Free Software Foundation considers Restricted Boot a threat to user freedom.more »
Table of Contents: 141 Living with WindowsJun 21, 2012
Interacting with the Windows world has never been easier. This month we look at Windows apps in Linux and Linux partitions in Windows.more »
Social and Private with Friendica Developing for a Post-Facebook WorldJun 19, 2012
Be social and keep in touch while maintaining your privacy with Friendica, a network that centralizes social media.more »
Security Lessons: Hacking Hardware Don’t forget your hardwareMay 29, 2012
Now that your networks are secure and you’ve convinced your users to secure their passwords and software, it’s time to turn your attention to your hardware to keep it from being attacked.more »
Bash offers any number of simplifications, especially when it comes to pesky individual steps in installation routines for larger software packages. Some caution is advisable, though, if you need to handle database and application passwords, which can easily be compromised.more »
Fluendo, Lineo Solutions, Mocana, and NVidia join the Linux Foundation and see the benefits of Linux in the future of computing.more »
Better Bash Shell scripts from hell: ShebangJan 30, 2012
In the beginning was the double pound sign and the exclamation mark – or at least shell scripts always start this way. The inventor, Dennis Ritchie, really didn’t know how much pain this was going to cause users.more »
Security Lessons: Password Storage Storing your passwords properlySep 23, 2011
High-performance graphics cards and proper storage can help keep your passwords secure.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm