Xrmap Viewing the world with XrmapMay 31, 2006
If you want to become an expert in world geography, why not get a little help from the CIA?more »
Command Line: at and cron Cron, atMar 31, 2006
The cron and at utilities help automate processes on a Linux system. You can set up automatic backups or even wake up in the morning with a track from your MP3 collection.more »
KTools: KreetingKard Designing greetings cards with KreetingKardMar 31, 2006
If you want to send your friends birthday greetings or a personalized picture postcard, KreetingKard can help.more »
Irssi Text-based chat with IrssiFeb 28, 2006
The Irssi console chat utility is powerful yet frugal with resources. And Irssi’s scripting features make it a giant among chat tools.more »
Command Line: Ispell and Aspell The Ispell and Aspell command line spellcheckersJan 31, 2006
Nobody is safe from typos and jumbled up words. Spellcheckers like Ispell and Aspell keep the letters in the right places.more »
Fortune Fortune cookies for LinuxJan 31, 2006
Fortune brings you a saying or a joke when you launch a terminal
session. Or you can attach a fortune to your email signature to
brighten up your messges.more »
Gimp and Photos Rescuing your vacation snapshots with GimpJan 31, 2006
Gimp will help you dial up the quality on your less-than-perfect digital
KPowersave Cutting power costs with KPowersaveJan 31, 2006
KPowersave gives KDE users a single easy interface for configuring power management settings.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.