The Openmoko project, developers of an open source mobile phone platform, has recently pulled its download site offline due to a patent dispute.more »
In one fell swoop and with an automatically distributed patch, Google and T-Mobile fixed a problem with the G1 mobile phone whereby users could access root privileges and possibly raise all kinds of havoc.more »
Open source developer Tobias Oetiker, in his presentation at the USENIX LISA conference in San Diego, described how he could help one thousand Windows users at Swisscom.com speed up their computers.more »
Computer vendor Transtec has actualized its Calleo 330 server series on the new 45-nonometer Opterons from AMD. All Calleos now come with SUSE Linux Enterprise Server (SLES) 10.more »
Charly's Column The sys admin’s daily grind: Netstat-natNov 12, 2008
Without Network Address Translation (NAT) on many LANs, the IPv4 Internet address space would have been exhausted years ago. Still, it’s probably a good idea to check what comes through your NAT connections.more »
Box Backup Backing up for portables with Box BackupNov 12, 2008
The Box Backup network backup tool is a simple and secure solution for traveling clients. We'll show you how to get started with this open source tool.more »
Nmap Scripting Automated penetration testing with Nmap’s new scripting engineNov 12, 2008
Nmap is rolling out a new scripting engine to automatically investigate vulnerabilities that turn up in a security scan. We’ll show you how to protect your network with Nmap and NSE.more »
IMAP Proxies Managing mail traffic with an IMAP proxyNov 05, 2008
IMAP proxies like Perdition, Imapproxy, and Cyrus Aggregator help distribute mail to multiple IMAP servers. We examine some options for IMAP proxy in the Linux evironment.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.