XAMPP CeBIT Open Source 2011 - Project Presentation XAMPPJan 31, 2011
During CeBIT 2011 open source projects such as XAMPP, which enables a standard PC and MAC to become a full-featured web server, will have the opportunity to showcase what is currently in active development.more »
Atlanta trade show helps government agencies learn about open source solutions, while also helping an open source startup navigate the government contracting process.more »
Stylite GmbH announces new added features to the community version of its Egroupware with the release of version 1.8.more »
Filter Proxy for AD Virus scanner and content filter with AD authenticationJun 29, 2010
You might want to reap the benefits of active directory’s single sign-on for your virus scanning and content filtering. If you also use Squid to handle user access to the internet, you have a front-row seat for “when worlds collide.”more »
Security Blanket Scanning, fixing, and reporting security issues with Security BlanketJun 24, 2010
Trusted’s Security Blanket lets you analyze security compliance in a few easy steps.more »
Logfile Viewers Logfile viewers for the desktop and shellMay 24, 2010
While users are surfing the web, listening to music, and writing documents, the kernel and various background daemons write information to logfiles. KSystemLog, Gnome System Log Viewer, and MultiTail will help you read and process logfile data.more »
GroundWork Open Source Inc. and Eucalyptus Systems to Begin Recruiting Users for Private Cloud ProgramApr 08, 2010
Beta program to utilize new management technologymore »
The Monkey HTTP Daemon lightweight webserver for static content enters the open source arena.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm