Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Unetbootin Installing distros on USB sticks with UnetbootinJul 31, 2009
Unetbootin lets users set up almost any distribution on a bootable USB stick.more »
Charly's Column The sys admin's daily grind: TTYtterJul 31, 2009
Twitter, so everyone says, is modern, fun, sociologically illuminating and otherwise useless. Even Charly feeds a budgie – but at the console, it's a question of style.more »
Workspace: Tonido Serves you rightJul 31, 2009
This cloud-in-a-box serves up shared space for a jukebox, photos, blogs, file sharing, workspace apps, and more.more »
Peek presents the community a challenge to get Linux running on their small handhelds, without much fanfare.more »
KDE developers ported the recipe management function in the transition from KDE 3 to 4. Amateur chefs can now consume the new version, although the meal isn't quite cooked to perfection, it still being in an alpha state.more »
"Where are the notes I took online while at the library Tuesday night?" A question such as this might be best answered by the likes of GNOME Zeitgeist.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.