Wine, the Windows API for Linux is moving towards the first stable version, 1.0, in its history of 15 years of development.more »
The Linux Foundation has taken a clear position on the acceptance of Microsoft's OpenXML format as an international ISO standard. The Foundation recommends that standardization committees in the countries involved in the process say "No" to the application.more »
Lean Wikis Lightweight wikis without databasesNov 30, 2006
If you are thinking about starting a wiki, and you don’t want the overhead of a full-scale, database-driven system, try these light and lean wiki wonders.more »
TiddlyWiki Exploring the TiddlyWiki personal wikiNov 30, 2006
TiddlyWiki brings the spirit of the new Internet to a tiny scale. We’ll show you how to get organized with this wiki for one.more »
Virtual Machines Intro Linux in the dawn of the virtual eraAug 31, 2006
Virtualization can save you time, money, and effort, but you’ll need to find the right tool for the task.more »
VMware ESX Server Practical virtualization with ESX ServerAug 31, 2006
Improved resource balancing, central administration, and service consolidation – you can only win with virtualization. Linux Magazine visits a communal data center for a practical look at virtualization in the workplace.more »
Xen 3 Para-virtualization in Linux with Xen 3Aug 31, 2006
The Xen virtualization system is is quickly becoming a standard feature of corporate Linux. We’ll show you how to get started with the latest version of Xen.more »
Leaftag Making metadata with LeaftagJul 31, 2006
The experimental Leaftag provides a convenient means for associating files with search categories and other metadata.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm