Gnome 2.12 A look at Gnome 2.12Dec 31, 2005
Gnome 2.10 reconquered many desktops with its return to values such as simplicity, clarity, and ease of use. The new Gnome 2.12 GNU desktop environment continues this emphasis on the basics.more »
deskTOPia: Trayer TrayerNov 30, 2005
Some applets deposit icons in the system tray of the KDE or Gnome task bar. If you don’t use KDE or Gnome but you still want the system tray applets, check out Trayer.more »
Evince The Evince document viewerNov 30, 2005
Evince is quickly becoming Gnome’s standard viewer for PDF and other document formats.more »
KTools: Yammi Quick searches and party fun with the Yammi music databaseNov 30, 2005
The compact Yammi  music database for KDE (Version 3.2 or newer) is a useful replacement for a jukebox.more »
deskTOPia: WindowLab The lean WindowLab window managerOct 31, 2005
If you are looking for a functional and fast desktop environment, try WindowLab. This minimalist window manager concentrates on what’s important and does without superfluous gadgets.more »
F-Spot The F-Spot image managerOct 31, 2005
Chaos is inevitable when your hard disk fills up with digital photos. The F-Spot image man agement program helps you manage your photo archives effectively and without time consuming sorting.more »
Practical Knoppix Expert techniques for getting more from KnoppixOct 31, 2005
Knoppix creator Klaus Knopper shares some tips for using Knoppix in the real world.more »
deskTOPia: Zufall and genbg Random backgrounds for the desktopSep 30, 2005
A new background image is the quickest way to liven up your desktop. Tools such as Zufall and genbg help you change your wallpaper auto matically.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.