“This kind of massive collaboration is exactly what makes Linux the driving force behind today’s new technology innovations.” said Jim Zemlin, executive director at The Linux Foundation.more »
File Management Learning file management commandsFeb 28, 2011
We give you an overview of commands for moving, editing, compressing, and generally manipulating files.more »
Bash scripting Getting started with Bash scriptingFeb 28, 2011
A few scripting tricks will help you save time by automating common tasks.more »
After three years, Guile 2.0, a GNU interpreter and compiler for the Scheme programming language, is now available.more »
The North American Fedora User and Developer Conference (FUDCon) was held on Arizona State University campus in Tempe Arizona from January 29 -31, 2011 and proved to be the largest FUDCon to date with over 200 people pre-registered to attend and final attendance numbers estimated around 175 people.more »
"The decision to be open to Qt is in no way a criticism of GNOME. It’s a celebration of free software’s diversity and complexity," says Ubuntu founder, Mark Shuttleworth in his blog.more »
WANdisco, makers of Enterprise Subversion, announced its acquisition of SVNForum.org, an 20,000+ Subversion user community, today.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.