On April 11, Calligra Suite announced its first release, version 2.4. This release takes Calligra several steps closer to being an alternative to LibreOffice, especially in its graphical applications.more »
The XBMC team announces the release of a new and improved XBMC 11.0 (Eden) for Windows, Linux, Mac OS X, and iOS, as well as XBMCbuntu Final, built on the LXDE desktop.more »
Kexi vs. Glom Kexi and Glom – lean database tools comparedMar 29, 2012
Kexi and Glom aim to create databases with little overhead. We compare the power of these two tools.more »
Knoppix v7.0, 32- and 64-bit versions, with ADRIANE v1.4 and cellphone support.more »
Workspace: BilboPlanet Manage RSS feeds with BilboPlanetJun 27, 2011
On the web, a planet is a tool for collecting and displaying blog posts from members of an Internet community. We show how to do this using BilboPlanet.more »
Koha Library System Easy library administration with KohaJun 27, 2011
Information technology plays a key role in modern library environments. We check out Koha, an open source integrated system that can help manage a library’s daily operations.more »
Vinux, Orca, and Gnome Linux accessibilityMay 31, 2011
Accessibility for computer users with disabilities is one of the noblest goals for Linux and open source software. Vinux, Orca, and Gnome lead the way in Linux accessibility.more »
The Linux Mint team announces its cool new version 11, aka "Katya."more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm