MIDI with Linux Connecting a MIDI keyboard to your Linux systemNov 12, 2008
A MIDI keyboard is a useful extension to any audio workstation. Learn how to connect a MIDI instrument to your Linux sound studio through a MIDI interface device.more »
It might have been in an inconspicuous place on their Forums page where Creative Labs announced a new version of the Linux drivers for the Sound Blaster X-Fi and X-Fi Titanium series, but for owners of these sound cards, this news created somewhat of a sensation. The source code is not only readily available, but it's licensed under GPL v2.more »
Sockso Serving up music with SocksoOct 31, 2008
The Sockso music server offers easy listening regardless of your system or location.more »
Audacity and Normalize Digitizing musicOct 21, 2008
Interested in listening to yesterday's music with today's technology? This article describes how to convert LPs and cassettes into a format that you can play back on your computer.more »
Linphone, the audio and video software for Internet telephony based on the Session Initiation Protocol (SIP), includes extensive enhancements in its version 3.0.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
For many people, the summer is an ideal time to go on vacation. Summer of 2008 was also a productive time for Amarok developers.more »
Have you heard about Boxee? Boxee is a social media center based on the SourceForge.net Community Choice Award-winning XBox Media Center (XBMC) open source project.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm