If you can use your desktop environment, then you can also write programs: All you need is your mouse, the Alice IDE, and some time to experiment.
Most people are under the impression that Android is free software, so why the need for Replicant, a project that describes itself as a “fully free Android distribution”?
Many devices now run Linux – but mostly as closed source firmware that you cannot access. We show how to use OpenWrt to free the TL-MR3020 router from its proprietary firmware and convert it into an all-around server for your home network.
Linux users didn’t need the recent NSA eavesdropping scandal to convince them that securing communication was a good idea. For years, free software developers have been creating secure tools that offer similar functionalities to all of those popular but very leaky services with ridiculous names.
When memorizing facts, learning, storing, and processing internalizes the subject matter. The Fresh Memory program offers various methods to help you anchor the facts in your memory.
A new Linux terminal emulator tries to bring the command line into the 21st century and bridge the gap to the graphical user interface.
If you want to install Linux on an Android device, you have several options. We examine some of the possibilities.
Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.
With the right tools, you can create your own QR code squares with information you want to share on a business card, in a letter, or on your website.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.