Following security fixes for Firefox, Camino & Co, the developers of the Thunderbird email client have now taken steps to remove known vulnerabilities, closing down five security holes, one of which was and classified as critical.more »
Integrating Google Services Bringing Google applications to your desktopFeb 26, 2008
Just because Google’s services are web-based doesn’t mean you can’t use them from the comfort of your desktop.more »
FoxFilter and Public Fox Firefox content filtersFeb 25, 2008
Firefox has a reputation of being the most innovative Web browser. We show you how to apply Firefox’s distribution-specific tools to make browsing the web safer for your children.more »
Software as a Service Intro Studies in Software as a ServiceFeb 24, 2008
You can find a web service that does almost anything your home computer can do. This month we study some examples of Software as a Service.more »
The Mozilla Foundation today launched a new company, Mozilla Messaging Inc., which will be focusing on Internet based communications.more »
The Mozilla Foundation has removed at least ten vulnerabilities from its browser, three of which were classified as critical by the developers.more »
The popular free forum software, Phorum has just released a new stable version 5.2.5.more »
Wikia Search, a search engine with free algorithms was one of last year's most eagerly awaited projects. The wait is due to end January 7.more »
VMware bids for a stake in the container industry with a bold effort to integrate containers with its classic virtualization system.
3ROS attack tool lowers the technical bar so anyone can be an intruder.
Mozilla's latest browser offers powerful new privacy feature
If attackers are on your system, saving your passwords in a password vault is no protection.
Faulty hash algorithm persists, despite efforts by experts to raise awareness.
Powerful man-in-the-middle attack is now targeting online shopping.
Another high-profile coder says the kernel team needs a kinder, gentler culture.
Bug database has a bug of its own that could allow an intruder to create an unauthorized account.
Report focuses federal resources on achieving universal Internet access.
Leading browser makers say “no” to porous encryption algorithm