Security Enhanced Linux or App Armor? Linux Magazine invited two well-known personalities from Red Hat and Novell to debate the merits of their security systems.
The Xen virtualization system is is quickly becoming a standard feature of corporate Linux. We’ll show you how to get started with the latest version of Xen.
The well-known Suse configuration program Yast 2 will be helping Debian users in future. And if you are looking for a way to relax after finishing your system administration chores, check out “Battle for Wesnoth.”
My friends at the Biodiversity Research Center (http://specify software.org/In formatics) are experts in modeling the sudden changes that occur when an ecosystem is disrupted by the arrival of a new foreign species. I’m sure they don’t have a plan for modeling the Linux ecosystem, but if they did, they would also have scientific way of telling us the times they-are-a-changin’. As you probably know, the foreign species that appeared recently in the Linux ecosystem is Novell. High-tech magazines are full of commentaries describing the possible impact Novell might have on the Linux industry, but it is starting to look like the area where Novell presents the greatest mismatch for the indigenous Linux companies is in the game of brand promotion.
This column explores the world of free software from the perspective of the GNU Project and the FSF. In this issue,we focus on:The Java Trap,GNU Classpath,development in Java, and news from the FSFE.
This column looks into projects and current affairs in the world of free software from the perspective of the GNU Project and the FSF. In this issue,we focus on communication programs for mobile telephones.
Whether you are troubleshooting or just configuring for efficiency, it is a good idea to explore your options for accessing your Windows partitions from Linux.