- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||some howtos:||srlinuxx||17/04/2010 - 1:59am|
|Story||the Quest for the Perfect Desktop Linux||srlinuxx||16/04/2010 - 11:59pm|
|Story||A critique of some Ubuntu Critics||srlinuxx||16/04/2010 - 11:58pm|
|Story||ClearOS 5.1 review||srlinuxx||16/04/2010 - 11:56pm|
|Story||Fedora 13beta mini-review||srlinuxx||16/04/2010 - 9:59pm|
|Story||Security Features of Firefox 3||srlinuxx||16/04/2010 - 9:57pm|
|Story||Darkness Visible: Making Patent Absurdity Patent||srlinuxx||16/04/2010 - 9:55pm|
|Story||Closed source vendors hijack the term "open"||srlinuxx||16/04/2010 - 8:03pm|
|Story||Introducing SourceForge Downloads||srlinuxx||16/04/2010 - 8:02pm|
|Story||VLC 1.1.0 preview adds GPU acceleration||srlinuxx||16/04/2010 - 7:59pm|
There are times when you need to see what's running on another user's desktop. When you're both behind the same firewall, VNC is a good solution. But what happens when each user is behind different firewalls and you need a secure connection? Rob Reilly demonstrates how to make this happen.
Brute force attacks are a weekly issue on my Debian box and until now, I've manually managed my hosts.allow and hosts.deny files. The issue isn't so much the actual security threat as brute force attacks are usually unsuccessful, but seeing log files that are just loaded up with thousands of failed login attempts is unnerving at best.
Putting an open source-based laptop in the hands of millions of users around the world will help drive home the importance of non-proprietary development and applications, says Red Hat.
Beginning in March, customers of Open-Xchange, Inc. will have full access to and seamless integration with Linux-based Logon, File and Print services for Microsoft Windows workstations through Open-Xchange Server 5 – giving customers the option to fully replace Microsoft Exchange as well as Microsoft Windows Server.
Finally, some mouthwatering eye candy of the much awaited KDE 4. The maintainer of the Planet Diaz web site has been collecting screenshots and mock-ups of the current development of KDE 4 and posting them in the site's forums.
Although Symphony OS was still a prototype, rather than a usable distribution, it showed much promise and many users have been eagerly awaiting for further news about its development. What's new in Symphony OS, build 122?
Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. Here's how I installed it, guided by The Linux/Unix/BSD Install Instructions.
Most Linux users are familiar with the top command, typically used to examine the system load on a local PC and others on the network. However, have you considered using top to monitor your system automatically and to warn you when a server is being overloaded?
I had a chance at a special Apple event last week to get a closer look at Apple Computer's new MacBook Pro, the renamed Intel-based successor to the PowerBook unveiled by Apple CEO Steve Jobs two weeks ago. In fact, I had some real "pick it up and use it" hands-on time.
"Normally speaking, the source code is not the ultimate documentation of anything." What open source has that is really unique, however, can be summed up in one word, a word that's bandied about so often that it's almost lost its meaning: community. Proper documentation for open source software is notoriously lacking, but the shared body of knowledge of the developers and users of that software is available to anyone for the asking.
Here are the Step by Step tutorials how to setup Debian server this includes:
FTP Server Setup in debian
Webserver Setup in Debian
Samba Server Setup in Debian
Database Server Setup in Debian
Time clock sync for debian server
Mail Server Configuration in Debian
I've spent the last few months on the behind-the-scenes architecture of KStars. Since the port to KDE4 was going to be a major overhaul for us anyway, we decided to simultaneously do a major refactoring of how the data catalogs are represented in KStars. We're now using a hierarchical Composite/Component model, and it's working well.
The Hairy Geek was at the LCA2006 and has blogged every detail from start to finish. From the Miniconf Day 1 Part 1 to the Wrap-up events, he shares his experiences at this past week's LCA2006. Full Blogs.
Because MySQL is one of the best known database solution and a good, powerful and free alternative while working for any kind of application, I will try to explain connecting MySQL from ColdFusion on Linux and Windows platform.
The engineers at Logitech certainly have managed to get repeat customers with their exceptionally well-designed mice. In addition, Logitech always pushes new mouse technologies to the market along with jumping on existing bandwagons and they always manage to improve these designs from optical to laser technologies. But will it work in Linux?
Alan Cox, a lead Linux kernel developer and security architect, said that trusting computing has often been used to lock customers into buying a particular software and to prevent rival software makers from competing on that platform.