“This kind of massive collaboration is exactly what makes Linux the driving force behind today’s new technology innovations.” said Jim Zemlin, executive director at The Linux Foundation.more »
File Management Learning file management commandsFeb 28, 2011
We give you an overview of commands for moving, editing, compressing, and generally manipulating files.more »
Bash scripting Getting started with Bash scriptingFeb 28, 2011
A few scripting tricks will help you save time by automating common tasks.more »
After three years, Guile 2.0, a GNU interpreter and compiler for the Scheme programming language, is now available.more »
The North American Fedora User and Developer Conference (FUDCon) was held on Arizona State University campus in Tempe Arizona from January 29 -31, 2011 and proved to be the largest FUDCon to date with over 200 people pre-registered to attend and final attendance numbers estimated around 175 people.more »
"The decision to be open to Qt is in no way a criticism of GNOME. It’s a celebration of free software’s diversity and complexity," says Ubuntu founder, Mark Shuttleworth in his blog.more »
WANdisco, makers of Enterprise Subversion, announced its acquisition of SVNForum.org, an 20,000+ Subversion user community, today.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm