A workgroup of the Linux Foundation has been tasked to implement the IPv6 next-generation Internet protocol for Linux and can now report that its work meets U.S Department of Defense (DoD) mandate and certification requirements.more »
Adobe Systems has issued a prerelease version of project Alchemy, a small tool that compiles C and C++ code for programs running on ActionScript Virtual Machine (AVM2). The idea is to expand the capabilities of Web applications running on Adobe Flash Player 10 and Adobe AIR 1.5.more »
The Mozilla Foundation has published its audited financial statements and tax form for 2007. Chairperson Mitchell Baker uses the event to review Mozilla's performance and despite the current financial turmoil, sees good prospects for the future.more »
Workspace: DokuWiki Word processing with DokuWikiNov 12, 2008
DokuWiki offers some capabilities not found in other web-based word processors. We'll show you how to build your own web-based word processing tool with DokuWiki and a few plugins.more »
IPv6 Examining IPv6 on today’s InternetNov 12, 2008
Is the world ready for the next generation Internet Protocol? We take a look at Linux with IPv6.more »
Gobby Collaborative editing of text documentsNov 05, 2008
If you are looking for a tool for collaborative text editing across a network, Gobby might be the Gobby lets multiple users edit text documents collaboratively and discuss the changes online.more »
Linux Magazine is broadcasting a live stream from ApacheCon US 2008, LA, New Orleans (November 5 through 7). The keynotes from the developer conference are available free of charge.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm