The managelogs program manages the Apache Web server generated log files. For version 2.0.0 the developers made some changes to the build.more »
The leader of the Gnome accessibility team, Will Walker, has until now worked for the Accessibility Program Office from Sun, which after the Oracle take-over melted into the relevant APO at Oracle.more »
Command line downloader Curl and its Libcurl library are available in version 7.20.0 with expanded protocol support.more »
Inventory management software Tellu has been completely reworked and is now available in version 3.0.0.more »
Linus Torvalds's foundation is doing a sequel this year of its creative community ad campaign for Linux with a second video contest. The winner will receive a laptop loaded with Linux and a trip to LinuxCon in Boston in August.more »
At FOSDEM 2010 in Brussels, software that was declared dead was resurrected (Hurd), known combatants sat down at the same table (openSUSE, Fedora and Debian) and almost forgotten entities raised their hands again (openSUSE for PowerPC).more »
CeBIT Open Source Project Lounge -- OSADL OSADL -- Open Source Automation Development LabFeb 09, 2010
The Open Source Automation Development Lab (OSADL) is among the 15 projects presenting their work in Hanover, Germany, enabling the Linux kernel for real-time Ethernet.more »
Spanish company eBox Technologies has released version 1.4 of its Linux server for small to medium sized enterprises.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm