Burning with Brasero Gnome’s Brasero burning toolJul 31, 2007
Gnome’s integrated burning tool is fine for simple tasks, but if you need to do more than just back up a couple of documents on a CD, you might prefer a more powerful program like Brasero.more »
Firefly Audio Streaming Firefly Music ServerMar 31, 2007
The Firefly Media Server makes streaming music and Internet radio onto your home network for iTunes or Banshee clients as easy as pie.more »
Rockbox The Rockbox firmware alternative for the iPod and other MP3 playersFeb 28, 2007
Rockbox firmware brings new features to the iPod and a few other MP3 players. We’ll show you how to install Rockbox on an iPod, and with a little tinkering, you'll have the ability to play Ogg Vorbis files, customize the user interface, and add plug-ins.more »
Vnc2swf Screen Recorder Screen recording with Vnc2swfNov 30, 2006
If you want to offer visitors to your website more than a text-based howto, why not publish a video-based tutorial with Vnc2swf.more »
Banshee Mono jukebox for the Gnome desktopJun 30, 2006
In Irish mythology, the banshee’s mourning call is heard when a member of the family is about to die. The Banshee tool on Linux makes noise too, but for a far happier purpose. This banshee helps you organize your musical collection.more »
JACK audio server Exploring the JACK sound server systemMay 31, 2006
The JACK audio server offers a professional sound alternative for the Linux desktop.more »
Internet Radio Guide Favorite sites from the world of Internet radioApr 30, 2006
Take a tour of some favorite Internet radio sites from the experts at Linux New Media.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm