In an effort to boost security across the Web, Mozilla is extending its service for verifying plugins to competing browsers, although some questions remain.
<b>Linux.com:</b> "This time around I'll focus more on Samba and how it is installed and configured to allow for the sharing of files and folders. For this article, we will look at the smb.conf configuration file and how it is set up and how to create new shares and even share printers."
New study from PandaLabs pins the escalating severity of attacks carried out by relatively unskilled hackers on a thriving black market offering ready-made tools.
<b>Cyberciti:</b> "How do I make sure only authorized person access my backups stored on the tape drives (DAT, DLT, LTO-4 etc) under Linux or UNIX operating systems? How do I backup /array22/vol4/home/ to /dev/rmt/5mn or /dev/st0 in encrypted mode?"
<b>Phoronix:</b> "Back in March we talked about the possible X.Org projects this year during Google's Summer of Code, for which X.Org is a veteran participant (in the past items like the ATI R300 Gallium3D driver and generic GPU video decoding have been tackled), but the list of accepted projects for this summer have now been announced."
<b>Standards Blog:</b> "Frank stepped out of the dark, moonless night of the Nevada desert and into the bright light of the bar, restaurant and motel that was the Little A'Le'Inn."
<b>Boycott Novell:</b> "Summary: War is peace and Microsoft is the new “open”; Details on the latest attack of Microsoft against GNU/Linux, using proxies"
Rebecca Bond returns from an IDUG Conference with some short, compact knowledge bits that return big results. These quick tips and fixes make great additions to any database administrator's toolbox.
States are passing more and more data security laws, the US Senate and the House have bills meandering through Congress, securing personal information and encrypting that data is no longer optional.
<b>InfoWorld:</b> "Source code availability is a central factor in establishing trust in the open source community, as knowledge that the source is available can often allay fears about the future of a particular open source project or product. And yet, this trust can often be overstated."
Linux and open source rule the wireless hotspot world, and Eric Geier has rounded up five excellent, feature-packed open source wireless hotspots for us.
One of the most interesting Mozilla Labs projects has now stagnated. Is the project dead? Does it have a future? The Mozilla developer who led the project tells all.
<b>Ghabuntu:</b> "On Linux, the Gimp has its own collection of plugins and scripts, but to satisfy the folks who look down upon Linux and Gimp, I will present not one but two ways to do the work of Photoshop plugins in Linux."
<b>Datamation:</b> "It shouldn't be so hard to get a price - my motto is that the harder it takes to find out pricing, the less motivated customers are going to be to buy it."
<b>eSecurityPlanet:</b> "Botnets cranked out more spam and larger individual files containing spam in the first quarter of this year, according to the latest report from Postini, Google's e-mail filtering and security service."
<b>LWN.net:</b> "Konstatin Dmitriev's Morevna Project is to 2-D animation what the Blender Foundation's Open movie projects have been for 3-D. The goal is to produce a production-quality, full-length animated feature, using only open source software, and license the source content and final product under free, re-use-friendly terms."
Despite improved security software applications and greater consumer awareness, Google's Postini said total spam volume increased six percent in the first quarter of 2010.
<b>Network World: </b>"Two law professors from UC Berkeley have come up with a novel idea to protect open source developers from patent bullies. They call it the Defensive Patent License. They hope the DPL can address the objections FOSS developers have with patents the way the GPL addressed them for copyright."