Brightside and Devil’s Pie Metacity add-ons Brightside and Devil’s PieAug 31, 2006
If the no-frills Metacity window manager doesn’t give you the functio nality you need, try the Metacity add-ons Brightside and Devil’s Pie.more »
KTools: Beagle Helpers Desktop searching with Beagle on KDEAug 31, 2006
If you have given up hope of ever finding your way around the mess of data on your desktop, a desktop search engine can help you penetrate the gloom. Kerry and KBeaglebar bring the Beagle engine to the KDE desktop.more »
StoryLines Writing fiction with Writer’s Cafe and StoryLinesAug 31, 2006
If you’re looking for a way to organize your next novel, try StoryLines and the Writer’s Cafe suite.more »
Command Line: dd and mkisofs Creating ISO images with dd and mkisofsJul 31, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
KTools: KFlickr Managing photos on Flickr.com with KFlickrJul 31, 2006
The Flickr service is an easy way to publish your photos, and Kflickr is a handy Flickr interface. We'll show you how to use Kflickr to manage an Internet photo site from your KDE desktop.more »
KeyJnote Impressive presentations with KeyJnoteJul 31, 2006
KeyJnote is a PDF viewer with a difference, adding stylish 3D effects and powerful scripting to support impressive presentationsmore »
Command Line: mount & fstab Media access with mount and fstabJun 30, 2006
This month we look at tools for mounting and unmounting storage media.more »
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm