Ubuntu promoter Mark Shuttleworth took on the traditional role of code-naming the next Ubuntu version on the Ubuntu mailing list. Version 9.04 is henceforth known as Jaunty Jackalope.more »
Free project WINE now offers the newest version (1.1.4) of its runtime environment. Among its features is better support for Google Chrome.more »
Django Video Workshop Programming with the Python Django web frameworkSep 08, 2008
The screencast is from Douglas Napoleone of the Python Software Foundation, programming a step-by-step solution for a simple database web application,more »
In response to a challenge to programming language developers set by the editors of Linux Magazine, Python Django returned with a solution that is now available as a video workshop.more »
Phoronix Media releases its version 1.2 test suite.more »
The Ubuntu Linux distribution is offering online workshops from September 1 through 5 for those who would like to jump on board the initiative.more »
OpenMP Parallel Programming with OpenMPAug 31, 2008
OpenMP brings the power of multiprocessing to your C, C++, and Fortran programs.more »
Recursion PHPWomen Contest WinnerAug 25, 2008
PHPWomen.org recently held an article-writing contest on their Best Practices Forum. Authors of the two winning submissions each received copies of Zend Studio for Eclipse, a 1-year subscription to Linux Pro Magazine (which is called Linux Magazine outside North America), and the opportunity to feature their articles on the magazine websites. Congratulations goes to Rob Allen for his winning submission!more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm