YaST Managing your system with YaSTAug 18, 2008
One of the highlights of openSUSE is YaST, the Swiss Army knife of configuration tools for Linux. YaST will help you with everything from managing hardware to configuring users.more »
After You Install What to do after you install openSUSEAug 18, 2008
After you finish installing openSUSE, you can start by preparing your system with these simple steps.more »
Fifteen years ago, on Saturday the 16th of August, 1993, Ian Murdock wrote an email to the comp.os.linux.development newsgroup , announcing his upcoming Debian Linux Release.more »
The developers were criticized for KDE 4.0. At the time, they pointed to KDE 4.1 – and it turns out they were right. The new version is far more stable and mature.more »
Version 2.23.5 of the Gnome Linux desktop gives a preview of version 2.24, which is scheduled for release in September.more »
At first, plans for Gtk+ 3 were considered unnecessary – the developers themselves considered the 2.x version mature enough – now, some developers are toying with the idea of developing Gtk+ 3. Gnome founder Miguel de Icaza comments on and criticizes the developments in his blog.more »
KDE e.V. and the GNOME Foundation will be holding their annual Akademy and GUADEC conferences jointly next year in Gran Canaria.more »
The developers of the Gnome desktop environment have denied the necessity of Gnome version 3.0, but now things are happening. Initial plans for a 3.0 release were revealed at the Gnome developer conference, Guadec, along with details of Gtk+ 3.0.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm