Prune An Introduction to PruneNov 30, 2009
Have more fun with your GPS data with this easy-to-use Java-based tool.more »
Qt for Maemo Coding for Maemo devices with QtNov 30, 2009
Write your own smartphone apps with Qt's toolkit for the Maemo platform.more »
In his blog, Canonical coworker Jorge O. Castro announces his so-called "b-sides" of Ubuntu, software that didn't make it into Ubuntu's standard installation.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Gnome 2.28 What’s new with Gnome 2.28?Nov 23, 2009
New features and below-ground tweaks make the Gnome desktop lean and free of legacy ballast.more »
Google Maps Where in the World Are Carmen and San Diego?Oct 26, 2009
Google Maps can pinpoint any location on the globe and more. Here’s how to embed the service into any web application.more »
Picasa 3.0 Picasa 3.0 image managerOct 16, 2009
In the age of the digital camera, users are overwhelmed by a flood of images. Picasa not only helps you manage photos but also will enhance the image quality with just a couple of mouse clicks.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm