Viruses in Linux The ways of viruses in LinuxJan 01, 2006
Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?more »
Hardware Detection Bash-based hardware detection for PCI and USBNov 01, 2005
If you need fast answers for what's inside, you can use a Bash script to obtain an inventory of hardware on your Linux system.more »
Linux Flash Options A Look at Flash tools for the Linux environmentOct 01, 2005
Flash is today’s tool of choice for animated, interactive web content. But Flash and Linux are worlds colliding. We'll show you the current crop of Open Source Flash authoring solutions.more »
Admin Workshop: X Window Insider Tips: The X Window SystemSep 01, 2005
Thanks to automatic hardware detection, today’s admins rarely need to configure the X window system manually. But if you want to use X11’s excellent networking capabilities and tuning options, you will certainly benefit from some background knowledge.more »
Beagle The Beagle desktop search engineSep 01, 2005
To find files, music, messages, and photos in a single search, try this desktop tool with the power of an Internet search engine.more »
WineTools Setting Up Windows software on Linux with WineToolsSep 01, 2005
WineTools is an installation program that helps users set up Windows software on Linux without wasting time with experiments.more »
GPRS in Linux Mobile Internet access with GPRSSep 01, 2005
Permanent mobile Internet access might sound like a nightmare for some, but for others it is a dream come true. All you need is Linux and a fairly recent mobile phone.more »
Tellico Tellico Desktop DatabaseAug 01, 2005
Linux has a fantastic collection of database servers, but many users just want a simple desktop database. Tellico fills the niche.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.