Charly's Column: LUG Camp Tschierv The sys admin’s daily grind: LUG Camp TschiervAug 03, 2011
He nearly missed this year’s LUG Camp, but what was columnist Charly supposed to do instead – celebrate Father’s Day?more »
The Linux Foundation's first LinuxCon Europe, co-located with the Kernel Summit, will be held October 26-28 in Prague, Czech Republic. LinuxCon Europe and the Embedded Linux Conference call for participation ends next week.more »
First DefCon Kids event to be co-located with DefCon 19 in August.more »
Watch Live streaming from O'Reilly's Velocity conference June 15-16 right here!more »
The 2011 openSUSE Conference, which will be held in Nuremberg in September, announced its call for papers. Talk proposals will be accepted until July 11th.more »
At this week's Berlin LinuxTag 2011, event cooridinator Nils Magnus discusses the increasing professionalism of the open source community.more »
Lubuntu now officially supported Ubuntu derivative.more »
The Budapest Ubuntu Developer Summit (UDS-O) kicked off on Monday, May 9, at the Corinthia Hotel. "Accessibility is one of our core values as a project," Canonical founder Mark Shuttleworth said in his keynote address, as he acknowledged the Unity documentation team contributions to the 11.04 release. After briefly looking back at the "Natty Narwhal" Ubuntu release, Shuttleworth set his sights on the upcoming release, saying, "Our goal, our mission is 200-million Ubuntu users in four years."more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm