CeBIT Open Source Project Lounge -- BRODEL Business Suite BRODEL Business suite - web-based business softwareJan 29, 2010
Brodel Business Suite is among the 15 projects that will present their work at CeBIT, offering an open source ordering system for B2B.more »
Media Player Roundup Comparing Linux media playersJan 26, 2010
We compare some popular Linux media players, including Banshee, Rhythmbox, Amarok, and Songbird.more »
The team at Ubuntu is trying to get users views as to which programs should be included in future versions of Ubuntu. The survey will be online until the end of January.more »
The annual OpenOffice conference takes place this year the end of September in Budapest. The project is also looking for suggestions for 2011.more »
Portable and Mobile Techniques for portable computers and mobile devicesNov 30, 2009
The arrival of Linux on portable and mobile devices provides so many interesting opportunities for customization. This month we look at Linux in portable and mobile environments.more »
Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
gPhoto Remotely controlling digital cameras with gPhotoNov 30, 2009
Commercial software that lets users remotely control their camera usually is not available for Linux. gPhoto gives users a free alternative.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm