Showing all newswire headlinesView by date, instead?
« Previous ( 1 ...
) Next »
Have an analytical mind? Like to cook? This is the site to read!
[Ed.- This is an excellent site that could teach traditional cookbook authors a few things. Bon appetit!]
This tutorial describes how to install a Proftpd server that uses virtual users from a MySQL database instead of real system users.
SonyBMG and First4Internet, the companies caught installing rootkit-like software on the computers of people who bought certain CDs, have taken their first baby steps toward addressing the problem. But they still have a long way to go; and they might even have made the situation worse...The update is more than 3.5 megabytes in size, and it appears to contain new versions of almost all the files included in the initial installation of the entire DRM system, as well as creating some new files. In short, they’re not just taking away the rootkit-like function — they’re almost certainly adding things to the system as well.
[Ed.- Now why are folks so upset over this? Shoo, just have a little trust.]
Open source code, written by a community of thousands of software developers, has always been made freely available. But there are ways of making money from it...
With the advent of high-speed Internet links from Internet Service Providers (ISPs), it's easier for users to host services on their home computers. But what happens when your ISP connection goes down? An obvious solution is to have a redundant Internet connection from another ISP. To help set up a Linux host with redundant Internet connections, this article covers the following essentials:
1. Configuring the host to properly handle inbound network connections from multiple ISPs
2. Load-balancing outbound network connections
3. Configuring various services to enable redundancy
4. Configuring firewall protection using ipchains or iptables
[Ed.- Linux has all the tools to implement just about any kind of networking scenario- you don't need to spend megabucks on pricey commercial widgets.]
All in all, Subversion is a fantastic tool, and one that I believe to represent the future of version control. However, this doesn't stop the snooty and recalcitrant proponents of commercial tools from claiming that Subversion is an inferior tool, and that everyone would be better off if only they would adopt a "real" tool. This claim, as far as I am concerned, is nonsense.
In dealing with said Philistines, it would seem that the most common complaint centers on Subversion's lack of deference to strict file locking. This is unfortunate, as said mechanism is in fact a crutch for a crippled process. If coordination of developers in your group depends on knowing who is editing what file, then, quite frankly, you are doing something very wrong.
[Ed.- Kuro5hin is the place for the finest in thought-provoking, elegant invective.]
Better late than never, the new Linux kernel, version 2.6.14, became available late last week. Originally, the latest kernel was to show up on Oct. 7. Linus Torvalds explained that the release been "delayed twice due to some last-minute bug-reports, some of which ended up being false alarms (hey, I should be happy, but it was a bit frustrating)."
... it’s about being friendly. As geeks, we tend to be terrible at it—I know I am. Don’t tolerate the bearpit. I don’t know about you, but I’ve been part of too many poisonous ‘communities’—places that were actively newbie hostile. No matter how often you have to do it, the right answer is almost never “Read The Fucking Manual”—even if the answer can be found there. Be polite. So what if the person asking you is clueless—they’re not the only one listening to you; maybe you just scared a listener who would be an asset to your community away.
We've previously covered setting up your own repository for the Debian's apt-get system, but we didn't cover managing automatic uploads. Thankfully this is a simple task with the reprepro, and dupload tools and a small amount of scripting.
The reprepro package is tool for creating an APT repository with a pool structure, the same type of structure the official Debian mirrors use.
The repository may:
Contain packages for multiple distributions: Stable, Unstable, Testing, etc. Contain packages for multiple architectures: x86, sparc, all, etc. Be managed quickly and easily.
Nokia is now shipping its Linux-based 770 Internet Tablet in Europe...It is available in twelve countries, and Nokia isn’t charging the same for it in all of them. The price ranges from 349 Euros to 369 Euros...According to the website Internet Tablet Talk, which is devoted to the 770, it will be released on November 10 in the U.S.
Interviews are one thing. Lobby4Linux has done our share of them and we enjoy the work. However, what we present to you here is much more than an interview. It is the Chief Executive Officer of a Major software company talking to us. Talking to you from his heart. Nothing held back...no qualifiers, simply open dialog with the Linux Community. There are some suprises within the following text...things that will suprise you about how Xara has developed their code. It is worth the read for that alone.
The Securities and Exchange Commission announced a warning yesterday for online stock traders to be careful in their online dealings.
This is the first warning of its kind from the SEC, and one prompted by an onslaught of complaints over the last few months. Just 6 months ago, this was not a concern for the SEC, Susan Wyderko told USA Today in an interview. A page has been created outlining how to protect yourself and what to do if you encounter a problem.
[Ed.- the article contains a number of excellent links, and the SEC's page is very good.]
Mark Jewell writes: "Similar proposals in Oregon and Texas have been shot down. But officials in several states including Rhode Island and Wisconsin express interest in moving to the new data standard, said Jack Gallt, assistant director of the National Association of State Chief Information Officers."
We have a shot at something good here...at least I am told it's good. From all the aggravation and gnashing of teeth I have witnessed, this is indeed a good thing.
Recently, I had a chance to vet information from a leaked document. The process usually involves verification of the original source through a number of techniques. I often find vetting leads to more discoveries which lead to more and more.
I call this last adventure an eye-opener. You might see it the same way. But let's keep this a secret between us. We wouldn't want the press to find out about it because they would certainly bury it.
A beautifully written article giving 5 Steps needed to beat a Mac in the Computer market.
4 out of 5 Internet users use Microsoft Internet Explorer as their web browser. Internet Explorer presents a critical security risk to systems that use it, allowing malicious websites to hijack their computers, infect them with viruses, and conduct identity theft. It is in the best interest of all Internet users to stop using Internet Explorer as soon as possible! There are free alternatives that offer quality as good or better than Internet Explorer. The following article will explain in greater depth the problems with Internet Explorer and what the alternatives are.
[Ed.- This is an excellent comparison and analysis that compares aieee I mean Internet Explorer, Firefox, and Opera. It even has pretty graphs comparing the number and severity of vulnerabilities and time-to-patch. Very good even for non-technical users and decision-makers.]
Internet Explorer still dominates the landscape with a recorded global usage of 85.45 per cent. In contrast to Microsoft's browser, however, which saw a 1.18 percent decline since the end of April, the open source browser saw its usage share increase, up 2.82 per cent.
The case has received a lot of attention in the open source and technology communities, in many ways because it is being seen as compelling evidence that devices with the potential to affect individuals' freedom or liberty - such as breathalyzers used in DUI cases and electronic voting machines in elections - should utilize open source software and be available for any citizen to review. And while open source software would prevent the need for a court order, the case is really about knowing that software is doing what it is designed to do.
..."If you're going to have a computer program that says somebody committed a crime, we get to know how its coming up with that answer."
« Previous ( 1 ...
) Next »