- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||MS pulls download tool over GPL violation accusation||srlinuxx||1||10/11/2009 - 10:59am|
|Story||Where is the Linux desktop going?||srlinuxx||3||10/11/2009 - 10:48am|
|Story||5 More Free Linux Apps You Can't Do Without||srlinuxx||10/11/2009 - 10:34am|
|Story||Wonders from a KDE fan and developer about some KDE design choices||srlinuxx||10/11/2009 - 10:31am|
|Story||Good Karma||srlinuxx||10/11/2009 - 10:27am|
|Story||Firefox at 5: What We Love and Hate About You||srlinuxx||1||10/11/2009 - 10:18am|
|Story||OpenOffice distances itself from OpenOfficeMouse, joins everyone else||srlinuxx||1||10/11/2009 - 10:16am|
|Story||Advice Against Upgrading Ubuntu 9.04 to 9.10||srlinuxx||1||10/11/2009 - 8:46am|
|Story||GRUB 2.0 Fixes Security Issue||srlinuxx||10/11/2009 - 5:20am|
|Story||Using Kate As a Web Editor||srlinuxx||10/11/2009 - 5:10am|
At the Linux Desktop Summit in San Diego, van der Linden spoke with SearchOpenSource.com's MiMi Yeh about why applications are key to bridging the consumer gap and how Freespire, a new Linux distribution, will attract users to Linux.
I'm going to talk about the backbreaking labor of helping someone move and a seemingly unrelated topic, OpenOffice.org -- Microsoft Office compatibility. The two word processors are actually surprisingly similar; this article will show how doing things through the program features, rather than manually, helps you create documents that convert better between office suites.
"What's the deal with those 'delta' releases for SUSE 10.1? I can't get them to work." A "delta" to a program, in and of itself, is no good to man or beast. It's simply the code of the changes between one version of a program and another. To make use of a SUSE 10.1 delta, you first have to have a copy of the original code.
In my last article about IPsec we learned about the building blocks of IPsec in the Linux kernel. We took a look at the tools needed to build encrypted and secured data paths between two hosts. Now we'll use this knowledge and move a step further on.
Coverity, Inc., makers of the world’s most advanced and scalable source code analysis solution, today announced that as a result of their contract with US Department of Homeland Security (DHS), the biggest X Window System security vulnerability of the last six years was identified and fixed.
Google's Summer of Code has opened for student applications, and KDE is again seeking students to mentor over the holidays.
After discussing super block structure and its operations, we will discuss inodes today. Inodes is to file system what food is to any living creature.
"Most operating systems were developed for commercial or technical motives, but GNU was developed for the sake of giving users the freedom to cooperate in a community," said Richard Stallman, founder of the GNU Project. "If users don't know this, they will be in danger of losing their freedom."
There are times when finding out what processes are using certain resources is invaluable to an administrator or a regular user. Invariably, one will come across the extremely frustrating "umount: /media/cdrom: device is busy" or a similar error message.
Announced last week by Linux Game Publishing was word that Egosoft's X2 The Threat had finally went gold with its Linux port. Today at Phoronix, we are performing a GPU showdown with a handful of popular graphics cards to see what reigns supreme as well as looking at what will be required to appropriately run the game with Linux.
Sun Microsystems is about to up the ante in the open source race, adding a 128-bit file system to its Solaris 10 operating system so that users can leave behind any worries about ever exhausting their virtual memory space.
A root kit is a collection of programs that intruders often install after they have compromised the root account of a system. These programs will help the intruders clean up their tracks, as well as provide access back into the system. Root kits will sometimes leave processes running so that the intruder can come back easily and without the system administrator's knowledge !
Google said Tuesday that it has complained to the European Commission about the way that Microsoft bundles its own search mechanism in the newest version of Internet Explorer.
Open source software, and particularly Linux, is becoming a fundamental aspect of services portfolios for IBM Global Services, HP Services, Unisys, Novell and other major services providers.
Emu Software Inc., an open source management company, announces that they have achieved Novell Ready status for its open source NetDirector management system. The Novell Ready designation means that the product has been validated and enhanced to work with Novell's Linux family of products.
I bought an Aptiva in 1997 at an IBM sale. Slightly more expensive than I would have gotten a clone PC for, it was nevertheless a good purchase at the time. Its processor was a Pentium 200-MMX and it came with 16MB of RAM, a 5GB hard disk, and one USB ports. Now, what version of Linux could possibly load into a Pentium 200-MMX machine with 32MB of RAM?