GMailFS GmailFS: Using a mail account as a filesystemJun 01, 2005
Why let a 2 Gigabyte email account go to waste? GmailFS lets you use Gmail as a storage medium for a mountable filesystem.more »
Apollon File Sharing with Apollon and GiFTJun 01, 2005
The operators of the popular Internet-based file
sharing network, Kazaa, only provide software for
Windows systems, but the GiFT project brings
Kazaa support to Linux.more »
Perl: Archiving PDFs Archiving and accessing PDFsJun 01, 2005
This month you’ll learn how to place articles in a private PDF archive and how to use a database to access those articles at a later time.more »
Anonymous Email Anonymous Remail with MixmasterMay 01, 2005
Anonymous remail protects the sender’s identity against potential eavesdroppers. The Mixmaster protocol gives users a mature technology for anonymous remail, and the text-based Mixmaster client is an example of a free remailer application.more »
MLDonkey File sharing with MLDonkey and KMLDonkeyApr 01, 2005
The multi-network MLDonkey client gives users access to all the major file sharing networks. We’ll show you how to set up MLDonkey and how you can control the MLDonkey client with a KDE front end called KMLDonkey.more »
DeskTOPia: hsetroot & Esetroot deskTOPia: The hsetroot and Esetroot Background ToolsApr 01, 2005
Users who work long hours on a
desktop computer will appreciate
something eye-catching to relieve
the monotony. The hsetroot and
Esetroot tools offer you more than
an ordinary desktop.more »
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.