CSS Tricks Techniques for extending your website with CSSAug 31, 2008
Cascading Style Sheets (CSS) can do much more than define the color and font of your web text. We'll show you how to build the power of CSS into your web creations.more »
On August 20, developer Andreas Krennmair announced the official release of Newsbeuter, the “mutt of RSS feed readers.”more »
Journalists at the Olympic Games 2008 in Peking report that they do not have unrestricted Internet access. The GPL'd OpenVPN software can easily work around censorship of this kind.more »
Mozilla has just released version 3.0.1 of the Firefox browser; the first maintenance update removes a couple of vulnerabilities and fixes a some minor bugs.more »
Simile Semantic web tools of the Simile projectJul 02, 2008
The Simile project jump starts the semantic web with a collection of tools for extending semantic information to existing websites.more »
A web service filesystem Building a web service filesystem with SOAP and FuseJul 02, 2008
The Fuse kernel module lets developers implement even the most idiosyncratic of filesystems. We’ll show you how to build a filesystem that relies on SOAP to publish data over web services.more »
aMSN in Linux Reaching MSN networks from Linux with aMSNJul 01, 2008
aMSN lets Linux users communicate with associates on Microsoft instant messaging networks. In this article, we'll show you how to reach out to your friends in the empire.more »
Yahoo Chat Tools Video Chat with YahooJul 01, 2008
Kopete and Gyachi bring Yahoo videochat services to Linux.more »
MSBuild is now just another GitHub project as Redmond continues its path to the light.
Malware could pass data and commands between disconnected computers without leaving a trace on the network.
New rules emphasize collegiality in coding.
Upstart lands in the dust bin as a new era begins for Linux.
HP's annual Cyber Risk report offers a bleak look at the state of IT.
But what do the big numbers really mean?
.NET Core execution engine is the basis for cross-platform .NET implementations.
The Xnote trojan hides itself on the target system and will launch a variety of attacks on command.
Spammers go low-volume, and 90% of IE browsers are unpatched.
Adobe scrambles to release patches for vulnerable Flash Player.