Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
This article is a step-by-step guide to using two passwords with EncFS. The primary password is required and may be used to secure all data; the secondary password is optional and may be stored on USB stick or other removable media and used to secure more sensitive data. EncFS can also be combined with block [...]
What does Xandros get out of its recent deal with Microsoft? Well, for one thing, the well-known Linux desktop distributor will get Open XML/ODF translators for OpenOffice. These translators are being developed through the SourceForge-hosted Open XML/ODF Translator project. This is the same translation project that Novell and Microsoft have been working on for some time now.
Welcome to this year's 25th issue of DistroWatch Weekly! The first release candidate of Slackware Linux 12.0, Linus Torvalds' entertaining exchange with Sun Microsystem's Jonathan Schwartz, and Linspire's promise of a "better Linux" through a partnership with Microsoft were the most interesting headlines of the past week. We comment on these and other events of the week. In other distro-related news, the Debian project announces a tentative release schedule for Debian "Lenny", Max Spevack talks about the upcoming Fedora 8, and, in an exclusive DistroWatch interview, Adam Williamson introduces a number of projects that will shape the future of Mandriva Linux. Finally, don't miss the list of changes and updates to the DistroWatch package list as used for tracking version numbers of important software applications. Happy reading!
Michael Tiemann responds to the many people who have asked "When is the OSI going to stand up to companies who are flagrantly abusing the term 'open source'?" The answer is: starting today.
Since piloting this video series, we’ve received lots of questions about the XO’s mesh network. How can these laptops “talk” to each other even without widespread internet access? How is the network they create different from the network at your home or office? Episode 03 explains it all.
Learn how IBM Rational Software Development tools, their broad range of functionality and their use throughout the entire software development process leads to project success.
BSD is so mature, so orderly, so ... run by adults. Or so says the PR (what little there is). But whenever I try to actually run BSD, I run into trouble. I haven't tried any BSDs since my review of FreeSBIE back in April, so recently I figured I'd give some BSD distros a spin.
The Avon and Somerset Constabulary in Great Britain uses animations created with the open source tool Blender to help citizens understand how to protect their vehicles and possessions from theft.
This isn't the first Flash CS3 book review I've written so I have an idea of what to look for in a text on this topic. The other book, published by Adobe Press, received some less than complementary reviews on Amazon based on the report that steps were missing, keeping the reader from being able to adequately learn the technology. This point has been contested since I've heard from the author and his review of the book found no such flaws. While I thought the Adobe Press book was pretty good all and all, it's time to find out if this "Missing Manual" can rival or better...stand above the competition.
Vim users stick with Vim in no small part because muscle memory is so powerful -- once you've learned Vim's keybindings, it's possible to be extremely productive in Vim without ever taking your hands off the keyboard. If you'd like to imbue Firefox with Vim power, embrace the Vimperator extension. Vimperator turns Firefox into a no-nonsense, modal Web browser.
WordPress yesterday released WordPress 2.2.1, which incorporates a number of small bug fixes and tweaks, along with some security issues that make this a required upgrade.
It is possible to develop applications that employ both Java and PHP technology on AIX. In this article, learn how to connect the core application created in the second installment to a DB2 database for the storage of the survey questions and responses. Be sure to check out the two previous articles.
The KDE e.V. Quarterly Report is now available for Q1 2007, covering January, February and March 2007. Topics covered include the KDE PIM Meeting at Osnabrück in January 2007, progress on the Copyright Assignment (Fiduciary Licence Agreement) and reports from the Marketing Working Group, Human Computer Interaction Working Group, and Sysadmin Team. All long term KDE contributors are welcome to join KDE e.V.
There is no doubt that 3 February 1998 was a historic day. For it was then, at a meeting in Mountain View, that a small group led by Eric Raymond came up with the term “open source” as an alternative to the description “free software”. The question is, will history count 21 June 2007 as another such pivotal moment – the day that Open Source 2.0 was born?
This document describes how to install a Fedora 7 mail server based on Qmail Using Qmail Toaster. Qmail is an Internet Mail Transfer Agent (MTA) for UNIX-like operating systems. It is a drop-in replacement for the Sendmail system provided with UNIX operating systems. Qmail uses the Simple Mail Transfer Protocol (SMTP) to exchange messages with MTAs on other systems.
Using the Google Web Toolkit (GWT), a Java programmer can write rich Ajax applications completely in the Java programming language. Learn how Cypal Studio for GWT
helps create new GWT modules, supports the creation of remote procedure calls, and makes it easy to view and deploy your Web applications.
Most tutorials show you how to run PHP 4 & 5 simultaneously using CGI. We know CGI is not scalable. This article
shows how to run both instances in a scalable way. It even tells you how to run eAccelerator in both!
Organizations of all sizes need to mitigate the risk of insider threats. Misconduct by authorized users represents a grave threat to an organization. According to the 2005 Computer Security Institute and Federal Bureau of Investigation Computer Crime and Security Survey, organizations reported that computer intrusions from inside sources accounted for nearly half of all incidents. You can secure your network perimeter with intrusion detection systems, firewalls, and virus scanners, but don't neglect to monitor authorized users. The Linux Audit daemon can help you detect violations of your security policies.
Honolulu based Blue Cliff, Inc. has been awarded two contracts to install and implement the VistA Electronic Medical Record System. The State of Idaho Department of Health and Welfare (IDHW) awarded a contract for the installation and implementation of Blue Cliff's Open Source VistA (OS VistA) hospital information system at their Orofino, Blackfoot and Boise Idaho locations...
One of the main selling points touted by many Linux-oriented vendors is stability. Once a customer buys a subscription for an "enterprise" Linux or embedded systems product, the vendor will fix bugs in the software but otherwise keep it stable. The value for customers is that they can put these supported distributions into important parts of their operations (or products) secure in the knowledge that their supplier will provide updates which keep the system bug-free and secure without breaking things. This business model predates Linux by many years, but, as the success of certain companies shows, there is still demand for this sort of service.
« Previous ( 1 ...
) Next »