After You Install What to do after you install openSUSEAug 18, 2008
After you finish installing openSUSE, you can start by preparing your system with these simple steps.more »
Fifteen years ago, on Saturday the 16th of August, 1993, Ian Murdock wrote an email to the comp.os.linux.development newsgroup , announcing his upcoming Debian Linux Release.more »
The developers were criticized for KDE 4.0. At the time, they pointed to KDE 4.1 – and it turns out they were right. The new version is far more stable and mature.more »
Version 2.23.5 of the Gnome Linux desktop gives a preview of version 2.24, which is scheduled for release in September.more »
At first, plans for Gtk+ 3 were considered unnecessary – the developers themselves considered the 2.x version mature enough – now, some developers are toying with the idea of developing Gtk+ 3. Gnome founder Miguel de Icaza comments on and criticizes the developments in his blog.more »
KDE e.V. and the GNOME Foundation will be holding their annual Akademy and GUADEC conferences jointly next year in Gran Canaria.more »
The developers of the Gnome desktop environment have denied the necessity of Gnome version 3.0, but now things are happening. Initial plans for a 3.0 release were revealed at the Gnome developer conference, Guadec, along with details of Gtk+ 3.0.more »
Mozilla Lightning Mozilla Thunderbird calendar add-onMay 31, 2008
The Lightning add-on lets users upgrade their Mozilla Thunderbird email client and turn it into a convenient, versatile groupware product.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.