Nepomuk Nepomuk-KDE and the quest for the semantic desktopApr 30, 2013
Nepomuk extends the tools of the semantic web to desktop applications and files. We look under the hood at this exciting technology and show you what Nepomuk is doing right now on the new KDE desktop.more »
Command Line – Aria2 Aria2 – Making your downloads sing your tuneApr 30, 2013
Downloading files is central to modern computing. Whether you use your browser's function or rely on more specialized tools, you won't find a more versatile utility than Aria2.more »
Exploring KDE 4.10 Just Before 5Apr 07, 2013
KDE SC 4.10 was released six months after KDE 4.9, adding many new features. In the background, work is in full swing for the next generation, KDE Frameworks 5: a KDE based completely on Qt5 and QML.more »
New X replacement will support the Unity desktop in future Ubuntu releases.more »
Table of Contents: 149 What's inside the April 2013 issueFeb 22, 2013
This month, we show you how to automate tasks in LibreOffice and give you some tools to tighten system security.more »
Coping with UEFI Coping with the UEFI boot processJan 23, 2013
The UEFI boot specification offers new capabilities – and new headaches – if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
Discovering the New Gnome Gnome starts to reinvent itself, cautiouslyDec 28, 2012
The last few years have been troubled for the Gnome Project. Once a premier desktop environment for Linux, it has seen its market share diminish amid user dissatisfaction over Gnome 3 and accusations that the project was ignoring users. Yet, over the last six months, something important has been happening: Slowly and quietly, the members of Gnome have started trying to turn the situation around.more »
Tails Secure Distro Amnesiac IncognitoDec 04, 2012
These days, security and privacy issues are increasingly making the news, but where can the average free software user learn more about safer practices? One of the best answers I have found is Tails, a Debian-based distribution that seems as much about teaching users to make informed decisions as about the software itself.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.