Thanks to I-Nex, users can see an overview of all their important hardware inventory information, such as graphics cards, processors, and hard drives.
With the right tools, you can create your own QR code squares with information you want to share on a business card, in a letter, or on your website.
The GNOME Outreach Program for Women has seen success that other programs set up to encourage women in FOSS have not. We look at some of the reasons why.
When something goes wrong on a system, the logfile is the first place to look for troubleshooting clues. Logstash, a log server with built-in analysis tools, consolidates logs from many servers and even makes the data searchable.
The appearance of new game engines with Linux support gives rise to hope that more games will start to appear in Linux versions. The free game engines are also getting better.
The latest version of Ardour – a full-featured digital audio workstation – offers some major new developments. We take a closer look.
flareGet accelerates your downloads and avoids the consequences of disconnections while downloading files.
What shines in the dark is often hidden by clouds. Stellarium provides a clear view of the stars plus a lot of astronomical data.
The Software Freedom Conservancy is raising funds to fill a major gap in free software functionality.
In December 2012, the open source world received the first, and very long awaited, release of the Samba 4.x series.
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm