iDenfense security service reports six vulnerabilities in IBM's DB2 database.more »
A critical vulnerability has been discovered in the Rsync file synchronization tool.more »
Three new branches in Opensuse's build service provide various OpenOffice packages: stable, unstable and extras. This replaces the previous OpenOffice build service.more »
A critical vulnerability has been discovered in the Opera Web browser.more »
IP Telephony Intro Exploring VoIP in LinuxAug 15, 2007
Using a headset and a webcam to make phone calls is easy, interactive, and even free, thanks to VoIP. In this month's cover story, we'll help you choose a VoIP softphone, and we'll show you how to configure your own Asterisk exchange server.more »
IBM has now released the new version of the Lotus Notes Groupware and Collaboration Suite for Linux servers. Besides numerous enhancements and a new, Java-based architecture, the Red Hat Enterprise Linux 5 now provides a Linux distribution-based platform for the server.more »
The Compiz project has just released the first developer version of its 3D window manager after the reunion with Beryl.more »
Red Hat Linux has just released a beta version of its Red Hat Developer Studio. The developer environment, which is based on Eclipse, is targeted at facilitating the development of new applications for Red Hat solutions, and migrating existing applications.more »
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.
The Internet community officially banishes the notoriously unsafe Secure Sockets Layer protocol.