Tech Tools We thought you might be interested in the following new products and updatesMay 26, 2009
Professional users are always searching for an edge. Whether you work with Linux as a webmaster, programmer, system administrator, or security consultant, you know the best solution depends on finding the right tool for the job.more »
The Open Document Format (ODF) Alliance has analyzed whether Microsoft’s Service Pack 2 for Office 2007 fulfills the promise for compatibility with the free document standard. Their findings give little reason to hope.more »
In a recent blog, Sun developer Malte Timmermann took a position on the security concerns of the Ecole Superieure d'Informatique, Electronique, Automatique (ESIEA) in Paris-Laval, France. The subject was the vulnerability of OpenOffice, involving document macros, for example.more »
Cute but astute: the new minor version of OpenOffice can do more than ever, such as cast shadows, position chart axes and provide structured conversations through comments.more »
A recent test shows that the promised Open Document Format (ODF) compatibility of Microsoft Office Service Pack 2 is far from it. At least table calculations in Excel SP2 demonstrate big problems when converting ODF values.more »
Project Renaissance of OpenOffice.org opened up proposals for "Access Functionality" design changes for its office suite on April 20, 2009. The Impress presentation application was chosen as the Guinea pig. Deadline for submissions is just around the corner: May 4, 2009.more »
Fsniper Distributing files with FsniperApr 30, 2009
Every day, computers are inundated with hundreds of files. Fsniper welcomes the new arrivals and processes them according to rules that you define.more »
Workspace: Chandler Collecting and processing information with ChandlerApr 30, 2009
We'll help you organize your data with Chandler, an application that lets you gather information and then decide how to use it.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm