deskTOPia: Trayer TrayerDec 01, 2005
Some applets deposit icons in the system tray of the KDE or Gnome task bar. If you don’t use KDE or Gnome but you still want the system tray applets, check out Trayer.more »
Evince The Evince document viewerDec 01, 2005
Evince is quickly becoming Gnome’s standard viewer for PDF and other document formats.more »
KTools: Yammi Quick searches and party fun with the Yammi music databaseDec 01, 2005
The compact Yammi  music database for KDE (Version 3.2 or newer) is a useful replacement for a jukebox.more »
deskTOPia: WindowLab The lean WindowLab window managerNov 01, 2005
If you are looking for a functional and fast desktop environment, try WindowLab. This minimalist window manager concentrates on what’s important and does without superfluous gadgets.more »
F-Spot The F-Spot image managerNov 01, 2005
Chaos is inevitable when your hard disk fills up with digital photos. The F-Spot image man agement program helps you manage your photo archives effectively and without time consuming sorting.more »
Practical Knoppix Expert techniques for getting more from KnoppixNov 01, 2005
Knoppix creator Klaus Knopper shares some tips for using Knoppix in the real world.more »
deskTOPia: Zufall and genbg Random backgrounds for the desktopOct 01, 2005
A new background image is the quickest way to liven up your desktop. Tools such as Zufall and genbg help you change your wallpaper auto matically.more »
GRAMPS Managing your family tree with GRAMPSOct 01, 2005
If you’re planning to study your family history, you’d better be ready to manage large amounts of data. Why not use your Linux box for the hard work?more »
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.
Klaus Knopper announces the latest version of his iconic Live Linux system.
All websites that use these popular CMS tools could be vulnerable to denial of service attacks if users don't install the updates.
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.