The great open source productivity suite settles into its new home with a new look and a little help from IBM.more »
Nepomuk Nepomuk-KDE and the quest for the semantic desktopApr 30, 2013
Nepomuk extends the tools of the semantic web to desktop applications and files. We look under the hood at this exciting technology and show you what Nepomuk is doing right now on the new KDE desktop.more »
Command Line – Aria2 Aria2 – Making your downloads sing your tuneApr 30, 2013
Downloading files is central to modern computing. Whether you use your browser's function or rely on more specialized tools, you won't find a more versatile utility than Aria2.more »
Exploring KDE 4.10 Just Before 5Apr 07, 2013
KDE SC 4.10 was released six months after KDE 4.9, adding many new features. In the background, work is in full swing for the next generation, KDE Frameworks 5: a KDE based completely on Qt5 and QML.more »
New X replacement will support the Unity desktop in future Ubuntu releases.more »
Table of Contents: 149 What's inside the April 2013 issueFeb 22, 2013
This month, we show you how to automate tasks in LibreOffice and give you some tools to tighten system security.more »
Coping with UEFI Coping with the UEFI boot processJan 23, 2013
The UEFI boot specification offers new capabilities – and new headaches – if you aren’t ready for it. Learn how one Linux user came to a truce with the new sheriff.more »
Discovering the New Gnome Gnome starts to reinvent itself, cautiouslyDec 28, 2012
The last few years have been troubled for the Gnome Project. Once a premier desktop environment for Linux, it has seen its market share diminish amid user dissatisfaction over Gnome 3 and accusations that the project was ignoring users. Yet, over the last six months, something important has been happening: Slowly and quietly, the members of Gnome have started trying to turn the situation around.more »
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm
Report from the X-Force group says attackers are using TOR to hide their crimes
Future Firefox extensions will be compatible with Chrome.
Better read this if you bought your computer before 2011
Users should upgrade to the new version as soon as possible
Xen project announces a privilege escalation problem for Qemu host systems
Attackers can compromise an Android phone just by sending a text message
PC vendor will pre-install Ubuntu on portables in India.