Developer Brett Wynkoop has written the code for a simple web server called Simple/Small/Shell Web Server (SWS) in the form of a shell script.more »
Sponsored by the Linux distributor Red Hat Inc.,the Fedora project has introduced a new scholarship program for students around the globe who have contributed to free software, particularly to the Fedora project.more »
PHP CLI Tips and Tricks PHPWomen Contest WinnerAug 19, 2008
PHPWomen.org recently held an article-writing contest on their Best Practices Forum. Authors of the two winning submissions each received copies of Zend Studio for Eclipse, a 1-year subscription to Linux Pro Magazine (which is called Linux Magazine outside North America), and the opportunity to feature their articles on the magazine websites. Congratulations goes to Gerard Sychay for his winning submission!more »
For many people, the summer is an ideal time to go on vacation. Summer of 2008 was also a productive time for Amarok developers.more »
Google's software for mobile communication, Android, is scheduled for release in November along with the Dream ''GPhone."more »
Linux Pro Magazine's Editor in Chief, Joe Casad meets Gerald Carter, a senior Likewise Software developer and long-time member of the Samba core development teammore »
At first, plans for Gtk+ 3 were considered unnecessary – the developers themselves considered the 2.x version mature enough – now, some developers are toying with the idea of developing Gtk+ 3. Gnome founder Miguel de Icaza comments on and criticizes the developments in his blog.more »
PHP Script Archives Working with PHP online script archivesJul 10, 2008
As a PHP Programmer, you may occasionally find yourself at a dead end. Discovering the perfect code snippet, script, or class to use alongside your own code can save time and frustration.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm