Linux users didn’t need the recent NSA eavesdropping scandal to convince them that securing communication was a good idea. For years, free software developers have been creating secure tools that offer similar functionalities to all of those popular but very leaky services with ridiculous names.
When memorizing facts, learning, storing, and processing internalizes the subject matter. The Fresh Memory program offers various methods to help you anchor the facts in your memory.
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.
If you want to install Linux on an Android device, you have several options. We examine some of the possibilities.
Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.
With the right tools, you can create your own QR code squares with information you want to share on a business card, in a letter, or on your website.
The GNOME Outreach Program for Women has seen success that other programs set up to encourage women in FOSS have not. We look at some of the reasons why.
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.
The appearance of new game engines with Linux support gives rise to hope that more games will start to appear in Linux versions. The free game engines are also getting better.
The latest version of Ardour – a full-featured digital audio workstation – offers some major new developments. We take a closer look.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems