Language Selection

English French German Italian Portuguese Spanish

OpenSUSE 12.1 delivers Fedora punch with GNOME 3

Filed under
SUSE

The big news in openSUSE 12.1, whose first beta has recently dropped, is the arrival of GNOME 3 – in this case GNOME 3.2.

Unlike Fedora, which is already into its second GNOME 3-based release, openSUSE had – thanks to its release schedule – stuck with GNOME 2 for its last release earlier this year.

OpenSUSE 12.1 embraces GNOME 3.2 and, like Fedora 16, drops support for the GNOME 2.x line.

This release marks a slight change to openSUSE's versioning convention. If you were thinking this should be openSUSE 12.0, you're correct.

rest here




More in Tux Machines

today's howtos

Oracle Desperate

Leftovers: OSS and Sharing

Security Leftovers

  • Friday's security updates
  • Judge Says The FBI Can Keep Its Hacking Tool Secret, But Not The Evidence Obtained With It
    Michaud hasn't had the case against him dismissed, but the government will now have to rely on evidence it didn't gain access to by using its illegal search. And there can't be much of that, considering the FBI had no idea who Michaud was or where he resided until after the malware-that-isn't-malware had stripped away Tor's protections and revealed his IP address. The FBI really can't blame anyone but itself for this outcome. Judge Bryan may have agreed that the FBI had good reason to keep its technique secret, but there was nothing preventing the FBI from voluntarily turning over details on its hacking tool to Michaud. But it chose not to, despite his lawyer's assurance it would maintain as much of the FBI's secrecy as possible while still defending his client. Judge Bryan found the FBI's ex parte arguments persuasive and declared the agency could keep the info out of Michaud's hands. But doing so meant the judicial playing field was no longer level, as he acknowledged in his written ruling. Fortunately, the court has decided it's not going to allow the government to have its secrecy cake and eat it, too. If it wants to deploy exploits with minimal judicial oversight, then it has to realize it can't successfully counter suppression requests with vows of silence.
  • Researcher Pockets $30,000 in Chrome Bounties
    Having cashed in earlier in May to the tune of $15,500, Mlynski pocketed another $30,000 courtesy of Google’s bug bounty program after four high-severity vulnerabilities were patched in the Chrome browser, each worth $7,500 to the white-hat hacker.