Total Recoll Lost and FoundSep 22, 2015
KDE's unofficial search engine may be the most usable choice of all.more »
Calligra Suite Calligra Redefines the Office SuiteFeb 10, 2015
Calligra Suite goes beyond the standard four or five office suite programs by offering a range of applications for desktop and mobile computers.more »
Anonymous Sharing with MediaCrush Up to SpeedDec 03, 2013
You don’t always need a full-fledged YouTube or Flickr clone to share videos or images. Sometimes all you want is a quick place to upload, so you can link to your media or share it online. MediaCrush gives you just that, as well as some more interesting perks.more »
Visual Programming with Alice Alice 3.1Sep 09, 2013
If you can use your desktop environment, then you can also write programs: All you need is your mouse, the Alice IDE, and some time to experiment.more »
Communication in the Post-PRISM World PRISM Break: Part 1Aug 12, 2013
Linux users didn’t need the recent NSA eavesdropping scandal to convince them that securing communication was a good idea. For years, free software developers have been creating secure tools that offer similar functionalities to all of those popular but very leaky services with ridiculous names.more »
Fresh Memory: Learning Aid Self-TestAug 09, 2013
When memorizing facts, learning, storing, and processing internalizes the subject matter. The Fresh Memory program offers various methods to help you anchor the facts in your memory.more »
Generating QR Codes in Linux Creating and Reading QR CodesJul 02, 2013
With the right tools, you can create your own QR code squares with information you want to share on a business card, in a letter, or on your website.more »
Making Music with Ardour3 Sound SystemJun 03, 2013
The latest version of Ardour – a full-featured digital audio workstation – offers some major new developments. We take a closer look.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm