Charly's Column The Sysadmin’s Daily Grind: Surveillance with MotionAug 14, 2006
Commercial surveillance systems are expensive and typically involve maintenance agreements. I thought there must be a low-budget alternative.more »
KTools: KFlickr Managing photos on Flickr.com with KFlickrJul 31, 2006
The Flickr service is an easy way to publish your photos, and Kflickr is a handy Flickr interface. We'll show you how to use Kflickr to manage an Internet photo site from your KDE desktop.more »
The Future of Linux Graphics OpenGL and the Linux desktopJun 30, 2006
New technologies will change the way you view the objects on your Linux desktop.more »
X11R7 X.Org 6.9 / 7.0 – Next Generation X11Jun 30, 2006
The first major X release for over 10 years, X11R7, has finally adopted a modular approach. X11R6.9, which uses the same codebase, is the last monolithic release for existing systems.more »
Dr. Geo Interactive geometry with Dr. GeoMay 31, 2006
Want to study math the easy way? This award-winning teaching tool lets you master Geo even if you aren’t Giotto.more »
Xrmap Viewing the world with XrmapMay 31, 2006
If you want to become an expert in world geography, why not get a little help from the CIA?more »
Blender 3D Animation Creating animated characters with BlenderApr 30, 2006
Blender not only generates realistic single frames; it is also capable of capturing the natural movements of people and animals. We’ll introduce you to some of Blender’s animation features.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.