Asterisk Telephony with an Asterisk phone systemJan 31, 2006
An old computer is all you need to build your own do-it-yourself personal phone server.more »
Linphone Internet telephony with LinphoneJan 31, 2006
When you want to call your friends in distant countries, don’t pick up the phone; just put on your headset and fire up Linphone.more »
KPhone Internet telephony with KPhoneJan 31, 2006
Internet telephony does not need to be complicated. You can talk to the world with just Kphone, a normal sound card, and an account with an Internet phone provider.more »
Voice over IP Intro Linux Tools for Voice over IPJan 31, 2006
This month we’ll show you some popular Linux tools for Internet telephonymore »
VoIP with Skype A walk with the Skype VoIP clientJan 31, 2006
The free but proprietary Skype is a popular calling option.more »
KlamAV KlamAV brings Clam Anti-Virus to your KDE desktopDec 31, 2005
Linux may not be as virus-ready as Windows, but who wants to harbor pointless malware? Now you can hunt for viruses with KDE's KlamAV, a desktop front-end for the ClamAV Open Source virus protection system.more »
Virus Checkers Virus protection tools for the Linux environmentDec 31, 2005
So you want a virus checker? We’ll show you what we found when we toured some of the top scanners for the Linux environment.more »
New partnership will bring more and better CS training to US schools
Criminals offer online help over Tor network
Sophisticated malware is still present on Joomla and WordPress sites around the world.
Future versions of Ubuntu's code service will support the popular Git version control system used with Linux and other open source projects.
New release marks the arrival of AMD’s unified driver strategy.
A new study by IDC charts big changes in the big hardware market.
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.