Media Player Roundup Comparing Linux media playersJan 26, 2010
We compare some popular Linux media players, including Banshee, Rhythmbox, Amarok, and Songbird.more »
The team at Ubuntu is trying to get users views as to which programs should be included in future versions of Ubuntu. The survey will be online until the end of January.more »
The annual OpenOffice conference takes place this year the end of September in Budapest. The project is also looking for suggestions for 2011.more »
Portable and Mobile Techniques for portable computers and mobile devicesDec 01, 2009
The arrival of Linux on portable and mobile devices provides so many interesting opportunities for customization. This month we look at Linux in portable and mobile environments.more »
Klaus Knopper is the creator of Knoppix and co-founder of the LinuxTag expo. He currently works as a teacher, programmer, and consultant. If you have a configuration problem, or if you just want to learn more about how Linux works, send your questions to: firstname.lastname@example.org »
gPhoto Remotely controlling digital cameras with gPhotoDec 01, 2009
Commercial software that lets users remotely control their camera usually is not available for Linux. gPhoto gives users a free alternative.more »
Prune An Introduction to PruneDec 01, 2009
Have more fun with your GPS data with this easy-to-use Java-based tool.more »
Qt for Maemo Coding for Maemo devices with QtDec 01, 2009
Write your own smartphone apps with Qt's toolkit for the Maemo platform.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.