Linus Torvalds, Ted Ts'o, Alan Cox, Ingo Molnar, Andrew Morton and other Linux kernel developers are embroiled in a contentious discussion over the sense -- or nonsense -- of journaling and delayed allocation before a commit in the ext3 and ext4 filesystems. Heavy words are flying.more »
Wicd Network Manager Easy network access with WicdMar 29, 2009
Mobile users change networks in rapid succession. Wicd quickly and conveniently manages the corresponding profiles.more »
Nagios Traffic Light Adding a homebuilt warning light to your data centerMar 29, 2009
A clever combination of Nagios and a doityourself traffic lights lets you know how your network is feeling.more »
A botnet named psyb0t has been nesting for a few months in consumer devices that run on Linux with MIPS CPUs, notably routers. Infested devices connect through a botnet over a private Internet Relay Chat (IRC) server to await commands.more »
Novell announced today that SUSE Linux Enterprise Server (SLES) is officially out in version 11. The SLES extensions for Mono and the desktop version SLED 11 should also concurrently hit the market. A high-availability extension is to follow.more »
Rumors of a Red Hat takeover have been circulating since time immemorial. Maybe this time there's some truth to it.more »
Kernel 2.6.29 has arrived and brings with it a string of new features. We're presenting some of them and describe what to make of them.more »
As of this summer, Sun Microsystems will provide storage and computing resources for cloud computing. They intend to open up the APIs with a public review process.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm