When memorizing facts, learning, storing, and processing internalizes the subject matter. The Fresh Memory program offers various methods to help you anchor the facts in your memory.
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.
If you want to install Linux on an Android device, you have several options. We examine some of the possibilities.
Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.
With the right tools, you can create your own QR code squares with information you want to share on a business card, in a letter, or on your website.
The GNOME Outreach Program for Women has seen success that other programs set up to encourage women in FOSS have not. We look at some of the reasons why.
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.
The appearance of new game engines with Linux support gives rise to hope that more games will start to appear in Linux versions. The free game engines are also getting better.
The latest version of Ardour – a full-featured digital audio workstation – offers some major new developments. We take a closer look.
flareGet accelerates your downloads and avoids the consequences of disconnections while downloading files.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.