Linux Adoption Trends 2012: A Survey of Enterprise End Usersmore »
Charly’s Column: Linux Fair The sys admin’s daily grind: OpenRhineRuhrJan 03, 2012
According to Goethe, the best way to gain an education is to travel. Sys admin Charly went to Oberhausen, Germany, for the OpenRhineRuhr fair last week.more »
Comment Letter from the EditorJan 03, 2012
What's the top distro on the famous Distrowatch page hit ranking list? Not Ubuntu, OpenSUSE, or Fedora. According the Distrowatch, the hottest Linux is none other than Linux Mint – an Ubuntu-based, community-driven desktop system that is known for ease of use and efficient out-of-the-box multimedia functionality.more »
The Open Source Forum returns to CeBIT 2012! CeBIT, the world's largest IT trade show will be held from March 6 to 10, 2012 in Hannover, Germany. As in previous years, the Forum will take place in Hall 2.more »
CeBIT welcomes open source projects to Hannover, Germany! The show organization and Linux Magazine are calling for open source projects to apply for free exhibit space at CeBIT Open Source 2012. Open source projects are provided with the opportunity to present their work to the CeBIT audience, just like commercial exhibitors.more »
Canonical announces an innovative agreement to provide digital editions of ADMIN, Linux Magazine, and Ubuntu User through the Ubuntu Software Center.more »
Tux visits Tux – about 50 geeks and one huge penguin travelled south to the beautiful village of Lanersbach in Tux, Austria, to hack Linux, drink beer, and hike in the Alps.more »
Charly's Column: LUG Camp Tschierv The sys admin’s daily grind: LUG Camp TschiervAug 03, 2011
He nearly missed this year’s LUG Camp, but what was columnist Charly supposed to do instead – celebrate Father’s Day?more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm