During the FUDCon in Toronto, the Fedora team discussed changes to central infrastructure, among which the change to Git.more »
The SysUsage monitoring tool is available in a new version 3.0 and provides a completely reworked Web interface.more »
Debian and Ubuntu developer Julian Andres Klode has reported in his blog about the progress of his APT2 software, an alternative implementation of the Debian Advanced Packaging Tool (APT).more »
Richard Stallman's strong position against proprietary applications is butting heads with some members of the GNOME Foundation. A call to split with Stallman's GNU Project is being considered.more »
With the Simple Protocol for Independent Computing Environments (SPICE), Red Hat has put one of the components of its desktop virtualization under GPL and BSD licensing.more »
The HA technology, Distributed Replicated Block Device (DRBD), is to be merged into the official Linux kernel, probably from version 2.6.33.more »
The carrier pigeon has arrived. After almost two and a half years in development, the new version 3 of the popular Thunderbird e-mail program is now available.more »
The developers of OpenInkpot, a Linux distro for e-book readers with E Ink display, broadened the hardware support and enhanced the GUI and applications in version 0.2.more »
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.