Download Management Download management with flareGetJun 03, 2013
flareGet accelerates your downloads and avoids the consequences of disconnections while downloading files.more »
Stellarium Explore the Night Sky with StellariumMay 20, 2013
What shines in the dark is often hidden by clouds. Stellarium provides a clear view of the stars plus a lot of astronomical data.more »
Wanted: A Free Accounting Application for Non-Profits Non-Profit Accounting SoftwareMay 20, 2013
The Software Freedom Conservancy is raising funds to fill a major gap in free software functionality.more »
Firefox Extensions Getting More from FirefoxFeb 24, 2013
Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.more »
Potlatch 2: OpenStreetMap Editor Fast Mapping: Editing OpenStreetMap with Potlatch 2Feb 08, 2013
If you need a tool to make minor modifications in OpenStreetMap, Potlatch 2 is a useful choice as a fast and easy-to-use editor.more »
Bitcoin Basics Bitcoin Digital CurrencyJan 29, 2013
Bitcoin is a decentralized virtual currency, popular with hackers and the open source community. We’ll explain how the money is created and how it works.more »
Maluuba nAPI Natural language processing with Maluuba’s nAPIJan 23, 2013
Add natural language processing to your own applications with Maluuba’s Natural Language API (nAPI).more »
Avoiding Eye Strain Color Temperature ToolsDec 28, 2012
Do you have problems getting to sleep after a late night computer session? Does the monitor brightness hurt your eyes? Several Linux tools are available that could help with these problems.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm