Tails Secure Distro Amnesiac IncognitoDec 04, 2012
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.more »
Listaller Cross-platform software installationNov 26, 2012
A single uniform software installation tool for all distributions is still just a dream, but thanks to Listaller, this goal has come a little bit closer.more »
When I was thinking about ways you could rescue your system with Linux, the thought occurred to me: Why not rescue your life? Because that’s what Linux can do for you.more »
The Coming KDE An Interview with Aaron SeigoNov 05, 2012
Aaron Seigo discusses KDE’s new approach to managing change and the changes coming up in the next few years.more »
Could Mozilla’s announcement of the Boot to Gecko roadmap, along with the continued development of other web-based operating systems, make which Linux distro you’re running less important than the desktop environment?more »
SPICE Exploring Red Hat’s flavor enhancer for virtual desktopsSep 21, 2012
Red Hat peps up performance of multimedia applications on remote desktops with SPICE (Simple Protocol For Independent Computing Environments).more »
Ask Klaus! Klaus Knopper answers your Linux questionsAug 23, 2012
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: email@example.com »
Resetting Passwords with SystemRescueCd SystemRescueCdJul 30, 2012
If you’re locked out of your Linux or Windows system, a handy Live Linux troubleshooting distro might be all you need to get back in. We’ll show you how to pick the lock with SystemRescueCd.more »
Leading browser makers say no to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.
More embarrassment for Adobe's embattled multimedia tool
Mozilla’s script blocker add-on could be putting malware sites on the whitelist.