Free Software Projects An up-to-date look at free software and its makersFeb 28, 2006
This month, we examine two Gnome programs: Tomboy gives users Wiki-style notepad management, and Searchparty helps Google users find people with similar interests. We’ll also report on WW2D and the Debian-Private mailing list.more »
Linux New Media Awards 2005 Linux New Media Awards 2005Jan 31, 2006
Linux New Media put together an international jury to recognize outstanding contributions to Open Source. We’ll tell you who brought home the prizes when the 2005 Linux New Media awards were presented at Linux World Frankfurt.more »
Community Notes Community NotesJan 31, 2006
Free Software Projects An up-to-date look at free software and its makersJan 31, 2006
Create virtual 3D worlds with Worldforge, and launch Windows programs with the Wine-derived ReactOS.more »
Life in the LUGs Letters from the Linux communityDec 31, 2005
Jon Masters begins a worthy chronicle of the global Linux community.more »
Free Software Projects An up-to-date look at free software and its makersDec 31, 2005
Free software covers such a diverse range of utilities, applications, and projects, that it can be hard to find the perfect tool. We pick the best of the bunch. This month we examine Bluefish, Bidwatcher, KWappen, Capi4BSD, and current events at the Debian project.more »
LinuxWorld UK LinuxWorld Expo UK 2005Nov 30, 2005
The 2005 LinuxWorld UK Expo was another great success for the growing LinuxWorld franchise.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm