Viruses in Linux The ways of viruses in LinuxDec 31, 2005
Some say an attack is looming, and others say we don’t have to worry. What’s the real story on viruses in Linux?more »
Hardware Detection Bash-based hardware detection for PCI and USBOct 31, 2005
If you need fast answers for what's inside, you can use a Bash script to obtain an inventory of hardware on your Linux system.more »
Linux Flash Options A Look at Flash tools for the Linux environmentSep 30, 2005
Flash is today’s tool of choice for animated, interactive web content. But Flash and Linux are worlds colliding. We'll show you the current crop of Open Source Flash authoring solutions.more »
Admin Workshop: X Window Insider Tips: The X Window SystemAug 31, 2005
Thanks to automatic hardware detection, today’s admins rarely need to configure the X window system manually. But if you want to use X11’s excellent networking capabilities and tuning options, you will certainly benefit from some background knowledge.more »
Beagle The Beagle desktop search engineAug 31, 2005
To find files, music, messages, and photos in a single search, try this desktop tool with the power of an Internet search engine.more »
WineTools Setting Up Windows software on Linux with WineToolsAug 31, 2005
WineTools is an installation program that helps users set up Windows software on Linux without wasting time with experiments.more »
GPRS in Linux Mobile Internet access with GPRSAug 31, 2005
Permanent mobile Internet access might sound like a nightmare for some, but for others it is a dream come true. All you need is Linux and a fairly recent mobile phone.more »
Tellico Tellico Desktop DatabaseJul 31, 2005
Linux has a fantastic collection of database servers, but many users just want a simple desktop database. Tellico fills the niche.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm