- Latest Headlines
- Recent comments
- All-Time Popular Stories
- Hot Topics
- Latest Members
|Story||AMD Looks To Ramp Up Its Linux Engineer Count||srlinuxx||12/03/2011 - 9:12pm|
|Story||Crunchbang #! 10 Statler||srlinuxx||12/03/2011 - 9:10pm|
|Story||VLC Unleashed||srlinuxx||12/03/2011 - 9:09pm|
|Story||Growth of GNU/Linux on the Desktop||srlinuxx||12/03/2011 - 6:15pm|
|Story||FPS release weekend?||srlinuxx||12/03/2011 - 6:08pm|
|Story||openSUSE Weekly News, Issue 166 is out!||srlinuxx||12/03/2011 - 6:02pm|
|Story||My Thoughts On Unity||srlinuxx||12/03/2011 - 5:53pm|
|Story||Re-election of Debian DPL & Bits from Installer Team||cj2003||12/03/2011 - 4:30pm|
|Story||today's leftovers:||srlinuxx||12/03/2011 - 5:52am|
|Story||Linux AntiVirus: BitDefender||srlinuxx||12/03/2011 - 3:25am|
In this feature, we explore the plug-in components for MythTV and describe the capacities and functions of each one. We also give you a small taste of what's possible using MythTV's plug-in architecture. Without a modular framework, MythTV would fail to qualify as a convergent technology appliance.
There's a new bad guy in town. Just when you thought that Microsoft and SCO were the only gangsters in the software world, a new player has been muscling in on their territory -- or so you'd think from reading all the hype on the Internet. Reports tend to be confused and not many people have bothered to find out the truth: so that's what I've gone out and done.
As Microsoft gears up to release a new version of Windows Vista, the hype about operating systems is in the air again. For most people, the question is whether to upgrade or not, but if you want to try out a new operating system, check out the latest version of Ubuntu.
Shipping on November 3 was GoboLinux 013. For those that are unfamiliar with this install and LiveCD distribution is that among its many differences, it breaks away from the historical UNIX directory hierarchy. It is also a distribution tagged as not needing a package manager because the filesystem is the package manager. New in GoboLinux 013 is X.Org 7.1, KDE 3.5.3, GCC 4.1.1, and the Linux 2.6.16 kernel. Phoronix has some nice screenshots.
Which has more leverage in the marketplace — A) disclosure or secrecy? Which is more supportive of growing markets — A) public infrastructure or private platforms? Which is better for inventive entrepreneurs — A) sharing one's great ideas to drive development and adoption, or patenting and keeping secret one's "intellectual property"?
Many email administrators are turning to DNSBLs -- DNS Block Lists -- as useful weapons in the arsenal against spam. There are DNSBLs covering many aspects of the security spectrum related to spam. This article will introduce another useful application for the DNSBLs. I'll show how to use this valuable information source to diagnose and monitor the overall security level of a given network.
WordPress is a state-of-the-art semantic personal publishing platform with a focus on aesthetics, web standards, and usability. What a mouthful. WordPress is both free and priceless at the same time.
It has become something of a cliché that Linux has reached a critical point in its development and adoption. However, this is especially true now when we look at what events are lined up to occur in the near future, and particularly in the desktop area. Can we expect a sudden and dramatic shift to Linux on the desktop?
This brief guide shares the key steps necessary to create and manage other users, helps clarify some essential differences with other flavors, and provides tips regarding "root" user. Perhaps most importantly, these steps help empower the use of your Ubuntu system to become far more than just another desktop PC.
If you're looking for a crash course on Linux security, this is your guide to getting started. Bone up on the basics of working from the command line, get a few open source security tools, and discover SELinux and IT no-nos to avoid.
Some months back I read about the GPLv3 for the first time. Just like many I was compelled by the arguments of Linus against it more then by the arguments from the FSF for this new license. The other day I talked to some KOffice developers and we discussed the software patents issue and how that would actually work in real life.
The 126.96.36.199 stable kernel release is available. There is a long list of fixes in this one, at least one of those fixes is security-related.
Last week, I began a countdown of the ten reasons Linux and BSD are far superior to Windows. I received a huge response to the first installment, so without further delay, here's the final four reasons and my official response to some of the comments and criticisms I've received.
This month's Linux Gazette includes the following articles:
- Deploying IPCop
- Boosting Apache Performance by using Reverse Proxies
- Poor Man's Laptop
- Booting a Linux Box via a USB Micro Drive (USB-MD)
- Troubleshooting Apache using strace
- Classic Shell Scripting (Book Review)
This and more in this month's Linux Gazette.
Faced with new competitive challenges from Novell, Microsoft and Oracle, Linux seller Red Hat has begun promising protection against intellectual-property lawsuits.
I re-read the Microsoft-Novell announcement and thought about it some more. I wonder if the wording of the announcement is designed to stir up those within the open source movement/community who are branded by the "establishment" as radicals. You know, that is not the first time that has happened!
The Microsoft-Novell pact was welcomed Friday by OpenOffice.org, which said it's delighted as long as the deal leads to improvements to the group's free open-source applications suite.
bzip2 and bunzip2 are file compression and decompression utilities. The bzip2 and bunzip2 utilities are newer than gzip and gunzip and are not as common yet, but they are rapidly gaining popularity. The bzip2 utility is capable of greater compression ratios than gzip. Therefore, a bzip2 file can be 10-20% smaller than a gzip version of the same file. Usually,files that have been compressed by bzip2 will have a .bz2 extension.
The consensus among many Unix and Linux users seems to be that sudo is more secure than using the root account, because it requires you type your password to perform potentially harmful actions. While sudo is useful for what it was designed for, this thinking is flawed, and usually comes from inexperience.