Wiimote with Linux Using the Nintendo Wiimote with LinuxFeb 28, 2009
Nintendo's Wii game console includes the popular Wiimote control. Have you ever wondered whether the Wiimote works with Linux?more »
In Mystic Mine you guide a trolley through an old gold mine, switching rails at the right moment with a designated keystroke. It's the only normal thing about this new skill game from Koonsolo Games.more »
The LinCity-NG project takes after the classic SimCity, and with good effect. The new version enhances graphics and simulation logic.more »
Why not build bridges and towers out of little balls of goo? Thats exactly what Kyle Gabler and Ron Carmel asked themselves, and promptly they created an addictive puzzle game that resembles a mixture of Lemmings and a physics simulation. Much acclaimed by the games-world press, World of Goo is about to be let loose on Linux operating systems.more »
The "Yo Frankie" game is now available for free download in two versions, for Blender and Crystal Space.more »
Following the release of the Prey Demo, a Linux Client for the game is now available.more »
Information found by a reader on the Phoronix Internet page in the Microsoft game Left 4 Dead, appears to suggest that Half Life developer Valve Software, is currently working on a Linux client for its commercial platform Steam.more »
“Today we are marking a new milestone in the history of Multi Theft Auto [...] we have made the decision to re-launch Multi Theft Auto as an open-source project.” The developer announcement on the Grand Theft Auto website comes just before the official release of the multiplayer mod of GTA version 1.0.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm