The Open Office project has just released version 3 of the free office package.more »
Web-based Office Tools Online office suitesJul 11, 2008
A mobile office without a laptop? No problem – a new generation of web applications converts your browser into a word processor or spreadsheet.more »
Office Suites A tour of OpenOffice alternativesJul 11, 2008
If OpenOffice is too fat and feature-rich for your taste, try one of the office alternatives. We found much to like and much to wish for when we put six office suites to the test.more »
ODF Compatibility Open Document Format in practiceJul 11, 2008
What happens when you feed an ODT document created with OpenOffice to a word processor like AbiWord, KWord, or Writely? Read on to find out.more »
ODF Add-in The Open Document Add-in for Microsoft OfficeJul 11, 2008
With a little help from the ODF plugin, Microsoft Office can open up documents saved in the free Open Document format. A short test reveals just how well it works.more »
Graphviz Graph visualization with GraphvizJul 10, 2008
Using drawing tools to manually create graphs and diagrams can be a slow and convoluted process. The Graphviz toolbox offers a faster way. Based on a short text with the information for the graph, Graphviz quickly generates a neat drawing.more »
Cabaret Stage Editing PDF documents with Cabaret StageJul 09, 2008
Linux has had the ability to display PDF documents for many years, but it lacked an editing tool until now: enter Cabaret Stage.more »
TeXmacs TeXmacs – A convenient layout program for your text documentsJul 09, 2008
If you need to lay out a text document, you can opt for a WYSIWYG application, like OpenOffice, or a genuine layout system such as TeX. TeXmacs combines the advantages of both approaches: premium document quality and intuitive controls.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm