199 results found
) Next »
Meet Arch Anywhere, a new open-source project created by developer Dylan Schacht to help Arch Linux newcomers install the powerful and modern Linux-based operating system on their personal computers, or a virtual machine.
This document gives an overview of how security is designed into Google's technical infrastructure. This global scale infrastructure is designed to provide security through the entire information processing lifecycle at Google.
The Wine 2.0 development cycle is not yet over, and, today, we see the release of another development release, the sixth in the series, which comes exactly one week after the previous one.
Linux is arguably the most successful open source project in all of history. The success of the kernel -- and operating systems that use it -- are not due to any one man or woman. Actually, the achievements are thanks to the Linux community. In other words, it is a team effort -- developers, users, and more.
The terminal emulator is a venerable but essential tool for computer users. The reason why Linux offers so much power is due to the command line. The Linux shell can do so much, and this power can be accessed on the desktop by using a terminal emulator. There are so many available for Linux that the choice is bewildering.
Companies or organizations that don’t have a strong open source compliance program often suffer from errors and limitations in processes throughout the software development cycle that can lead to open source compliance failures.
During the livestream I did last night I had one of those moments where you fully appreciate how far Linux gaming has come.
A new maintenance update of the Linux 4.9 kernel series was announced today by renowned Linux kernel maintainer and developer Greg Kroah-Hartman, versioned 4.9.5.
In this week's Top 5, we highlight how to get started with shell scripting, open leadership, the Cinnamon Linux desktop environment, contributing to the Mozilla project, and writing web apps with R using Shiny.
Inforce Computing has released a more affordable and slightly less feature rich version of its commercial-oriented, circa-2015 Inforce 6309 SBC. Like the Inforce 6309, the new Inforce 6309L has the same 85 x 54mm footprint and much the same feature set as Arrow’s Qualcomm-backed, community-backed DragonBoard 410c SBC.
Dell continues to build the best out-of-the-box Linux and open-source laptops. Check out the latest Dell XPS 13 developer edition and you'll see what I mean.
CentOS developer and maintainer Johnny Hughes is announcing the availability of a new, important Linux kernel security update for the CentOS 7 series of operating systems.
In this week's edition of our open source news roundup, we take a look at the new Raspberry Pi compute module, the FSF's 2017 priorities, a new open data portal, and more.
Open source news roundup for January 8-21, 2017
Who's going to get bragging rights this year? Last year it was Arch. The year before it was Ubuntu. Call out the troops and get bragging rights by making your favorite our "Best Linux Distro."
The Gedit text editor is simple to use but can become very powerful with the use of plugins. Here are some useful tips to make Gedit a better text editor.
Asus has launched a RPi-like “Tinker Board” that runs Debian and Kodi on a quad-core 1.8GHz -A17 RK3288, and offers 2GB RAM, GbE, 4K video, and 40-pin GPIO. The rumored Asus Tinker Board is finally for sale at Farnell in the UK, with a footprint, layout, and features that are very close to that of […]
If you've been waiting to upgrade your Ubuntu 16.04 LTS (Xenial Xerus) operating system to the 16.04.2 point release, which should have hit the streets a couple of days ago, you'll have to wait until February 2.
The first release of Windows 10, known as 1507, is the version that Microsoft will no longer update after March 26, 2017. The other two versions of the product in market -- the November update (1511) from November 2015 and the Anniversary Update (1607) -- will continue to get regular security and feature fixes and updates.
Any program you run can read your clipboard, and its contents linger until another copy event or a reboot. Modern browsers enable multiple ways for malicious websites to read the clipboard contents (or add items in), so eliminate the worry by using a script with cron that auto-clears your clipboard regularly.
There is nothing a hacker likes more than a tasty Linux machine available on the Internet. In my recent Linux Foundation webinar I shared tactics, tools, and methods hackers use to invade your space.
) Next »