Firefox has built-in configuration variables to deal with external printing commands. Per default, it uses the UNIX lpr command to send print jobs to the printer. This setting can be overridden..
Lead Developer Eric Sandall talks about how Source Mage GNU/Linux started back in 2002. He explains his current position with the distribution and discusses his work.
For readers ofLinux Journal, "IP" almost certainly refers to the Internet Protocol, part of the TCP/IP suite that underpins the Internet. But to most people, if it means anything, "IP" refers to something known as "intellectual property". This widespread recognition is rather curious, because "intellectual property" does not exist.
Quick and simple comparison of the new version of Firefox (Firefox 3 Beta) and Firefox 2, showing some of the differences between them and using Screen shots.
In this tutorial, Part 1 on how to use Eclipse Europa for Web development using Java technology, PHP, and Ruby, we'll use Java EE for Eclipse to build a Web application for tracking and calculating baseball statistics. Also learn how to build a plug-in for Eclipse to define snippets that let you add code that follows enterprise standards.
Recently there has been much talk about RandR 1.2 support with RadeonHD and Nouveau (among other drivers), and as a result we have been asked many times now "what is RandR, and why do I care?" Well, RandR is the "Resize and Rotate" extension in X.Org and the v1.2 update introduces new functionality such as dynamic hot-plugging support for display devices. To help those who may be new to Linux or just never took advantage of this X.Org technology, we have written a brief guide with some of the RandR basics.
Urbis.com, written completely in Ruby using the open source framework Ruby on Rails, is yet another social networking site, but with a twist: it was created by a writer, for writers. Urbis.com founder Steve Spurgat is not a developer, but he knew right from the start he wanted his Web site to run on open source software. "I'm drawn to the community around it."
The good news for everyone is that you can get a good, solid laptop for under a grand these days. The bad news for Vista users is that many of those laptops, even though they're sold with Vista, have nothing like enough resources to run Vista decently.
But in these modern times it's not necessary to gain root privileges to commit nefarious deeds, yet the primary purpose of most security schemes is still to protect root. Users are considered dispensable, like the red-shirted crewmen on the original Star Trek series. As soon as a guy in a red shirt appeared, you knew he was going to be toast before the second commercial break. Think about it—what's the most important stuff on your computer? The system files? You can easily replace those. An attacker might still want to acquire root privileges so they can replace key system binaries to try to cover their tracks. But the system files themselves are not valuable. The valuable stuff sits in your home and other data directories. If you're storing sensitive data of any kind, such as databases full of customer data, that's what an attacker wants.
The Taiwanese tech heavyweight Asus has introduced a $400 laptop with most of the capability of a $2,000 Sony or Fujitsu subnotebook; the convenience and usability missing from members of Intel's Ultra Mobile PC (UMPC) club; and the goofiest name of the year. How does this Linux-based system stack up to other, larger systems? Surprisingly well...
Continuous Integration (or CI) is a process that consists of continuously compiling, testing, inspecting, and deploying source code. Get introduced to the fundamental aspects of Continuous Integration and the steps on how to set up a CI process using best-of-breed open source technologies.
Update to award-winning open source children's art software adds programmable plug-in support
openSUSE is one of the most popular free-software-only distributions, and it's jointly developed by Novell and members of the community. In the first week of November the openSUSE developers released installable live versions of the distro's latest 10.3 release, one each for KDE and GNOME desktop environments. The live versions are replicas of their install-only cousins in terms of software, and apart from a few quirks, they seem set to replace the older versions soon.
This article explains how you can download additional SpamAssassin rulesets resp. automatically update these rulesets with a shell script called RulesDuJour. These additional rulesets can increase your spam recognition rate dramatically. Most of the rulesets that RulesDuJour supports can be found on the SA Rules Emporium web site.
I made this same point over the weekend in a post or three. But when it comes from Linus Torvalds, it means more. When asked in an InformationWeek Q&A how Linux compares with Windows, Torvalds didn't go into a marketing discussion of Feature Y over Feature X. Instead, he discussed the strength of Linux's process/approach over Windows' "We are Microsoft--trust us to be your god" approach.
In a recent interview, Linux founder Linus Torvalds offered some of his thoughts on the progress of the Linux kernel so far and some ideas as to where development was headed for the year ahead.
One thing that Ubuntu has left half finished is power management. It goes a long way supporting standby, hibernation, laptop buttons and switches out of the box, but leaves many important features hard to configure. Currently at least two different systems coexist in a Ubuntu installation: laptop-mode-tools and acpi-support. Out of both we have powernowd and gnome-power-manager which only take care of a particular aspect. As you see there are too many programs doing small bits of a bigger job...
Most people lock their doors and windows, use a paper shredder to protect themselves from identity theft, and install antivirus software on their computers. Yet they routinely surf the Internet without giving a second thought to whether their browser is secure and their personal information safe. Unfortunately, it's easy for someone with nefarious intentions to use a Web site to glean data from -- or introduce spyware to -- your computer. Even worse, sometimes all you have to do is randomly click on a site to have your data probed in a most unwelcome way.
In a role created for him in February this year, Red Hat's president for the Asia-Pacific region is vocal about the power of "talent attracting talent" which, he believes, is vital to growing the business. "Since I joined the company earlier this year, we've brought in some executives who are veterans. We want this leadership to attract high-profile executives, to inspire, set the direction and to talk with key clients," Messer said.
Check out 3 ways to install wireless on Ubuntu Gutsy Gibbon; works out of the box, ndiswrapper and manual install.