Workspace: OpenOffice.org Macros OpenOffice.org and BilboblogNov 30, 2009
Dmitri shows you how to compose and publish your blog from OpenOffice.org.more »
acpid Hot Keys Custom hot key programming with acpidNov 30, 2009
A little research from the command line and a short script bends your keyboard to your will.more »
Accessing Linux from a Smartphone Connecting to your Linux system from a smartphoneNov 30, 2009
Tune in to your Linux laptop anytime from an iPhone or iPod Touch – or adapt this technique to reach your system from other mobile devices.more »
About a half year after big technological changes, the KOffice project has released version 2.1 of its office suite, even if it's not quite ready for everyday use.more »
Charly's Column The sys admin's daily grind: ArchivemailNov 24, 2009
Charly loves to be organized, but he also likes to have access to mail that reached him when the dinosaurs were still roaming the earth.more »
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job. We thought you might be interested in the following new products and updates.more »
Gnome 2.28 What’s new with Gnome 2.28?Nov 23, 2009
New features and below-ground tweaks make the Gnome desktop lean and free of legacy ballast.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm