The Compiz project has just released the first developer version of its 3D window manager after the reunion with Beryl.more »
The Electronics Corporation of Tamil Nadu (ELCOT) will be installing Suse Linux Enterprise on 30,000 desktops and 1880 servers at schools in the southern Indian state.more »
While the KDE Team is busy working on version 4, more and more Linux desktop applications and interfaces keep on appearing. Kcall 0.7 and Decibel 0.5 bring integrated desktop software for Computer Telephony Integration (CTI), VoIP and real-time messaging to KDE.more »
Kontact, the KDE project's Personal Information Manager (PIM) is making progress en route to becoming a complete Groupware client.more »
Red Hat Global Desktop, which was developed for use in developing countries, will not be ready for release in August as planned. A new release date has not been published as yet.more »
Debian's Release Team has just dispatched an initial circular on the current status of the next Debian version and release targets.more »
Google Earth Exploring Google Earth in LinuxJul 31, 2007
Google Earth lets you view the world from space and zoom in on towns, roads, and even buildings. We’ll show you how to travel the planet from your Linux desktop.more »
Gnome 2.18 Updates and Improvements in Gnome 2.18Jul 31, 2007
Gnome 2.18 appears exactly six months after the last stable release. The developers have focused on stability, but you’ll also find some new and improved tools.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm