strace Get started with strace and debug fasterMay 31, 2009
Get started with strace by examining a pair of "Hello World" programs. Next month, in the second part of this two-part series, I'll take a deeper look at strace output.more »
Java and .NET Intro Implementing Java and .NET in LinuxApr 30, 2009
In today's heterogeneous environments, it is hard to escape the influence of Java and .NET. So why not come prepared? This month we examine some tools and techniques for integrating the Java and .NET frameworks with Linux.more »
After years of development, version 1.0 of the Parrot virtual machine has arrived for Perl, Python and other dynamic languages. Whether the Parrot will take a firm foothold in software development is still up in the air.more »
Adobe, maker of Photoshop and Flash, has released version 1.5 of its AIR platform for Linux. The software allows Web users to run so-called Rich Internet Applications (RIAs) without resorting to a browser.more »
British company PureCM.com Ltd has released a new version of its PureCM software configuration management (SCM) tool.more »
Linux Foundation has released its first beta of the Linux Standard Base (LSB) version 4.0. The providers have already promised developers an easier work environment through the SDK, shell script and application checker. The successes are logged in the FOSSBazaar workgroup.more »
The developers of Mono, the free implementation of the .NET framework, have achieved a major milestone with version 2.0.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm