An up-to-date overview of free software and its makers
If you are familiar with Firefox, you will appreciate the integrated direct search feature. Again, Songbird emulates its role model from the Internet world. The search field, top right in the window, does not pass your search keys to an engine like Google or Yahoo; rather, it searches the internal media store, the Songbird website, the SkreemR MP3 search service, or the The Hype Machine, a music blog aggregator. If the Songbird window with its many features takes up too much space on your desktop, you can use Mini mode, which reduces the program to a single line containing just the controls and the title of the current track.
Friends of the veteran MP3 player, XMMS, or its Windows predecessor Winamp, will be familiar with this view mode, and it is no coincidence. After all, the Songbird team not only includes former Netscape and Firefox developers, but also some migrants from the Winamp camp.
Whether you like the Songbird interface design or not is a question of taste, and there's no arguing taste. Despite this, when it comes to an application that is used primarily for pleasure, the look is very important for many users. Fortunately, if you don't like the standard skin, you can customize Songbird.
Like other music players, Songbird supports themes or skins, although the developers have chosen a more exotic term for what is basically the same thing: feathers. Right now, the official site has just 18 feathers available for download. Whether or not the community provides more will depend on the extent to which it embraces the new program (Figure 3).
- Songbird: http://getsongbird.com
- XULRunner: https://developer.mozilla.org/en/XULrunner
- GStreamer: http://www.gstreamer.net
- Songbird packages: http://wiki.songbirdnest.com/Developer/Articles/Builds/Contributed_Builds
Buy this article as PDF
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm