toolbox.com/blogs: Almost every aspect of our daily and business lives are stored on hard disks. But the hard disk is a mechanical device with moving parts. You know what that means. Eventually they will fail.
pcmech.com: aTunes is a full-featured audio player and manager, developed in Java programming language, so it can be executed on different platforms: Windows, Linux and Unix-like systems,
ghacks.net: Recent “upgrades” to Rhythmbox and Banshee which left either 1) much to be desired or 2) the application unusable made me take a look at Songbird.
geektechnica.com: Firefox has been a reliable browser for me for many years and it still continues to be so to a certain extend. However, over the last few releases Firefox has become bloated and slow. I have been looking for an alternative Linux browser. Here are 10.
technologytales.com: Using a command line tool like ImageMagick for image processing may sound a really counter-intuitive thing to do but there’s no need to do everything on a case by case interactive basis. Image resizing and format conversion come to mind here.
ostatic.com/blog: In my travels, I discovered David Zeuthen's informative peek at DeviceKit (and its use with and in lieu of HAL) in the upcoming release of Fedora 11.
kmandla.wordpress: Finally, about two years after originally hunting for a way to run a screensaver at the console, I have an answer.
lockergnome.com: How difficult is it to get NVIDIA or ATI cards working with the latest Ubuntu releases? When it came to using restricted drivers for my video cards, I opted to use the Envy utility.
desktoplinux.com: AVG Technologies has released a new version of its anti-malware software for Linux desktops. Available in licensed server and free workstation editions (pictured), AVG 8.5 for Linux combines email and file-server protection with streamlined scanning, new antivirus filtering, and improved performance.
blogs.techrepublic.com: Secure password storage is a big thing these days, particularly with the (good!) advice of not re-using passwords in more than one place. The thinking behind that is that if someone figures out a password for one service or Web site, they will not be able to re-use that password on other sites and further obtain access to your credentials and services.