- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||some howtos:||srlinuxx||09/02/2010 - 5:22am|
|Story||Top 10 areas where open source leads the way||srlinuxx||09/02/2010 - 5:18am|
|Story||KTorrent: KDE’s BitTorrent client||srlinuxx||09/02/2010 - 5:17am|
|Story||KDE.org Relaunched for Software Compilation 4.4||srlinuxx||09/02/2010 - 2:39am|
|Story||Oracle Cuts Affect GNOME Accessibility Work||srlinuxx||09/02/2010 - 2:37am|
|Story||Dell Ubuntu Order Experience||srlinuxx||09/02/2010 - 2:33am|
|Story||The Linux Desktop Experience For 2010||srlinuxx||09/02/2010 - 1:57am|
|Story||10 Reasons Why the Linux Community Could Influence iPhone Sales||srlinuxx||09/02/2010 - 1:54am|
|Story||Dealing with bugs in Linux||srlinuxx||09/02/2010 - 1:52am|
|Story||How To Set Up MySQL Database Replication With SSL Encryption On Ubuntu 9.10||falko||09/02/2010 - 1:21am|
Linux Kernel 188.8.131.52 from the bugfix series includes security fixes: one for SCTP, one for UDF, and a local root user hole. The UDF deadlock might affect some of you using DVD applications, check the Wikipedia link for a description of UDF
AppArmor is a product that Novell acquired when they bought the company Immunix in May 2005. It provides an interesting alternative to traditional security measures. AppArmor works by profiling the applications that it is protecting. A profile records the files that an application needs to access, and the capabilities it needs to exercise, during normal, "good" operation. Subsequently, a profile can be "enforced"; that is, attempts by the application to access resources not explicitly permitted by the profile are denied. Properly configured, AppArmor ensures that each profiled application is allowed to do what it is supposed to do, and nothing else.
When I made the switch to Ubuntu Linux on my desktop computer (that is, if you can call triple-booting Windows XP, Vista, and Ubuntu a "switch"), I was a little worried about finding the applications and tools that would make me as productive working in Ubuntu as I am working on Windows.
The U.S. Federal Trade Commission (FTC) has formed an "Internet Access Task Force" to examine whether net neutrality advocates' fears of large broadband providers blocking or slowing Web content from competitors are justified, the agency's chairwoman said.
Nikto is an advanced web vulnerability scanner, which can help you expose the potential holes in your webserver (and thus allow you to fix them before malicious users attempt to exploit them). This guide will show you how to use its advanced scanning features to expose holes in your webserver which you never knew existed!
Novell recently released an updated version of Compiz for SLED10*. While I have not identified many changes that end users would notice, there is one that Nat Friedman first showed me at LinuxWorld Expo last week. The Scale plugin (which scales down all open windows on a desktop, allowing you to pick which you want to come make the active window) has gotten a cool improvement.
As a not completely new Linux user I have been frustrated over and over again at all the extra bloat and apps that I will never use that gets loaded onto my system when I do an install. Debian was the second distro that I tried and have used many others since, but I keep coming back.
Based on the successes of the tuXlabs schools Linux project in South Africa, the team members have started a company to continue the work. The new company, Inkululeku, will provide services to existing tuXlabs schools as well as look to perform new installations.
Novell hopes its newly-released Suse Linux Enterprise Desktop 10 will address problems that have plagued the Linux desktop realm. "Unlike previous versions of our Linux desktops which have potential challenges, our early adopters of [SLED] are very satisfied with the functionalities, together with the essential ability to customize their desktops."
Recently I needed to do some distance education; one of my coworkers wanted me to show him how to do software builds on Linux. The only problem was that I'm on the East Coast and he is on the West. How could I show him the build and install process? After considering some alternatives, we found our solution in GNU Screen.
Yes folks, that long rambling anecdote was all leading up to this point - a good boot loader, in this case GRUB, allows users to do wonderful things. Since finding this, I’ve checked it out and even Windows XP can be simultaneously hibernated with Ubuntu on my notebook, meaning that I can always have a session of each ready.
There are a lot of things that Linux users and developers say are good about Linux. But at least one notable Linux kernel developer sees plenty not to love.
While at LinuxWorld, I was contemplating how IBM's multi-billion dollar investment in free software has born fruit in the form of their hard sought after two inch rubber tux, when I met up with Robin Miller who interviewed me on the quality of this year's swag.
The Proliferation Committee of the Open Source Initiative (OSI) has published the first draft of a report that seeks to curb the proliferation of open source licences.
Grapple, developed by LGP, is designed to be a simple network layer, allowing the addition of multiplayer features to a game for as little as a dozen lines of code. However it is also fully featured, so if you want more from your networking, you can have it.
You've built a linux desktop. You've mounted the learning curve to configure the hardware (or paid someone else to do so) and you are able to do your own work on the machine. You've discovered that if you can point and click you can run a modern linux OS on your desktop. But how is it you will ever relate to the rest of the world?
Your computer running Linux somehow ran into a hardware glitch and had to be hauled to the neighborhood Computer service center. And you are asked to leave the machine at the service center and come back after a couple of days so that the technician can have a good look at it. But you are a bit worried because the harddisk contains the blue prints of the most secret project you are currently working on.
The very first part of troubleshooting is identifying the problem. That's not always easy even for skilled professionals. It's definitely not easy for the typical computer user, so when you get the call, what you are told may not match reality.