In theory, Compiz effects should not work under Enlightenment. But Elive developer Thanatermesis has now morphed Compiz and Enlightenment 17 to achieve the seemingly impossible.more »
CeBIT Open Source Project Lounge -- Blender Blender -- 3 Dimensional Software Creation SuiteFeb 05, 2009
Blender is among the 15 projects that will present their work at CeBIT, offering 3-Dimensional Software Creation for professionals.more »
CeBIT Open Source Project Lounge -- Scribus Scribus: Desktop Publishing (DTP) under LinuxFeb 03, 2009
Scribus is among the 15 projects that will present their work at CeBIT, offering an professional Desktop Publishing under Linux.more »
ATI has released the complete 3D register reference guide for Radeon 6XX/7XX chips, greatly simplifying the work of the open source Radeon HD driver projectmore »
The NVIDIA proprietary drivers for Linux are now out of beta phase and into a stable version. The new generation includes a number of new features.more »
The free GNU Image Manipulation Program (GIMP) greets the new year with bug fixes for its 2.6.x release.more »
The Compiz project, which makes a free compositing window manager, suffers from a lack of participants, direction and leadership, at least according to developer Kristian Lyngstol.more »
GIMP 2.6 New features in GIMP 2.6Dec 31, 2008
After more than eight years of planning, GIMP 2.6 finally includes the Generic Graphics Library.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm