In an announcement at Linuxworld in San Francisco, Palm stated that it will be using the Wind River Linux platform for development based on the recently launched Foleo Linux device.more »
Bluetooth Hacks Exploring the secrets of Bluetooth in LinuxJul 01, 2007
The user rules in Linux – if you know where you’re going. This month the trail leads deep into the Linux Bluetooth stack.more »
Wlassistant Wlassistant helps you attach to a WLANDec 01, 2005
Laptop users who move among wireless networks need a simple and practical means for getting connected. A KDE tool titled Wlassistant helps you find the signal.more »
SCPM Managing network configurations with Suse’s SCPMSep 01, 2005
SCPM lets you switch your network configuration when your portable moves to a different network. Read on to learn more about deploying the SCPM profile manager with Suse Linux.more »
Hotspotter Attacks on wireless clientsJul 01, 2005
Security experts are always concerned with WLAN access points, but they sometimes forget that the client is also open to attack. Public hotspots make it quite easy for attackers to hijack connections, as the Hotspotter tool demonstrates.more »
Security Intro Knowing the ways of the enemyJul 01, 2005
Radius and 802.1X Securing Network Access with 802.1X, Radius, and LDAPMar 01, 2005
The Radius protocol is typically used to authenticate users in dial-up scenarios. But Radius is also useful in LAN environments: in combination with 802.1X, Radius forces users to authenticate at a low level before the switch opens up a port.more »
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.