications.more »
US corp. XenSource announces version 4 of its XenEnterprise virtualization software for Monday.more »
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.