- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||today's odds & ends:||srlinuxx||31/10/2009 - 10:46pm|
|Story||few howtos:||srlinuxx||31/10/2009 - 9:08pm|
|Story||Motorola DROID, Vodafone, Jabber on Palm Pre||srlinuxx||31/10/2009 - 9:03pm|
|Story||Firefox 3.6 Beta 1 review||srlinuxx||1||31/10/2009 - 9:00pm|
|Story||A visit to Microsoft's first store||srlinuxx||1||31/10/2009 - 8:58pm|
|Story||Experiencing Sabayon 5, oh!||srlinuxx||31/10/2009 - 6:55pm|
|Story||Sugar: The Cooler Desktop||srlinuxx||31/10/2009 - 6:53pm|
|Story||List of Slackware-based mini Distributions||srlinuxx||31/10/2009 - 6:51pm|
|Story||Apple Scuttles ZFS: Community Picks it Up||srlinuxx||31/10/2009 - 6:49pm|
|Story||Gedit: Don't Get Tricked by Its Simple Looks||srlinuxx||31/10/2009 - 5:03pm|
Dell Computer has reached agreement with 31 workers at its Nashville factory who left the firm after a disagreement over evening prayers.
Using a computer at home might actually reduce a child's performance in maths, science and English rather than improve it, a study has found.
A new UK website has launched, offering cash in exchange for second-hand phones.
Mopay says that if you send off your used phone - Freepost - to them they’ll send you a cheque in exchange. You can get a quote for your old phone online, before you send it in, and a cheque will arrive within an fortnight.
Intel's first 64-bit Pentium 4 microprocessors were quietly added to the company's price lists on Sunday, heralding their entrance into the marketplace.
Although, AMD chip retains the speed crown.
Identity thieves are going wireless in their quest to steal your personal info.
You may want to think twice before logging into a public wireless hotspot. Sure, grabbing a few minutes of connectivity is convenient, but identity thieves are discovering that, through "evil twin" attacks, hotspots are a great way to steal unsuspecting users' private information. So how does an evil twin attack work?
The Pacifier staring Vin Diesel was your basic Disney feel good movie. Formulaic, by-the-numbers plot and cookie cutter script are dressed up by an admirable performance from my favorite action hero and yours, Vin Diesel.
The Jacket was an imaginative pychological mystery with an intriguing plot and engaging dialogue. The actors did a marvelous job of portraying their characters. They made an unbelievable scenario plausible.
Notwithstanding the fact it will be many years before very many corporate users might be able to work in a "Microsoft-free" environment, there appears to be significant effort being put forth to make it a reality. From the geekiest tech pubs, like the Java Developer's Journal to august ones such as The Wall Street Journal, circumventing Microsoft is a hot topic.
Internet attacks on businesses and other organizations increased by about 28 per cent in the second half of 2004 compared with the first six months of the year, and hackers are setting their sights on the rapidly emerging mobile-computing market, warns a report on Internet security to be released Monday.
While Microsoft continues raising Longhorn, rivals are seizing the operating system's extended adolescence to develop competing feature sets of their own.
The already scaled-back version of Longhorn is still roughly 18 months from shipping, and with the expected technical advances by Linux competitors during that time, Microsoft's estimable industry influence to sell the product as currently constituted will be severely tested.
Are you a computer addict? ... or is someone you love a computer addict?
If so, you are not alone.
I have this friend who I believe has become addicted to her computer. It started out innocently enough with the purchase of a computer to do her bookkeeping, keep in touch with long distant friends and relatives, or a little light reading. Over the next year or so she began to spend more and more time on it and less and less with her friends. She became withdrawn from society and stopped participating in activities she used to enjoy. Call her anytime day or night and in asking "wha'cha doing?" she states "playing on the computer". I jokingly told her "I think you are addicted to that thing".
The New York Public Library is making more than 275,000 images available for personal use. Print and frame these vintage maps, rare prints and photos and create your own personal art gallery.
PLENTY OF US use Google's Gmail accounts on a daily basis. I, for instance, obtained my first account back in early June, 2004. It only took me 10 months to fill Google's until then considered "huge" storage space. See, one gigabyte is not so much after all when you start leaving all your email on the remote server.
Back in February, I started getting nervous when the space-metre at my Gmail account hit "95%". I asked my contact at Google in the UK what would happen when the account reached 100%. Would email start bouncing back to sender? Would I be alerted and given the option to "upgrade" for a fee to a bigger storage space?
More software and games are being sold overseas than are imported, a good sign for the economy, said the report. It shows the interactive entertainment industry is doing financially better than film and television industries. The rising cost of making games has meant many studios have closed however, sending talent overseas.
Submitted by Anonymous
Anonymous writes, "It took about 10-12 minutes to install. I selected the default installation. You need all 3 cd's if you are doing the default install though it appears to only need 3-4 packages from the 3rd cd.
Boot up speed was about the same as the x86 version. The noticable difference came after logging into the desktop. This is where you begin to notice the speed difference from accessing the menus to launching applications.
14 million games console owners are still at risk of waking up to find their Xbox has become an ex-box. For when Microsoft issued a safety advisory for Xbox customers last month, it failed to address the underlying problem.
Fraud by third-party merchants could hurt brand integrity, some experts say
John Wocher bought the camera of his dreams from a seller on Amazon.com with nary a second thought, gleefully anticipating its arrival after wiring $4,549 to zShop merchant awesomediscount.com in January.
As February approached, Wocher stepped up the frequency of his e-mails with the seller, asking for the UPS tracking number, his concern growing after he had so amicably arranged the wire transfer from his home in Japan.
When Joanne had a row with a longtime friend last year, she had no idea it would spill into cyberspace.
But what started as a spat at a teenage sleepover swiftly escalated into a three-month harangue of threatening e-mails and defacement of her Web log. "It was a nonstop nightmare," says Joanne, 14, a freshman at a private high school in Southern California. "I dreaded going on my computer."
The Presidential IT Advisory Committee (PITAC) has recommended the federal government sharply increase its spending on cybersecurity R&D and shift the focus to fundamental, long-term solutions to security challenges.
"The IT infrastructure is highly vulnerable to premeditated attacks with potentially catastrophic effects," PITAC warned in a letter submitting the report, titled Cyber Security: A Crisis in Prioritization, to the president. "These vulnerabilities put the nation's entire critical infrastructure at risk."
A bill introduced into the Illinois State House last December would supersede current ESRB ratings when it comes to video games with "violent and sexually explicit" content. The focus would be on isolating games deemed to have content not suitable for those under the age of 18 and would also attach a fine to retailers who violate the restriction on sales of those games.