Firefox features many high-quality extensions to help improve productivity, protect your privacy, and more.
An offline cache in your browser and a bit of HTML5 acrobatics combine for interactive web applications that keep working even when the Internet connection breaks down.
If you need a tool to make minor modifications in OpenStreetMap, Potlatch 2 is a useful choice as a fast and easy-to-use editor.
Bitcoin is a decentralized virtual currency, popular with hackers and the open source community. We’ll explain how the money is created and how it works.
After six years of development, founder Eben Upton and the other members of the Raspberry Pi Foundation are finally seeing the results of their efforts.
Red Hat peps up performance of multimedia applications on remote desktops with SPICE (Simple Protocol for Independent Computing Environments).
Do you have problems getting to sleep after a late night computer session? Does the monitor brightness hurt your eyes? Several Linux tools are available that could help with these problems.
The last few years have been troubled for the Gnome Project. Once a premier desktop environment for Linux, it has seen its market share diminish amid user dissatisfaction over Gnome 3 and accusations that the project was ignoring users. Yet, over the last six months, something important has been happening: Slowly and quietly, the members of Gnome have started trying to turn the situation around.
If you have enabled IPv6 on your network without considering basic security issues, you might have opened up a hole for attackers. In this article, we demonstrate a successful attack on a server via IPv6 and explain how the popular security tools handle IPv6.
Hdparm is the tool to use when it comes to tuning your hard disk or DVD drive, but it can also measure read speed, deliver valuable information about the device, change important drive settings, and even erase SSDs securely.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm