A web service filesystem Building a web service filesystem with SOAP and FuseJul 02, 2008
The Fuse kernel module lets developers implement even the most idiosyncratic of filesystems. We’ll show you how to build a filesystem that relies on SOAP to publish data over web services.more »
aMSN in Linux Reaching MSN networks from Linux with aMSNJul 01, 2008
aMSN lets Linux users communicate with associates on Microsoft instant messaging networks. In this article, we'll show you how to reach out to your friends in the empire.more »
Yahoo Chat Tools Video Chat with YahooJul 01, 2008
Kopete and Gyachi bring Yahoo videochat services to Linux.more »
Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: klaus@linux-magazine. commore »
Workspace: wikiCalc Wikified approach to the spreadsheetJul 01, 2008
wikiCalc is a unique tool that offers a combination of spreadsheet functionality and wiki features. This may sound like a strange pairing, but wikiCalc provides a refreshingly new approach to the spreadsheet concept.more »
IEs4Linux Internet Explorer in Linux with IEs4LinuxJul 01, 2008
IEs4Linux lets web developers who work in Linux install Internet Explorer in just a couple of minutes to test their websites without booting Windows.more »
WS-Addressing Asynchronous delivery with WS-AddressingJun 30, 2008
WS-Addressing is a standard that enables flexible communication between web services.more »
Microformats Organizing the web with microformatsJun 20, 2008
Microformats are simple HTML tags that reveal information about web data. We'll show you how to take advantage of this handy technology.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm