Resetting Passwords with SystemRescueCd Resetting passwords with a Live Linux systemJun 21, 2012
If you’re locked out of your Linux or Windows system, a handy Live Linux troubleshooting distro might be all you need to get back in. We’ll show you how to pick the lock with SystemRescueCd.more »
Dell and Red Hat Launch OEM Solutions group for integrated hardware/software solutions.more »
As you will see if you read our news, Hewlett Packard, which everyone calls HP, was big this month. The computer giant announced some sweeping changes, including sweeping changes to undo the sweeping changes they announced a few months ago.more »
Free Software Projects Programmable Blinky Lights, DIY Desktop Fab and 3D Printing, Arduino BoardsMay 23, 2011
Free/Open Source isn’t just about software, it’s also about hardware. Open hardware projects are proliferating, and just like open source software, you can get started inexpensively. Here are three projects that are fun, useful, and suitable for beginners to embedded programming, robotics, and building electronic devices.more »
Zorin announces its own commercial Linux computer called the Zorin PC and is marketing the new PC as a gateway for Windows users to move to a Linux-based system.more »
Red Hat announces IBM, Accenture, Alfresco, Cisco, HP and Intel representatives are scheduled to deliver keynotes at the seventh annual Red Hat Summit and JBoss World, May 3-6, 2011 in Boston, Massachusetts.more »
Cloud.com today announced the release of CloudStack 2.2, the latest version of its open source cloud computing platform.more »
Announced today, the open source community will be able to buy the Snowball development boards that use ST-Ericsson's AP9500 chipset and run free open source software and tools that have been optimized by Linaro.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm