A Kiwi USB Stick Creating a Live USB stick with KiwiNov 12, 2008
The Kiwi image system lets you create bootable images for a variety of purposes. We’ll show you how to use Kiwi to create a Live USB stick.more »
Charly's Column The sys admin’s daily grind: PowerTOPNov 12, 2008
Beep and power off! Large displays and faster CPUs seemingly wipe out the benefits of advances in battery technology. PowerTOP helps power hogs keep their laptops running without mains power.more »
The virtualization specialist adopted the know-how for the product through its acquisition of Trango Virtual Processorsmore »
The computer manufacturer Dell has announced a further recall of potentially dangerous notebook batteries. The recall of the Sony built batteries began in 2006.more »
After the glut of netbooks on the market, Imovio, an offshoot of U.S. company Comsciences, presents the iKit Multimedia Messenger, a palm-sized netbook with Linux.more »
OSADL, a consortium of Linux users in the automation industry, has released a realtime Linux kernel for Intel's Atom processor.more »
In the closing speech of the Linux Kongress in Hamburg, Intel's CTO Dirk Hohndel appealed to the developer community to orientate themselves more strongly on the needs of users.more »
After a few beta versions and months of news blackout, Nvidia has now released a robust version of its proprietary graphics card driver for Linux. Driver version 177.80 is to include 25 enhancements, among them the highly awaited support for GeForce GTX series cards.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm