Analyst George Weiss claims that no new applications will be developed exclusively for proprietary Unix after 2009.more »
Linux distributor Red Hat has reported increased turnover and profits in its interim report for the second quarter. The company mainly owes these promising figures to its Linux business.more »
Linux Beer Hike Hiking and hacking on CreteSep 26, 2007
Wireless Sirtaki, synchronized penguin swimming, bottle cap diving in the pool – only a few disciplines that were part of the annual Linux Beer Hike, aka “Linux Bier Wanderung.”more »
LinuxWorld San Francisco Projections and reflections from the San Francisco LinuxWorldSep 26, 2007
Virtual visions brought vigor to the San Francisco LinuxWorld. This year's gala featured data centers, super heros, and our very own Linux Pro Magazine booth.more »
LinuxConf Europe Conference in CambridgeSep 26, 2007
In early September, about 250 developers from the Linux kernel and related projects gathered in Cambridge, United Kingdom, to discuss their work and look to the future.more »
The Debian project secretariat can call Debian developers to vote via Article 5.2 of the Debian Constitution. The aim is to shorten the Project Leader election and to become more communicative.more »
The 100 dollar laptop, which was designed for use in structurally underdeveloped areas, is available to the general public for a limited period, bundled with a sponsored machine for a child in need.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm