KeyJnote Impressive presentations with KeyJnoteAug 01, 2006
KeyJnote is a PDF viewer with a difference, adding stylish 3D effects and powerful scripting to support impressive presentationsmore »
Command Line: mount & fstab Media access with mount and fstabJul 01, 2006
This month we look at tools for mounting and unmounting storage media.more »
WordNet Studying words with the WordNet lexical referenceJul 01, 2006
The WordNet lexical reference maps connections between words. Check out this fascinating tool based on language data from two decades of research.more »
Shredder_9_Chess_Too..> Synchronizing files with RsyncJun 01, 2006
Rsync lets you synchronize your data – on either a local or remote computer. You can even use Rsync with SSH to encrypt your data.more »
Dr. Geo Interactive geometry with Dr. GeoJun 01, 2006
Want to study math the easy way? This award-winning teaching tool lets you master Geo even if you aren’t Giotto.more »
JACK audio server Exploring the JACK sound server systemJun 01, 2006
The JACK audio server offers a professional sound alternative for the Linux desktop.more »
Xrmap Viewing the world with XrmapJun 01, 2006
If you want to become an expert in world geography, why not get a little help from the CIA?more »
According to a report, many potential victims of the Heartbleed attack have patched their systems, but few have cleaned up the crime scene to protect themselves from the effects of a previous intrusion.
DARPA and NICTA release the code for the ultra-secure microkernel system used in aerial drones.
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.