Gnome 2.24 What's new in Gnome 2.24?Dec 31, 2008
The traditional Fall release of the Gnome desktop ushers in a number of useful new features.more »
Lightweight CMS Tools Lightweight content management systemsDec 31, 2008
Would you like a content management system that's actually easy to manage? We take a closer look at some user-friendly CMS solutions, including Pluck, SkyBlueCanvas, and NanoCMS.more »
Cobbler Automated installation with the Cobbler provisioning toolDec 31, 2008
Cobbler helps you install new systems in a hurry. We'll show you how to use this nifty shoemaker to deploy Xen and VMware virtual machines.more »
More than 14,000 users participated in this year's Linux graphics survey from Phoronix. The results of the study are now out.more »
The OpenSolaris project has issued its second solid release with the Live CD 2008.11, which integrates subprojects such as the installer and package manager.more »
Universal Plug and Play Exploring the Universal Plug and Play ArchitectureNov 30, 2008
Universal Plug and Play provides an easy framework for seamless integration of network devices. Learn how to build your own UPnP solution using the open source BRisa framework.more »
Six months after Fedora 9, the free project is now releasing its newest version 10 of the popular Linux distribution, code-named Cambridge.more »
Software called ArisID should allow developers to write protocol-independent applications that automatically incorporate identity management standards. The overall goal is to protect user data in a dependable and secure manner.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm