Command Line: dd and mkisofs Creating ISO images with dd and mkisofsJul 31, 2006
Whether you are creating backups, rescuing data, or burning bootable CDs, dd and mkisofs help you handle the job in style.more »
KTools: KFlickr Managing photos on Flickr.com with KFlickrJul 31, 2006
The Flickr service is an easy way to publish your photos, and Kflickr is a handy Flickr interface. We'll show you how to use Kflickr to manage an Internet photo site from your KDE desktop.more »
KeyJnote Impressive presentations with KeyJnoteJul 31, 2006
KeyJnote is a PDF viewer with a difference, adding stylish 3D effects and powerful scripting to support impressive presentationsmore »
Command Line: mount & fstab Media access with mount and fstabJun 30, 2006
This month we look at tools for mounting and unmounting storage media.more »
WordNet Studying words with the WordNet lexical referenceJun 30, 2006
The WordNet lexical reference maps connections between words. Check out this fascinating tool based on language data from two decades of research.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncMay 31, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Dr. Geo Interactive geometry with Dr. GeoMay 31, 2006
Want to study math the easy way? This award-winning teaching tool lets you master Geo even if you aren’t Giotto.more »
Azure CTO says Redmond has already considered the unthinkable.
Lead developer quells rumors that the Debian version is slated for center stage.
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.