Movgrab Downloading videos from YouTube or VimeoAug 23, 2012
Video portals such as YouTube or Vimeo offer a wealth of curious and entertaining short films. If you want to enjoy them offline, a small tool called Movgrab can help.more »
MyPaint Freehand drawing with MyPaintAug 23, 2012
MyPaint is a simple, intuitive, versatile paint program. The software, which is designed specifically for use with graphic tablets, promises users an experience similar to drawing with a pen or brush.more »
GIMP 2.8 An overview of the new features in GIMP 2.8Jul 24, 2012
Although the developers of GIMP version 2.8 have not achieved all their goals, they’ve awakened great expectations with some impressive new features.more »
Amahi Releases Ubuntu Edition
New Version of UndoDB Released
Black Duck Announces Code Quality Audit
digiKam Releases Version 2.7more »
Barcode Barcodes and 2D codes for allJul 24, 2012
Machine-readable codes aren’t just for big companies anymore. With the right programs and some low-cost hardware, you can create and read the most important codes.more »
Workspace: DIY Photo Publishing Pygmyfoto, a DIY photo publishing solutionJul 24, 2012
Photo publishing applications are scarce, so we show you how to build one.more »
Tintii Colorizing Enhancing photos selectively with TintiiJun 21, 2012
Tintii, a modest image-processing program, transforms color images into black-and-white pictures then enhances specific areas with eye-catching colorizing effects.more »
3D on Linux Three-dimensional movies on your home computer with Bino and a 3D monitorApr 24, 2012
The Bino media player supports various 3D formats and techniques. In combination with a D2342P monitor by LG, you can convert your home PC into a 3D movie theater for just a fistful of dollars.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm