The US-wide sales ban of Microsoft Word spoken by a Texan court in August has been upheld.more »
News from around the globe.more »
Portable and Mobile Techniques for portable computers and mobile devicesNov 30, 2009
The arrival of Linux on portable and mobile devices provides so many interesting opportunities for customization. This month we look at Linux in portable and mobile environments.more »
Prune An Introduction to PruneNov 30, 2009
Have more fun with your GPS data with this easy-to-use Java-based tool.more »
Workspace: OpenOffice.org Macros OpenOffice.org and BilboblogNov 30, 2009
Dmitri shows you how to compose and publish your blog from OpenOffice.org.more »
acpid Hot Keys Custom hot key programming with acpidNov 30, 2009
A little research from the command line and a short script bends your keyboard to your will.more »
Accessing Linux from a Smartphone Connecting to your Linux system from a smartphoneNov 30, 2009
Tune in to your Linux laptop anytime from an iPhone or iPod Touch – or adapt this technique to reach your system from other mobile devices.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.