The Linux kernel mailing list comprises the core of Linux development activities. Traffic volumes are immense, often reaching ten thousand messages in a given week, and keeping up to date with the entire scope of development is a virtually impossible task for one person. One of the few brave souls to take on this task is Zack Brown. Our regular monthly column keeps you abreast of the latest discussions and decisions, selected and summarized by Zack. Zack has been publishing a weekly online digest, the Kernel Traffic news letter for over five years now. Even reading Kernel Traffic alone can be a time consuming task. Linux Magazine now provides you with the quintessence of Linux Kernel activities, straight from the horse’s mouth.more »
Cloop Block device compression with the cloop moduleNov 05, 2008
The cloop module lets you manage compression at the block device level. Read on to learn how Knoppix and other Live CDs fit all that software on a single disc.more »
Userspace Drivers Userspace drivers in the new Linux kernelNov 05, 2008
New versions of the Linux kernel will support a special userspace driver
model, but some technical pitfalls might limit the use of this interesting
Linus Torvalds presents the first test candidate of Linux Kernel 2.6.28 on his mailing list.more »
The Linux Foundation got positive results from its first ever End User Summit in New York October 14 and 15. Its concept of "end user" ended up including not only private users but many enterprises and organizations.more »
Greg Kroah-Hartman, Linux developer at Novell, suggests a new naming scheme for the Kernel releases on the Kernel mailing list. The four-digit year would be included in the name.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm