Asterisk Telephony with an Asterisk phone systemFeb 01, 2006
An old computer is all you need to build your own do-it-yourself personal phone server.more »
Linphone Internet telephony with LinphoneFeb 01, 2006
When you want to call your friends in distant countries, don’t pick up the phone; just put on your headset and fire up Linphone.more »
KPhone Internet telephony with KPhoneFeb 01, 2006
Internet telephony does not need to be complicated. You can talk to the world with just Kphone, a normal sound card, and an account with an Internet phone provider.more »
Voice over IP Intro Linux Tools for Voice over IPFeb 01, 2006
This month we’ll show you some popular Linux tools for Internet telephonymore »
VoIP with Skype A walk with the Skype VoIP clientFeb 01, 2006
The free but proprietary Skype is a popular calling option.more »
KlamAV KlamAV brings Clam Anti-Virus to your KDE desktopJan 01, 2006
Linux may not be as virus-ready as Windows, but who wants to harbor pointless malware? Now you can hunt for viruses with KDE's KlamAV, a desktop front-end for the ClamAV Open Source virus protection system.more »
Virus Checkers Virus protection tools for the Linux environmentJan 01, 2006
So you want a virus checker? We’ll show you what we found when we toured some of the top scanners for the Linux environment.more »
Kernel king admits his tone has alienated volunteers, but says the demands of the process require directness.
New flaw in an old encryption scheme leaves the experts scrambling to disable SSL 3
Lennart Poettering wants to change the way Linux developers talk to each other.
Enterprise giant frees itself from ink and home PCs (and visa versa).
Mozilla’s product think tank sinks silently into history.
TODO group will focus on open source tools in large-scale environments.
New tool will look like GParted but support a wider range of storage technologies.
New public key pinning feature will help prevent man-in-the-middle attacks.
Carnegie Mellon researchers say 3 million pages could fall down the phishing hole in the next year.
The US government rolls new best-practice rules for protecting SSH.