Almost every wireless LAN has some potential security weaknesses. The Wifislax Slackware derivative helps detect and eliminate them.more »
Qubes OS Exploring the Qubes OS secure operating systemJan 27, 2014
Most operating systems claim to be secure; however, most fail terribly. Newcomer Qubes OS tries a different approach, relying on a microkernel and pervasive virtualization.more »
New Linux distro is optimzed for gaming.more »
Latest version includes improved security, virtualization, and remote control.more »
Version 16 of the popular Linux desktop reveals new tools, edge-snapping, and performance improvements.more »
Canonical ditches Wayland for a brand new graphics stack.more »
On the DVD: Mint 15 and Debian 7 This Month's DVDJul 02, 2013
The DVD attached to this issue brings you a pair of the world’s most popular Linux distributions. Mint 15 “Olivia” is the latest release from the ever-friendly Linux Mint, a desktop distro based on Debian and Ubuntu that keeps the emphasis on simplicity and ease of use. Mint tops the DistroWatch downloads list and describes itself as: “The 4th most popular home operating system after Microsoft Windows, Apple Mac OS, and Canonical’s Ubuntu.”more »
Ask Klaus! Klaus Knopper answers your Linux questionsMay 31, 2013
Klaus Knopper is the creator of Knoppix and co-founder of LinuxTag expo. He works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.