Internet Radio Intro Tuning in the world of Internet radioApr 30, 2006
Did you think the Internet was out of revolutions? With Internet radio, anyone can be a broadcaster. If you want to start broadcasting or podcasting, or even if you're just looking for the perfect station, check out this month's Internet Radio cover story.more »
Last.fm Creating a virtual radio station with Last.fmApr 30, 2006
Last.fm tracks your musical tastes and helps you find users with similar interests.more »
Podcasting with Audacity Recording Podcasts with AudacityApr 30, 2006
Create your own podcasts with the free and easy Audacity sound editor.more »
Streaming with Icecast Streaming audio with Icecast and MuSEApr 30, 2006
For live Internet radio, you need a streaming server. We’ll show you how to get started with Icecast, an open source streaming alternative for Linux.more »
Realtime Multimedia applications and the realtime priorityMar 31, 2006
Linux provides tools and patches for speeding up the priority of multimedia applications. So if you're not getting the performance you expect, try shifting into overdrive.more »
Mpeg Menu System V2 Creating a multimedia center with Mpeg Menu System V2Jan 31, 2006
You’ll forget you’re even working with a computer when you browse for your favorite videos, pictures, and audio files with Mpeg Menu System.more »
Solfege Learning music with GNU Solfege 3.0.0Dec 31, 2005
Solfege helps you advance your musical knowledge and lets you practice identifying intervals, scales, and chords.more »
LMMS Making Music with Linux Multimedia StudioNov 30, 2005
Linux has truly started to compete with Windows and MacOS as a platform for professional sound applications. Linux Multimedia Studio (LMMS) is a Linux sound tool that packs a variety of impressive features into a neat bundle.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm