KTools: Kmediafactory Creating video DVDs with KmediafactoryOct 31, 2006
If your holiday videos and TV recordings are fillng up your home computer, burn them onto a DVD with Kmediafactory.more »
MythTV Building a home media center with MythTVSep 30, 2006
MythTV and its extensive ecosystem of add-ons let you turn your Linux computer into a full-featured home media center.more »
Bitparade: Screencast Tools Comparing screencast applicationsAug 31, 2006
Screenshots provide a static impression of an active program, whereas desktop video sequences show the software hard at work. We’ll introduce you to some of the major tools for creating screencasts.more »
Perl: Internet Video Organizer Internet video organizer in PerlAug 31, 2006
Video files are ready for download, but your storage space is limited, and, if you're like most people, you may have a hard time letting go of past favorites. You need a higher authority to decide when it’s time to trim down your collection.more »
Blender 3D Animation Creating animated characters with BlenderApr 30, 2006
Blender not only generates realistic single frames; it is also capable of capturing the natural movements of people and animals. We’ll introduce you to some of Blender’s animation features.more »
KTools: Klear Digital TV with KlearApr 30, 2006
If you are weary of configuration battles with software for digital TV, try Klear, a TV system for Linux that is easy to install and use.more »
PSP Movies Showing Movies on a Playstation PortableFeb 28, 2006
You can use Linux to load movies on your a Playstation Portable (PSP) gaming console.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm