Recoll Finding files with RecollMay 31, 2007
Whether you’re looking for a letter to the Internal Revenue Service or an email from an online trader, the Recoll desktop search machine will help you find it with just a few mouse clicks.more »
Looking Glass Touring Sun's 3D desktopMay 31, 2007
The Looking Glass 3D desktop environment offers an exotic new view of your workspace.more »
Living with Vista Windows in the world of LinuxApr 30, 2007
Home and business users are starting to wonder how Windows Vista will work with Linux. In this month’s cover story, we’ll show you Vista from the eye of Linux.more »
KTools: Spam Filter Removing spam mail with CRM114 and KMailMar 31, 2007
The CRM114 filter program, which is integrated with KMail, helps fight spam in POP3 and IMAP mailboxes. Because this flexible filter does not require server-side changes, it is a good choice for users without root access to their mail servers.more »
KTools: KMyFirewall GUI-based firewall configuration with KMyFirewallJan 31, 2007
Linux has a fantastic selection of firewalls for securing stand-alone computers or whole networks. Although you can use IPTables to set up a firewall, the configuration is often the most difficult step. KMyFirewall offers a powerful, user-friendly, GUI-based approach.more »
Vista and Linux A look at Linux with the latest Microsoft systemJan 31, 2007
Will your strategies of coexistence work for the newest version of Windows? We examined Windows Vista with an emphasis on issues of Linux compatibility.more »
KTools: Kbfx Exploring KDE’s Kbfx alternative menuDec 31, 2006
The alternative Kbfx menu offers flatter navigation and some interesting extras.more »
Gnome 2.16 What’s new in the new Gnome 2.16 desktop?Dec 31, 2006
The changes in Gnome 2.16 are more than cosmetic: the current release sees a leaner and faster version of the desktop.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.