In an announcement at Linuxworld in San Francisco, Palm stated that it will be using the Wind River Linux platform for development based on the recently launched Foleo Linux device.more »
Bluetooth Hacks Exploring the secrets of Bluetooth in LinuxJul 01, 2007
The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.more »
Wlassistant Wlassistant helps you attach to a WLANDec 01, 2005
Laptop users who move among wireless networks need a simple and practical means for getting connected. A KDE tool titled Wlassistant helps you find the signal.more »
SCPM Managing network configurations with Suse’s SCPMSep 01, 2005
SCPM lets you switch your network configuration when your portable moves to a different network. Read on to learn more about deploying the SCPM profile manager with Suse Linux.more »
Hotspotter Attacks on wireless clientsJul 01, 2005
Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.more »
Security Intro Knowing the ways of the enemyJul 01, 2005
Radius and 802.1X Securing Network Access with 802.1X, Radius, and LDAPMar 01, 2005
The Radius protocol is typically used to authenticate users in dial-up scenarios. But Radius is also useful in LAN environments: in combination with 802.1X, Radius forces users to authenticate at a low level before the switch opens up a port.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.