TeamViewer v8.0 offers new features for easier remote administration.more »
Index Search with Lucene Indexing and searching text with LuceneMar 15, 2013
Even state-of-the-art computers need to use clever methods to process ever-increasing amounts of document data. The open source Lucene framework uses inverted indexing for fast searches of document collections.more »
Interview – OpenDocument Documenting the OpenDocument FormatMar 15, 2013
We talk with Jean Hollis Weber, a volunteer with ODFAuthors, the LibreOffice Documentation team, and the Friends of OpenDocument Inc.more »
Charly’s Column – Dstat The sys admin’s daily grind: DstatMar 15, 2013
Occasional worries about the system status are part of the sys admin’s daily life, and admins usually keep a fat toolbox of top and stat tools to alleviate them. Charly says he can manage with just one multitool – for the time being, at least.more »
Charly’s Column: SendmailAnalyzer The sys admin’s daily grind: SendmailAnalyzerFeb 22, 2013
During the ongoing battle against spam, admins should inspect their troop’s battle lines from time to time. If you don’t relish the thought of counting the dinnerware, you can use the services of a logfile inspector like SendmailAnalyzer, which works surprisingly well with Postfix and the like.more »
LibreOffice Macros Automating Libreoffice with macrosFeb 22, 2013
in addition to its comprehensive tool set, Libreoffice packs a built-in Basic-like scripting language that can be used to automate repetitive tasks and extend the suite’s default functionality.more »
Table of Contents: 148 What's inside the March 2013 issueJan 23, 2013
Science fiction authors and high-tech visionaries dream of a future where humans and computers communicate in ordinary English. A new cloud-based tool brings that future a little closer.more »
Geary Email Client Managing email via IMAP with GearyOct 26, 2012
Managing email on an IMAP server is part of everyday business. The slim client Geary makes it as simple on the desktop as it is on many mobile devices – despite a few remaining shortcomings.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm