Red Hat's David Airlie reports in his blog that a simple hack allowed him to develop an X server without root privileges in the course of just one afternoon.more »
The current Ubuntu version is less than a month old, but Mark Shuttleworth has already published plans for the future version in his blog.more »
Long-standing Debian developer and former Project Leader Anthony Towns has said that he is withdrawing from current projects. The reasons seem to be a disagreement on distribution of tasks within the free Linux distribution.more »
SCALE 6x SCALE 6x: Women in Open Source ConferenceApr 30, 2008
In February, Linux and open source enthusiasts met in southern California for SCALE 6x. The conference kicked off with a day of "Friday Special Events," including a Women in Open Source conference.more »
Andrew Morton, the Linux Kernel 2.6 maintainer announced last week at the Embedded Linux Conference in Mountain View that he is looking for an architecture-independent embedded specialist.more »
Linus Torvalds has released the new 2.6.25 kernel just slightly behind schedule. Besides improvements to the CFS scheduler and a plethora of new drivers, the kernel also introduces a political aspect: it debars non-GPLd USB drivers.more »
The results of the election are confirmed: Debian veteran Steve McIntyre has won the Debian Project Leader (DPL) election in the third round of voting.more »
Klaus Knopper has released version 5.3.1 of his live Knoppix system. The codebase comes courtesy of Lenny, the next generation Debian.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm