In contrary to recent reports, AMD staff has now announced that they will be providing ATI graphics processor specifications to driver developers with no ties attached.more »
When the Singapore Airlines Airbus A380 takes off for its maiden flight October 25, it will have a complete Linux client/server system on board.more »
Motion Detection Detecting movements with MotionAug 24, 2007
The motion detector software, Motion, monitors the video signal from one or multiple cameras and is able to detect whether a significant part of the picture has changed, record and track movement, or launch arbitrary external commands to trigger other actions.more »
Burning with Brasero Gnome’s Brasero burning toolJul 31, 2007
Gnome’s integrated burning tool is fine for simple tasks, but if you need to do more than just back up a couple of documents on a CD, you might prefer a more powerful program like Brasero.more »
Rockbox The Rockbox firmware alternative for the iPod and other MP3 playersFeb 28, 2007
Rockbox firmware brings new features to the iPod and a few other MP3 players. We’ll show you how to install Rockbox on an iPod, and with a little tinkering, you'll have the ability to play Ogg Vorbis files, customize the user interface, and add plug-ins.more »
Flash Player 9 Adobe’s Flash Player 9 for LinuxFeb 28, 2007
Adobe’s beta version of Flash Player 9 for Linux looks quite mature. Is it worth upgrading right now? This article looks into installing Flash Player 9 beta, and integrating a video camera and a microphone.more »
Vnc2swf Screen Recorder Screen recording with Vnc2swfNov 30, 2006
If you want to offer visitors to your website more than a text-based howto, why not publish a video-based tutorial with Vnc2swf.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm