Raspberry Pi Media Center The Raspberry Pi as a media centerMay 22, 2013
Tired of that big clunky media center unit taking up shelf space in your living room? We'll show you how to put together a tiny multimedia system with the versatile and ever-popular Raspberry Pi.more »
Stellarium Explore the Night Sky with StellariumMay 20, 2013
What shines in the dark is often hidden by clouds. Stellarium provides a clear view of the stars plus a lot of astronomical data.more »
Linux-Controlled Model Train Python, Linux, and Lionel trainsMay 20, 2013
Controlling a miniature train empire with concurrent Linux processes.more »
Simon Voice Control Controlling Linux with voice inputFeb 22, 2013
Simon is a sophisticated speech recognition tool with easy access to two powerful speech recognition engines, Julius and CMU Sphinx.more »
Workspace – Tools of the Trade Useful applications and tricksFeb 22, 2013
As someone who writes about Linux and open source software for a living, I have tools and tricks that are essential for my daily computing. In this installment of the Workspace feature, I share my personal favorites with you.more »
LibreOffice Macros Automating Libreoffice with macrosFeb 22, 2013
in addition to its comprehensive tool set, Libreoffice packs a built-in Basic-like scripting language that can be used to automate repetitive tasks and extend the suite’s default functionality.more »
Defragmentation Optimizing data organization on diskFeb 22, 2013
Defragfs optimizes files on a system, allowing videos to load faster and large archives to open in the blink of an eye.more »
Virtualizing Windows 8 Windows 8 with VMware and VirtualBoxNov 26, 2012
How does the latest Windows work in a virtual machine? We tried out Windows 8 as a guest system in vMware Workstation and virtualBox on Linux.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm