The Google software package now contains a free version of Sun's StarOffice, the commercial variant of the free OpenOffice.org office software.more »
iDenfense security service reports six vulnerabilities in IBM's DB2 database.more »
A critical vulnerability has been discovered in the Rsync file synchronization tool.more »
Three new branches in Opensuse's build service provide various OpenOffice packages: stable, unstable and extras. This replaces the previous OpenOffice build service.more »
A critical vulnerability has been discovered in the Opera Web browser.more »
IP Telephony Intro Exploring VoIP in LinuxAug 15, 2007
Using a headset and a webcam to make phone calls is easy, interactive, and even free, thanks to VoIP. In this month's cover story, we'll help you choose a VoIP softphone, and we'll show you how to configure your own Asterisk exchange server.more »
IBM has now released the new version of the Lotus Notes Groupware and Collaboration Suite for Linux servers. Besides numerous enhancements and a new, Java-based architecture, the Red Hat Enterprise Linux 5 now provides a Linux distribution-based platform for the server.more »
The Compiz project has just released the first developer version of its 3D window manager after the reunion with Beryl.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm