Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: klaus@linux-magazine. commore »
Bluetooth with GPRS Using your mobile phone as a wireless modemJun 09, 2008
If your mobile phone contract includes GPRS mobile Internet service,
you can use a Bluetooth phone as a wireless modem for your Linux
Chip manufacturer Intel has relaunched its development program for Linux. This time, the focus is on Wimax.more »
Open Source in Mobile Ties, T-shirts, and telephonesOct 31, 2007
OSiM, Open Source in Mobile, is a series of events dedicated to exploring the role of open source in the world of mobile phones. The latest installment was held in September in Madrid, Spain.more »
Norwegian developers Trolltech have sold out their entire inventory of Linux Greenphones. This is the end of Trolltech’s excursion into the world of hardware.more »
Mobile communications provider Vodafone has just released version 1.0 of its Mobile Connect Card Driver for Linux. The driver supports the use of GPRS, UMTS and HSDPA, as well as SMS transmissions.more »
The Software Freedom Law Center (SFLC) has approved dual licensing of the Atheros chipset driver. In an investigation, SFLC identified and resolved possible issues.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm