deskTOPia: Zufall and genbg Random backgrounds for the desktopSep 30, 2005
A new background image is the quickest way to liven up your desktop. Tools such as Zufall and genbg help you change your wallpaper auto matically.more »
GRAMPS Managing your family tree with GRAMPSSep 30, 2005
If you’re planning to study your family history, you’d better be ready to manage large amounts of data. Why not use your Linux box for the hard work?more »
Beagle The Beagle desktop search engineAug 31, 2005
To find files, music, messages, and photos in a single search, try this desktop tool with the power of an Internet search engine.more »
Celestia Touring the galaxy with CelestiaAug 31, 2005
Space, the final frontier, is a bit too expensive for a short vacation. If a trip to the moon is beyond your budget, why not try Celestia, a free program that brings the galaxy to the comfort of your home.more »
deskTOPia: tablaunch Quick launcher for the desktopAug 31, 2005
Desktop icons are not the only way to launch programs; in fact, a kicker that is not hidden by a muddle of windows is often preferable. Tablaunch is a flexible and attractive program launcher for the Linux desktop.more »
KTools: KMobileTools Accessing your mobile phone with KDEAug 31, 2005
Composing text messages on a mobile phone isn’t easy. A handy application called KmobileTools helps you manage your SMS messages and calls.more »
DeskTOPia: JWM JWM Window ManagerJul 31, 2005
JWM is a window manager for Linux users who demand an efficient GUI and are not afraid to fire up an editor to get it. If this sounds like the kind of tool you are looking for, read on to discover more about JWM.more »
KTools: KPager2 An alternative pager for the kickerJul 31, 2005
If you want a better view of your virtual desktops, try Kpager2, an alternative pager for KDE.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm