KTools: Kat Desktop Searches with KatDec 31, 2005
The Kat desktop search tool turns up more than text strings.more »
Gnome 2.12 A look at Gnome 2.12Dec 31, 2005
Gnome 2.10 reconquered many desktops with its return to values such as simplicity, clarity, and ease of use. The new Gnome 2.12 GNU desktop environment continues this emphasis on the basics.more »
deskTOPia: Trayer TrayerNov 30, 2005
Some applets deposit icons in the system tray of the KDE or Gnome task bar. If you don’t use KDE or Gnome but you still want the system tray applets, check out Trayer.more »
Evince The Evince document viewerNov 30, 2005
Evince is quickly becoming Gnome’s standard viewer for PDF and other document formats.more »
KTools: Yammi Quick searches and party fun with the Yammi music databaseNov 30, 2005
The compact Yammi  music database for KDE (Version 3.2 or newer) is a useful replacement for a jukebox.more »
deskTOPia: WindowLab The lean WindowLab window managerOct 31, 2005
If you are looking for a functional and fast desktop environment, try WindowLab. This minimalist window manager concentrates on what’s important and does without superfluous gadgets.more »
F-Spot The F-Spot image managerOct 31, 2005
Chaos is inevitable when your hard disk fills up with digital photos. The F-Spot image man agement program helps you manage your photo archives effectively and without time consuming sorting.more »
Practical Knoppix Expert techniques for getting more from KnoppixOct 31, 2005
Knoppix creator Klaus Knopper shares some tips for using Knoppix in the real world.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm