Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
Our Senior Editor puts years of home-renovating experience to work in planning computing, networking, RF, audio and video in his family's"ultimate" house.
Packet writing is a method of writing data on a CD or DVD in small increments. You can even delete or overwrite data like on a floppy diskette. Although packet writing could be a great solution for backups, especially when using the large DVD media, actually it’s not. Rewritable media wear out as you write, move, delete data and there is no way to predict when your files will get corrupted. Many CD/DVD media brands guarantee error-free usage for up to 1000 overwrites. Anyway, using rewritable media for critical backups is not really recommended, but they can be perfectly used as temporary storage.
The first test release of Fedora Core 5 provides an intriguing glimpse of what's coming down the pipe next February.
SecurityFocus interviews Ron Gula to get a glimpse of Tenable's upcoming free (but closed-source) Nessus 3 vulnerability scanner. The discussion looks at license changes, community involvement, daemon security, new features, GPL open-source versus free, NASL, and more.
Ubuntu is listed as the number one distribution at Distrowatch.com . Ever wondered why Ubuntu is so popular ? Here are 10 reasons why .
If you love the cool looks and diminutive size of Apple's Mac Mini but are unwilling to move from Windows or Linux to Mac OS, check out AOpen's stylish and capable MiniPC.
Like its Mac counterpart, the MiniPC measures 6.5 inches square and 2 inches tall. But instead of white, AOpen uses a silver finish featuring a grid of small dots on top and a blue-lit power button in front.
I’ve found this post on the blog of Ben Rockwood, explaining everything. Read about the death of Enlightenment.org. In short, the domain registration has expired, and the guy who is officially the owner has disappeared.
People have been warning new programmers about backticks for years; do a Google search for "shell security backticks" and you'll see what I mean. This is basic level stuff, and it is beyond incredible that it bit these guys. I would like to charitably assume that this was just an error of sloppiness; because it was "just a shell script" programmers who darn well do know better just didn't look very closely. But it's still disturbing, isn't it?
As I do my programming in GNU Emacs, it seems sensible to write it in Emacs Lisp so that I can run it directly in my Emacs buffer without having to call an external program. Emacs Lisp is an excellent language for this type of application, as it combines the power of Lisp with integration into Emacs, one of the most powerful text editors around.
Saturday, November 26, 2005: In what can be termed as a historic development in information technology, developers of some major Web browsers — Firefox, Internet Explorer, Opera and KDE's Konqueror have agreed on a common set of security features that must be present in Web browsers. These will be effected in future versions of these popular browsers. The decision has been reached to provide users with a richer, better browsing experience without compromising on security.
A post on the Austin Linux Group mailing list reminded me that I'd never gotten around to upgrading chinacat from Ubuntu 5.04 (Hoary Hedgehog) to 5.10 (Breezy Badger). ... I finally did so last night, and goodness! it was easy.
[Ed.- this is old news to oldtyme Debian users, but hey, we need happy news too. -tuxchick]
According to Gartner, just over 1 percent of companies were running Linux desktops and open-source office products in the fourth quarter of 2004. What's more, Gartner estimates that only 3.2 percent of non-consumer computer users will run Linux and open-source office products by 2008. Does this suggest Linux-based apps have hit a plateau or standstill? Or might it mean that open-source companies are simply challenged to improve products, marketing, and userability for desktop applications?
The Boston Globe should be ashamed of itself. Honestly, this story is so disgustingly guttery, it's hard for me to even write about it. A little character assassination in an attempt to discredit OpenDocument Format. Here's the ridiculous and squalid "investigative" reporting by the Boston Globe, "Romney administration reviewing trips made by technology chief." They are investigating and wonder if Peter Quinn, CIO for the Commonwealth of Massachusetts, is a perfect form filler-outer.
In part 1 of our look at Linux PAM, we learned how to remove the annoying failed-login delay, lock out users who have too many failed login attempts and how to set a restrictive fallback configuration. Today we'll look at Linux distribution differences, dig into the module types, what order to put things in, and what the different options mean.
[Ed.- Part 1 is here, and is linked in the article. -tuxchick]
This morning I received an email from Andy Oram at 6:59 AM telling me about the Story of Peter Quinn coming under investigation for traveling to open source conferences. Andy is my editor at O'Reilly and the best person I know. He immediately wrote an article called Another desperate attempt to discredit Massachusetts OpenDocument adoption
. I immediately submitted to Slashdot and Digg.com. I just saw the article on the front page of Digg.com
This article shows you a more practical approach to wireless compatibility. With some well-designed XHTML, a bit of CSS, and the media attribute, you can do wonders. Create more flexible, Mobile device ready, Web pages with XHTML and CSS.
Jeremy Jones is a script monkey who works for The Weather Channel as a software quality assurance engineer.
We spend so much time on the Web, it's only natural that small enhancements in the way we access it will lead to large gains in our yearly productivity. More than 100 million people have downloaded the Firefox browser to help them obtain that productivity. Developed by a small team of core engineers with the help of thousands of external developers, Firefox already has had an impact.
In this document I describe in short how to encrypt a device with one of the most contemporary methods, using dm-crypt and LUKS. Actually, devices cannot be encrypted. It’s the block devices which are volumes that can be. This means that you can encrypt a hard disk partition, a ZIP disk, a usb flash stick, or even a volume within a file.
Xbox-Linux Project has announced that they have startd a hacking project against Xbox360 – The Free60 Project, by porting Linux and Darwin onto this brand-new gaming console.
[ED: I dont know if this will be as easy as the old XBoxes were, but it will be interesting to watch. I am looking forward to seeing a lot of first gen XBoxes converted to doing something useful.]
« Previous ( 1 ...
) Next »