Mozilla has made itself into the draft horse for a new font format for the Web that some of its developers and independent font designers are currently hatching. Firefox 3.6 should be the first to support the new Web Open Font Format (WOFF).more »
Google Earth Exploring Google EarthOct 16, 2009
Google Earth lets you view the world from space and zoom in on towns, roads, and buildings. We’ll show you how to travel our planet’s surface, its cities, and even the sky from your desktop.more »
Introduction to the Google Tool Set Communicate, collaborate, and create with free tools from GoogleOct 16, 2009
Google believes most of what you do on a computer can happen in a browser window – from anywhere in the world. The versatile Google tool set brings that vision to everyday users, and it is all just a few mouse clicks away.more »
The Couturier Mono program merges multiple PDFs into a single file. It follows the old UNIX policy: one program for one task.more »
Cheese is a simple yet practical graphic tool that has been available to Gnome users for quite a while. Kamoso now provides KDE fans with their own solution.more »
Adobe has big plans for its Flash Player 10.1. The browser-based edition of its Player runtime should support multiple operating systems.more »
Perl: Sharpen Images Sharpen images with Perl and GIMPSep 30, 2009
How do you sharpen a digital image? A short introduction to the principles and a Perl plugin for GIMP help amateur digital photographers polish their snapshots in a professional way.more »
Veusz, a free plotting package for scientific data, is now available in version 1.5. Among the new features is support for Microsoft's EMF graphics format.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm