Our tour of the LinuxWorld .org pavillion stops at the Joomla boot.more »
Version 1.9.5 of Codestriker, a Web application that supports code reviewing by geographically distributed teams of developers has just been released. The new version offers sophisticated syntax highlighting.more »
Light Web Server Alternatives The Cherokee and Lighttpd alternative web serversJul 01, 2008
Apache has ruled the web since the mid-90s, but not all users are happy with it. Recent competitors Cherokee and Lighttpd offer an uncomplicated alternative for users who are looking for something light.more »
Free Software Projects An up-to-date look at free software and its makersJun 19, 2008
The recent discussion concerning the future of Mozilla Thunderbird is one example of the needs of a corporation vs. those of the user community.more »
Perlbal Scaling your website with the Perlbal web serverJun 17, 2008
Let the nimble Perlbal web server keep your traffic in balance.more »
Hardware specialist Intel and embedded systems manufacturer Wind River are aiming to put Linux on wheels. Both enterprises have announced their intention to release a jointly developed Linux platform for the automotive industry.more »
New releases of the two competing Web technologies, Flash and Silverlight, have just become available. While version 10 of the new Flash Player runs on three platforms, the Silverlight implementation, Moonlight, is designed exclusively for Linux systems.more »
Software manufacturer Adobe has just released an initial alpha version for Linux of its developer environment AIR for Web technology .more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm