MacPorts and Fink Linux software on Mac OS XAug 31, 2009
An increasing number of Linux desktop users also run a Mac, and although the Mac has a lot of great programs, Linux has a lot of apps you can't get natively for the Mac.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Unetbootin Installing distros on USB sticks with UnetbootinJul 31, 2009
Unetbootin lets users set up almost any distribution on a bootable USB stick.more »
Charly's Column The sys admin's daily grind: TTYtterJul 31, 2009
Twitter, so everyone says, is modern, fun, sociologically illuminating and otherwise useless. Even Charly feeds a budgie – but at the console, it's a question of style.more »
Workspace: Tonido Serves you rightJul 31, 2009
This cloud-in-a-box serves up shared space for a jukebox, photos, blogs, file sharing, workspace apps, and more.more »
Peek presents the community a challenge to get Linux running on their small handhelds, without much fanfare.more »
KDE developers ported the recipe management function in the transition from KDE 3 to 4. Amateur chefs can now consume the new version, although the meal isn't quite cooked to perfection, it still being in an alpha state.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm