MLDonkey File sharing with MLDonkey and KMLDonkeyMar 31, 2005
The multi-network MLDonkey client gives users access to all the major file sharing networks. We’ll show you how to set up MLDonkey and how you can control the MLDonkey client with a KDE front end called KMLDonkey.more »
DeskTOPia: hsetroot & Esetroot deskTOPia: The hsetroot and Esetroot Background ToolsMar 31, 2005
Users who work long hours on a
desktop computer will appreciate
something eye-catching to relieve
the monotony. The hsetroot and
Esetroot tools offer you more than
an ordinary desktop.more »
Bluetooth Mobile Phones Linking Linux to your Bluetooth Mobile PhoneFeb 28, 2005
It is becoming increasingly common for new generation mobile phones to have an integrated Bluetooth interface. This article explores how to access your Bluetooth phone using Linux.more »
Charly's Column Bootchart The Sysadmin’s Daily Grind: BootchartFeb 28, 2005
What could be more boring than watching a computer run through an error-free boot routine? Why watch for messages that may never appear? Every second you save adds to your valuable leisure time. Bootchart helps you find those valuable leisure moments.more »
Hypermail Archiving Email Messages with HypermailFeb 28, 2005
Hypermail converts email messages to HTML and allows you to group your messages in tidy archives.more »
Encrypting Email Encrypting Email with KMail, Mozilla Thunderbird, and EvolutionFeb 28, 2005
The leading email applications include new features for helping users secure and authenticate their mail messages, but each tool has a different approach to handling tasks such as signing and encryption. This article describes how to add encryption and digital signatures to the Thunderbird, Kmail, and Evolution mail clients.more »
Secure Email Intro Mail Tools for a Hostile PlanetFeb 28, 2005
Don’t look now, but your mailbox is full of junk, and a snooper is live on a distant server, reading your opinions of your boss. Remember when email used to be easy? To restore some sanity to your correspondence, you’ll need the right tools.more »
SpamAssassin A Home-Grown Spam FilterFeb 28, 2005
Even if you do not have a mail server of your own, SpamAssassin can help you filter out unsolicited junk mail. This article describes how SpamAssassin collaborates with Evolution and KMail. Thunderbird, on the other hand, has its own simple spam-detection feature.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm