Display server expert Daniel Stone explains what is really happening with the future of graphical display protocols on Linux.
Steam for Linux finally brings current games to the Linux desktop. Valve has put a lot of energy into the project, but the first steps on the new terrain still look a little shaky.
Rootkits allow attackers to take complete control of a computer. We describe the tricks intruders use to gain access to the Linux kernel and provide guidelines on hardening the kernel against such attacks.
We talk with Jean Hollis Weber, a volunteer with ODFAuthors, the LibreOffice Documentation team, and the Friends of OpenDocument Inc.
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.
An offline cache in your browser and a bit of HTML5 acrobatics combine for interactive web applications that keep working even when the Internet connection breaks down.
If you need a tool to make minor modifications in OpenStreetMap, Potlatch 2 is a useful choice as a fast and easy-to-use editor.
Bitcoin is a decentralized virtual currency, popular with hackers and the open source community. We’ll explain how the money is created and how it works.
After six years of development, founder Eben Upton and the other members of the Raspberry Pi Foundation are finally seeing the results of their efforts.
Red Hat peps up performance of multimedia applications on remote desktops with SPICE (Simple Protocol for Independent Computing Environments).
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems