Gnome Fonts Managing Gnome FontsJun 01, 2005
Linux’s text display still suffers from legacy issues, but it is well on the way to
recovering. This article explains how Fontconfig, X, and Gnome work together for
a brighter future.more »
KTools: Fonts in KDE Installing Fonts on KDEJun 01, 2005
A well chosen font is the perfect addition to your
Linux experience. KDE provides a number of tools
that help you cook up a really tasty alphabet soup
with very little effort.more »
Command Line: Browsers Command-line browsers Lynx, Links, and w3mMay 01, 2005
If you’re working at the command line and you need to reach the
Internet, or if you just want to convert an HTML file into neatly formatted
ASCII text, try a text-based web browser.more »
DeskTOPia: WMI WMI and the reincarnation of the keyboardMay 01, 2005
WMI is a lean and fast window manager with good
support for keyboard control.more »
Ktools: Basket Storing, sorting, and filing with KDE’s BasketMay 01, 2005
If you tend to collect information and then forget where you put it, a
KDE tool called Basket may be just what you need. Basket is a
handy container for documents, notes, images, sounds, graphs,
spreadsheets, and other files you may want to find later.more »
KDE Image Menu (Kim) Converting images with KimMay 01, 2005
With a Konqueror-integrated service menu called Kim, you can modify and manipulate image files through a handy context menu.more »
Hotplugging Hotplugging with Udev, HAL, and D-BusApr 01, 2005
Hardware which just works is what every user wants. Current Linux distributions go a long way to fulfilling that dream. In this article, we will be investigating how the hotplug system works.more »
Command Line: tr & dos2unix Using tr and dos2unixApr 01, 2005
The tr tool is a real wizard. This simple command lets you replace strings in text files. Whether you are replacing letters or just removing whitespace, you will be amazed at tr‘s versatility.more »
Should you trust an online service to store your online passwords?
New B+ board lets you build cool things without the complication of a powered USB hub.
Redmond rushes in to root out alleged malware haven.
New initiative will bring futuristic virtual reality effects to the web surfing experience.
Dyreza malware launches a man-in-the-middle attack that compromises SSL.
New cloud combines worldwide access with local attention to data security.
A first cousin of the recent Heartbleed attack affects EAP-based wireless and peer-to-peer authentication.
FOSS community acts to protect freedom of choice for laptop devices.
Quintessential open source browser shores up its market share with a step toward the proprietary dark side.
Authorities in 16 countries take action against users of the imfamous BlackShades malware tool.