Bashish Polishing the terminal window with BashishOct 31, 2006
Bashish adds a dash of style to the command line.more »
Charly's Column The Sysadmin’s Daily Grind: Surveillance with MotionAug 14, 2006
Commercial surveillance systems are expensive and typically involve maintenance agreements. I thought there must be a low-budget alternative.more »
KTools: KFlickr Managing photos on Flickr.com with KFlickrJul 31, 2006
The Flickr service is an easy way to publish your photos, and Kflickr is a handy Flickr interface. We'll show you how to use Kflickr to manage an Internet photo site from your KDE desktop.more »
The Future of Linux Graphics OpenGL and the Linux desktopJun 30, 2006
New technologies will change the way you view the objects on your Linux desktop.more »
X11R7 X.Org 6.9 / 7.0 – Next Generation X11Jun 30, 2006
The first major X release for over 10 years, X11R7, has finally adopted a modular approach. X11R6.9, which uses the same codebase, is the last monolithic release for existing systems.more »
Dr. Geo Interactive geometry with Dr. GeoMay 31, 2006
Want to study math the easy way? This award-winning teaching tool lets you master Geo even if you aren’t Giotto.more »
Xrmap Viewing the world with XrmapMay 31, 2006
If you want to become an expert in world geography, why not get a little help from the CIA?more »
Blender 3D Animation Creating animated characters with BlenderApr 30, 2006
Blender not only generates realistic single frames; it is also capable of capturing the natural movements of people and animals. We’ll introduce you to some of Blender’s animation features.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.