OpenML Multimedia applications with OpenMLJul 01, 2008
Programming multimedia applications in Linux used to be a tedious process, demanding specialized libraries and even custom code for addressing hardware directly. The OpenML library offers a simpler approach.more »
IEs4Linux Internet Explorer in Linux with IEs4LinuxJul 01, 2008
IEs4Linux lets web developers who work in Linux install Internet Explorer in just a couple of minutes to test their websites without booting Windows.more »
DDCcontrol Convenient display setup with DDCcontrolJun 30, 2008
If you like to customize display settings, you might try DDCcontrol – a tool that takes the headaches out of display configuration.more »
Charly's Column The Sys admin’s daily grind: NttcpJun 30, 2008
Some weather forecasts give you the temperature and a windchill adjustment, and a similar forecast for bandwidth would be helpful. If you feel the bandwidth is too low – and it always is – you need some kind of measuring instrument to reveal the truth.more »
Xnee Recording and playing back screen activityJun 30, 2008
Xnee, Gnee, Cnee, and Pnee – these strangely named tools record and play back mouse and keyboard actions.more »
Tin Newsreader Getting started with the Tin newsreaderJun 30, 2008
Spartan, but functional – the Tin newsreader does without optical gadgets and concentrates on core Usenet-related functionality.more »
Workspace: GTD-Based Task Managers Applications for getting things doneJun 20, 2008
Task managers can help you get things done, but the first task is to choose the application that meets your needs. We take a closer look at iKog, Thinking Rock, and MonkeyGTD and recommend a few other GTD managers you might want to take for a spin.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm