WordNet Studying words with the WordNet lexical referenceJun 30, 2006
The WordNet lexical reference maps connections between words. Check out this fascinating tool based on language data from two decades of research.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncMay 31, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Dr. Geo Interactive geometry with Dr. GeoMay 31, 2006
Want to study math the easy way? This award-winning teaching tool lets you master Geo even if you aren’t Giotto.more »
JACK audio server Exploring the JACK sound server systemMay 31, 2006
The JACK audio server offers a professional sound alternative for the Linux desktop.more »
Xrmap Viewing the world with XrmapMay 31, 2006
If you want to become an expert in world geography, why not get a little help from the CIA?more »
Command Line: at and cron Cron, atMar 31, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
KTools: KreetingKard Designing greetings cards with KreetingKardMar 31, 2006
If you want to send your friends birthday greetings or a personalized picture postcard, KreetingKard can help.more »
Irssi Text-based chat with IrssiFeb 28, 2006
The Irssi console chat utility is powerful yet frugal with resources. And Irssi’s scripting features make it a giant among chat tools.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm