Edubuntu Exploring Ubuntu’s cousin for the classroomJan 31, 2007
Don’t know much about history? Don’t know much biology? Don’t panic: Edubuntu will lead you to the wonderful world of classroom Linux.more »
Opera 9 Exploring Opera 9Nov 30, 2006
Stable, fast, and complete: Opera 9 gives you everything you need for the Internet in a compact package.more »
Bitparade: Screencast Tools Comparing screencast applicationsAug 31, 2006
Screenshots provide a static impression of an active program, whereas desktop video sequences show the software hard at work. We’ll introduce you to some of the major tools for creating screencasts.more »
Perl: Internet Video Organizer Internet video organizer in PerlAug 31, 2006
Video files are ready for download, but your storage space is limited, and, if you're like most people, you may have a hard time letting go of past favorites. You need a higher authority to decide when it’s time to trim down your collection.more »
Command Line: mount & fstab Media access with mount and fstabJun 30, 2006
This month we look at tools for mounting and unmounting storage media.more »
WordNet Studying words with the WordNet lexical referenceJun 30, 2006
The WordNet lexical reference maps connections between words. Check out this fascinating tool based on language data from two decades of research.more »
Antsp2p Anonymous Filesharing with Antsp2pMay 31, 2006
Filesharing is a favorite leisure activity for many Internet users. But conventional filesharing tools have one major drawback – they aren’t anonymous. The Antsp2p project aims to change this.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm