Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 ... 5329 ) Next »

UNIX productivity tips in an office setting

  • IBM/developerWorks; By Michael Stutz (Posted by solrac on Sep 20, 2006 7:16 PM EDT)
  • Story Type: News Story; Groups: IBM
The language of the UNIX command line is notoriously versatile: With a panorama of small tools and utilities and a shell to combine and execute them, you can specify many precise and complex tasks. Learn how to use techniques unique to UNIX in an office setting, which become a powerful ally toward increasing your productivity.

Google China's open source ambitions

Google seems eager to become the front door to the open source industry. For Google China, however, open source holds an even greater importance to the company.

Point, click, root: System exploitation with open tools

IT managers face a problem determining what products and policies are best to properly secure their network. The problem with many security products is that it is hard to validate their claims. Penetration testing is a process for testing the security of networks by imitating an attacker.

Tech manufacturers rally against Net neutrality

At a press conference here, more than a dozen representatives from companies like Corning, Tyco and Motorola urged the U.S. Senate to pass a massive communications bill--attacked by Net neutrality fans for failing to ensure nondiscriminatory treatment of Internet content--as soon as possible.

7 basic software marketing techniques

  • Avangate; By Adriana Iordan (Posted by avangate on Sep 20, 2006 4:57 PM EDT)
  • Story Type: News Story
If you are a web developer that sells software online, here are 7 basic software marketing methods that will help you boost your sales. Learn about each one, and find the winning combination that will bring you more buyers.

Hacktivismo promotes anonymous, secure browsing

Torpark is a web browser designed to be copied to a USB key, based on Portable Firefox. When the key is plugged into any Windows computer, you can launch the browser directly from the key. The browser doesn't keep any cache files or data on the host system, and it uses the TOR network to anonymise all your data.

High integrity software

This book is the 2006 revision of the key guide to SPARK, a programming language founded on formal proof and static code analysis. This language happens to be implemented as an Ada dialect that makes use of formal comments to specify what the associated code is supposed to do, but it is not really Ada.

Must Have Applications for Linux Beginners

Switching to Linux is a huge step for those who still have some reservations about taking such a huge leap of faith. To make the transition as painless as possible, often times it simply helps to make sure that the person switching to Linux has a clear comparison of which applications they will be using on their new distribution.

DIY document management system with Simple Groupware

For most people, document management systems are overkill for keeping track of their documents. Usually, you don't need software that allows you to define elaborate document workflows or detailed version tracking. What you might need is a simple system that you can use to access and edit your documents on multiple machines, and then sync them with a file repository on a remote server.

GLPI - a great add-on to OCS Inventory

Like I wrote here already, I installed OCS Inventory on a test machine for my boss - and after checking it for a while, he came with the next wish, which was: “Install GLPI as well”.

The Next Level of Open Source

  •; By Scott Jaschik (Posted by Scott_Ruecker on Sep 20, 2006 1:41 PM EDT)
  • Story Type: News Story
In 2001, the Massachusetts Institute of Technology started placing materials for its courses online — and making them available for anyone to use, at no cost. OpenCourseWare, which currently contains materials for 1,400 courses, has been a huge success, and thousands of people use the MIT materials each day.

Google, the Associated Press, and the Fair Use Doctrine

  • Standards Blog; By Andy Updegrove (Posted by Andy_Updegrove on Sep 20, 2006 1:08 PM EDT)
  • Story Type: News Story
How much use is "fair use" when it comes to Web-based content? That's a question that I expected would receive more attention in the blogosphere when Google announced last month that it had reached a deal with the Associated Press that would permit it to continue to link to AP stories at the Google Website – for a price.

Securing Your Server With A Host-based Intrusion Detection System

  • HowtoForge; By Falko Timme (Posted by falko on Sep 20, 2006 12:36 PM EDT)
  • Story Type: Tutorial; Groups: Debian
This article shows how to install and run OSSEC HIDS, an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, rootkit detection, time-based alerting and active response. It helps you detect attacks, software misuse, policy violations and other forms of inappropriate activities.

Open Source presence at Institute of Navigation's Global Navigation Satellite Systems meeting in Fort Worth, TX next week

Next week, 26-29 September 2006, will be held the 19th Technical Meeting of the Institute of Navigation's Satellite Division. Amongst the hundreds of presented papers will be several on Free Software / Open Source applications for the Global Positioning System.

NSW state govt signals desktop Linux needs

The NSW state government yesterday went to market for its desktop, notebook and small server needs for at least the next three years, designating the ability to purchase Linux-based systems as "highly desirable".

Userful and Ubuntu Make Desktop Linux Even More Cost-Effective

Userful Corporation announces the wide-spread availability of its multi-station Linux software that enables Ubuntu users worldwide to easily add multiple workstations to their existing computers. Userful is pleased to partner with Ubuntu as an ISV to add robust, user-friendly multi-station functionality in the hopes that even more people will benefit from access to modern computer desktops.

Kernel Debugging Techniques

Chapter 14: Kernel Debugging Techniques, reprinted with permission fromEmbedded Linux Primer: A Practical Real-World Approach By Christopher Hallinan, Published by Prentice Hall

Linux: 2.6.18 Kernel Released

Linus Torvalds announced the release of the 2.6.18 Linux kernel, following the previous stable kernel release by three months. He exclaimed, "she's good to go, hoist anchor!", the second year in a row that a kernel release has coincided with 'Talk Like A Pirate Day'. "Here's some real booty for all you land-lubbers," Linus continued, "there's not too many changes, with t'bulk of the patch bein' defconfig updates, but the shortlog at the aft of this here email describes the details if you care, you scurvy dogs."

A conversation with Anthony Towns

Ever had the experience of contacting someone for an interview, getting the subject's agreement and then not being able to carry it through for some reason or the other?

Tonight on The Linux Link Tech Show

Tonight on The Linux Link Tech Show, episode 158:
Greg Boehnlein and Joe Brockmeier give us a preview of the upcoming Ohio LinuxFest
Allan talks about encoding video for his Nokia 770
Linc does a file server install
Pat installs Suse on his laptop
And much, much more

Be sure to check us out live every Wednesday night at 8:30 PM, EDT
Just point your favorite media player to any of the following streams:

You can also check out previous episodes from the download section of our home page

« Previous ( 1 ... 4048 4049 4050 4051 4052 4053 4054 4055 4056 4057 4058 ... 5329 ) Next »