Lantronix will award prizes of $6,000 and $3,000 to the two top entries for Best Linux Design, and a separate prize of $3,000 for the Best Student Linux Design.
Read more »Lantronix Launches Global XPort Pro Design Contest
- Login to post comments
PC-BSD’s graphical firewall manager
The firewall application on PC-BSD is OpenBSD’s Packet Filter. It is a very powerful firewall application with many advanced features and functionalities. This post takes a look at the graphical firewall manager.
Read more »- Login to post comments
KJots Takes Advantage of Innovations in the KDE Development Platform
Work on porting KJots to Akonadi started a long time ago (around summer 2008!), and that effort is reaching a milestone this week. The ported version of KJots has been merged into trunk for the next release of the KDE Software Compilation where work will continue on it to refine features and fix bugs.
Read more »- Login to post comments
Regular Expressions In grep
How do I use the Grep command with regular expressions under Linux operating systems?
Read more »- Login to post comments
You can’t have it your way
I have some advice for you, if you’re thinking about spearheading an open source project: Define your goal at the outset, and never ever allow the public to determine which way your project goes.
Read more »- Login to post comments
Under the Hood with MeeGo
Put aside that difference, though, and the projects are peas in a pod. Furthermore, given that the Linux kernel supports more than two-dozen architectures, can't open source app stacks evolve beyond architectural boundaries? Sure they can, and many have.
Read more »- Login to post comments
16 Feb 2010: Red Hat's Top 11 Most Serious Flaw Types for 2009
The 2010 CWE/SANS Top 25 Most Dangerous Programming Errors was published today listing the most widespread issues that lead to software vulnerabilities.
Mark Cox: "During the creation and review of the list we spent some time to see how closely last years list matched the types of flaws we deal with at Red Hat."
- Login to post comments
2010 CWE--SANS Top 25 Most Dangerous Programming Errors
The Top 25 list is a tool for education and awareness to help programmers to prevent the kinds of vulnerabilities that plague the software industry, by identifying and avoiding all-too-common mistakes that occur before software is even shipped.
Read more »- Login to post comments
Scripting the Vim editor, Part 4: Dictionaries
In this fourth article in a series introducing Vimscript, Damian Conway introduces you to dictionaries, including an overview of their basic syntax and many functions. He concludes with several examples that illustrate the use of dictionaries for more efficient data processing and cleaner code.
Read more »- Login to post comments
Code Project: monitor /proc with Python and Clutter
If you already read our beginner's guide to the Clutter toolkit and wished it were available in something other than C, then good news: we're putting together a tutorial series covering PyClutter, the Python binding to Clutter, which merges all the power and beauty of the Clutter toolkit with the simplicity and brevity of Python.
Read more »- Login to post comments
Top 25 Programming Errors list updated
Just as they did last year, over thirty international security organisations have come together, to publish a list of the 25 most dangerous programming errors leading to vulnerabilities that can be exploited for cybercrime and espionage.
Read more »NIS Server Configuration
The Network Information Service distributes information on the network that must be shared between the Linux machines. Sun Microsystems developed a system known as Yellow Pages (YP) that eventually became known as NIS. The original YP is added to most commands for NIS ypserver, ypbind, and yppasswd. Typically NIS is used to distribute information about the users and how they authenticate to Linux.
Read more »- Login to post comments
Measuring FAIL: A Scorecard for Evaluating Open Source Projects
Ever wonder whether a given FLOSS project is going to succeed or flounder? Need a little help reading the tea leaves? Now you can follow along at home with a handy scorecard that looks at everything from source control to project communication.
Read more »- Login to post comments
Kernel Log: Coming in 2.6.33 (Part 5) - Drivers
Enhancements to the ALSA code for HD audio codecs, a V4L/DVB driver for the Mantis TV chip, drivers for MSI laptops and drivers for newer AMD CPUs are just some of the improvements to Linux hardware support.
Read more »- Login to post comments
How To Switch Permalink Structure In WordPress Under Ubuntu
There are certain things you need to tweak in Apache running under any Debian platform (including Ubuntu) in order to have it properly redirect webpages (301) after you change your permalink structure in WordPress.
Read more »- Login to post comments