Post Overview
-
Current Event
1 year ago
+38 38 0Linux Mint 21.3 is here - and it's outstanding
The latest Linux Mint update is an excellent Linux desktop for many reasons.
-
Analysis
1 year ago
+26 26 0Delayed Open Source Publication Emerges as Open Source Rival
DOSP involves initially releasing software under a proprietary license, followed by a planned transition to an open source license.
-
Current Event
1 year ago
+19 19 0Tribute: Niklaus Wirth, 1934-2024
Remembering the creator of Pascal, a champion of lean and elegant code, and a vital figure in the evolution of software development.
-
Current Event
1 year ago
+36 36 0Your pacemaker and open source software
Using embedded medical technology, such as a pacemaker, defibrillator, or insulin pump? What's running inside is a complete mystery
-
Current Event
1 year ago
+28 28 0NoaBot: Another Mirai Botnet Strikes at Linux Devices
Akamai's team of security experts has discovered a new cryptomining campaign, dubbed NoaBot, leveraging the SSH protocol to spread its malware.
-
Current Event
1 year ago
+36 36 0GPT Store: OpenAI's most compelling reason to become a ChatGPT Plus subscriber yet
OpenAI just launched GPT Store, a personalized AI application marketplace, and ChatGPT Team, a dedicated collaborative AI workspace. Here's what they can do for you.
-
Current Event
1 year ago
+39 39 0Faster than ever: Wi-Fi 7 standard arrives
How fast do you want your Wi-Fi to go? How does 5.8 Gigabits per second sound? Fast enough for you?
-
Analysis
1 year ago
+47 47 0The fall of Firefox: Mozilla's once-popular web browser slides into irrelevance
With its market share hitting a new low, can Firefox rise from the ashes or is this the end?
-
Analysis
1 year ago
+34 34 02023: The Year Open Source Security Supply Chain Grew Up
Open source security has always been important. We just pretended otherwise. We don't have that luxury of laziness anymore.
-
Analysis
1 year ago
+41 41 0What is immutable Linux? Here's why you'd run an immutable Linux distro
Safety and security are immutable Linux's calling cards.
-
How-to
1 year ago
+47 47 0Can your Windows 10 PC be saved in 2025? Yes - for free. Here's how
As many as 240 million Windows 10 PCs can't be upgraded to Windows 11. What's a user to do?
-
Current Event
1 year ago
+48 48 0The Terrapin Attack: A New Threat to SSH Integrity
Researchers at Ruhr University have found a significant vulnerability that targets the SSH protocol by manipulating the handshake process.
-
Expression
1 year ago
+62 62 0Linux Server Operating Systems: Red Hat Enterprise Linux and Beyond
Besides Red Hat Enterprise Linux, several RHEL rival clones and offshoots are vying for your Linux server and cloud dollar. Here's what's with them.
-
Expression
1 year ago
+58 58 0Do you actually own anything digital?
From ebooks, to videos and software, the answer is increasingly no
-
Current Event
2 years ago
+61 61 0Fedora Linux now runs on all M-powered Macs - except one
The first full-fledged desktop distro for M-chip Macs, Fedora Asahi Linux is a giant step forward in bridging the gap between Linux and Apple silicon hardware.
-
Analysis
2 years ago
+57 57 0The rise and fall of Usenet: How the original social media platform came to be
With Google dropping support for the oldest of social networks, Usenet is now left without another major entry gate.
-
Current Event
2 years ago
+58 58 0New L4S standard is poised to speed up your internet and reduce latency
This new standard will boost your internet throughput, no matter what speed you get.
-
Expression
2 years ago
+56 56 0Why do companies do holiday layoffs?
For employees laid off when companies downsize in November and December, it’s not the most wonderful time of the year. Enough already!
-
Current Event
2 years ago
+50 50 0Istio Advisor Plus GPT: Expert System Meets AI for Service Mesh
This combination of AI with Istio's documents is very handy for working out what's what with this popular open source service mesh.
-
How-to
2 years ago
+59 59 0This is how to protect your computers from LogoFAIL attacks
This obnoxious constellation of firmware attacks takes over computers. Here's which devices are vulnerable and what you can do to protect them.




















