Practical Ruby Projects Chapter 2: Making Music with RubyDec 21, 2008
Learn advanced programming techniques and explore Ruby’s full potential through a varied series of exciting projectsmore »
Adobe recommends that Linux Flash Player users immediately upgrade to the newest versions.more »
Moonlight is the name of Novell's Linux implementation of Microsoft's Silverlight 1.0 technology. Moonlight is now available in a Beta version for 32 and 64 Bit Linux systems, albeit only for Firefox users.more »
With the release of version 3.0, the development of Flowplayer's free Flash player has reached another milestone.more »
This past weekend has produced a version 1.0 of Processing, a Flash alternative product that runs under GPL.more »
Adobe cautions in an advisory against a whole series of flaws in Adobe Reader 8.1.2. Most of them also affect Linux.more »
Developers of the Gnu Image Manipulation Program Gimp have released the second bug fix for the Gimp 2.6.more »
The Gutenprint project develops filters for the Common UNIX Printing System (CUPS) to operate with a range of commercial printers. Gutenprint 5.2.1 is now available with numerous changes and improvements.more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.