KTools: Yammi Quick searches and party fun with the Yammi music databaseNov 30, 2005
The compact Yammi  music database for KDE (Version 3.2 or newer) is a useful replacement for a jukebox.more »
Ripping Audio Streams Recording Internet audio streamsJul 31, 2005
FM no longer has the biggest selection of radio stations. Instead, you need an Internet connection. But how can you save a copy of your favorite web broadcast?more »
Podcatching Podcatching without an iPodJun 30, 2005
You don’t need an iPod to participate in the recent phenomenon known as Podcatching. We’ll show you how to receive and play back podcasts in Linux.more »
SlimServer Music on the LAN with SlimServerJun 30, 2005
If you have a LAN in your home or office, why not use it for something really important – listening to music?more »
Command Line: Music Tools Music tools for the command lineJun 30, 2005
You don’t always need a GUI-based tool to play MP3 and Ogg Vorbis tracks. In this month’s column, we look at tools for rocking from the shell.more »
Darwin Streaming Server MP3 and MPEG-4 with the Darwin Streaming ServerMar 31, 2005
Apple’s Darwin Streaming Server is a free version of the commercial Quicktime server. It can handle the seminal MP3 and MPEG-4 formats, and it has a web front-end.more »
Multimedia Intro Practical Multimedia Techniques in LinuxMar 31, 2005
You’ve been through the basics of playing sound and editing videos on your Linux system. Now take a step closer to the tools and techniques of the experts.more »
Command Line Converting Audio FormatsDec 31, 2004
The command line swings. In this
issue of “Command Line”we investigate
how you can grab tracks from
audio CDs and convert sound files to
other formats. No matter whether
you choose wav,MP3 or Ogg Vorbis,
you can rely on the shell to convert
your files.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm