Linphone Internet telephony with LinphoneJan 31, 2006
When you want to call your friends in distant countries, don’t pick up the phone; just put on your headset and fire up Linphone.more »
KPhone Internet telephony with KPhoneJan 31, 2006
Internet telephony does not need to be complicated. You can talk to the world with just Kphone, a normal sound card, and an account with an Internet phone provider.more »
Voice over IP Intro Linux Tools for Voice over IPJan 31, 2006
This month we’ll show you some popular Linux tools for Internet telephonymore »
VoIP with Skype A walk with the Skype VoIP clientJan 31, 2006
The free but proprietary Skype is a popular calling option.more »
Traffic shaping with Trickle Accelerating downloads with TrickleDec 31, 2005
Is your Internet connection groaning under the load of too many simultaneous downloads? If so, try Trickle, a simple application that gives you more granular control over network traffic.more »
Automating FTP Building scripts for automated FTPSep 30, 2005
If you find your self executing the same few steps in FTP, you’ll save time and effort with a little automation.more »
SlimServer Music on the LAN with SlimServerJun 30, 2005
If you have a LAN in your home or office, why not use it for something really important – listening to music?more »
SSPE Security Policies SSPE: Managing security policies for multiple firewallsJun 30, 2005
The Simple Security Policy Editor (SSPE) helps you organize your network and keep track of security policies across multiple firewalls. You can reference a central policy to generate rulesets for packet filters and VPN gateways.more »
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.
Four-inch-long computer on a stick lets you boot a full Linux system from any HDMI display device.
New statute would require companies to report break-ins to consumers.
Weird data transfer technique avoids all standard security measures.
FIDO alliance declares the beginning of the end for old-style login authentication.