Ubuntu founder denounces insecurity in proprietary, close-source software blobs.more »
The PowerTOP tool developed by Intel helps you save power. In version 2.0, it can also handle GPUs and offers advanced tracking features.more »
Resetting Passwords with SystemRescueCd SystemRescueCdJul 30, 2012
If you’re locked out of your Linux or Windows system, a handy Live Linux troubleshooting distro might be all you need to get back in. We’ll show you how to pick the lock with SystemRescueCd.more »
Video Acceleration with VA-API Implementing video acceleration on intel chips with the video Acceleration APIMay 29, 2012
Improve video performance with hardware video-accelerated decoding using the video Acceleration APi.more »
In testing the Phenom II X6, Linux Magazine noticed that AMDs new processor doesn't have the full performance under the current Linux kernel. A bug in Linux power management throws a wrench into the six-core processing.more »
Two French developers have introduced a configuration software for Intellon-based Power Line Communication devices (PLC) at the 25c3 in Berlin. Simultaneously, the developers declared the software, called Faifa, as Open Source.more »
Top Ten Tops We pick the top ten Top toolsNov 30, 2008
The famous Unix admin utility known as Top has many imitators. We take a look at some of the top Top tools.more »
Green IT Intro Examining power consumption in LinuxSep 30, 2008
How much power is your system really using? And how much can you actually save with the new generation of energy-conserving techniques and components? This month we study the phenomenon known as Green IT.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm