Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 6659 6660 6661 6662 6663 6664 6665 6666 6667 6668 6669 ... 7359 ) Next »

First look: KOffice 1.5, part 1: The major applications

KOffice often gets overlooked in favor of rival office suite OpenOffice.org (OOo), which has a wider set of features, corporate backing, and cross-platform compatibility. However, the recent release of the KOffice 1.5 beta makes this a good time to take a closer look at the KDE suite's applications, features, and performance.

Using versioning for your configuration files

Some time ago I read an article about versioning your /home files with Concurrent Versions System (CVS). The article appealed to me because I like the idea of always being able to undo a mistake, compare my current work with a previous version, and keep a backup of my important files. But the thought that I would litter my home directory with a lot of CVS directories was enough to keep me from implementing it. Recently, however, I've thought about applying versioning to administration files.

10 boot time parameters you should know about the Linux kernel

The Linux kernel accepts boot time parameters as it starts to boot system. This is used to inform kernel about various hardware parameter.

Special: Defending Openness

  
If this threat is not dealt with swiftly and effectively, the main use of the word “open” in computing one day might be by anthropologists and historians as a quaint label for a sub-grouping in the increasingly marginalized hacker culture.

Microsoft Petitions US Courts for Help in EU Case

Microsoft petitioned several U.S. courts last week to force its competitors to turn over communications they've had with the European Commission regarding its antitrust battle against Microsoft. The Commission had previously declined the software giant's request for the documents, which Microsoft says shows it's "colluding" with its competitors and failing to meet its own transparency standards. Meanwhile, a Microsoft competitor derided the software giant's offer of Windows source code as a "poisoned honeypot."

Lotus Notes on Linux?

As Ross Burton first pointed out in his personal Blog and on planet.debian.org, there's an article at Groklaw where Andreas Pleschek from IBM, Stuttgart, Germany, announced Notes on Linux.

Tonight on The Linux Link Tech Show

Tonight on The Linux Link Tech Show, episode 126:
We talk to KDE/Plasma team member Jessica Hall
Photography tools for linux
GUI Admin tools for MySQL
More linux related podcasts & shows
And much, much more

Be sure to check us out live every Wednesday night at 8:30 PM, EST
Just point your favorite media player to any of the following streams:
http://www.binrev.com:8000/main
http://media.sysop.ca:8000/techshow
http://wdsmn.com:8000/techshow


You can also check out previous episodes from the download section of our home page

Open source: the future economy?

When people asked Captain Kirk of Star Trek how much he got paid for his job, he answered that in the future, we don't use money any more _ people just work for the betterment of mankind. The concept puzzled me from an economics perspective. But having observed the open-source movement in the IT realm, I am starting to comprehend one direction that the economy of the future might take.

My desktop OS: GRML

The best discoveries emerge from obscurity. My favorite discovery of last year was GRML Linux. You won't find this gem in the top 100 at Distrowatch, but if you ask me, it works better than all the usual names.

Emu Software Taps Open Source Veteran for Executive Team

Configuration Management Maker Adds Mark Hinkle as Vice President of Strategy and Business Development

Debian Weekly News - March 7th, 2006

  • Mailing list; By Martin Schulze (Posted by tadelste on Mar 8, 2006 1:28 AM CST)
  • Story Type: Newsletter; Groups: Debian
---------------------------------------------------------------------------
Debian Weekly News
http://www.debian.org/News/weekly/2006/10/
Debian Weekly News - March 7th, 2006
---------------------------------------------------------------------------

SFLC Comments On Alleged GPL Violations

Software Freedom Law Center Addresses Erroneous Interpretation of Sarbanes-Oxley as Applied to the General Public License

Cio primer: Virtualization basics

If there is one technology that took hold in the enterprise in 2005, it's virtualization. The software moved from test and development and into the data center faster than anyone imagined, including the experts. And while there are sure to be some bumps in the road in 2006 as the technology moves from awareness to adoption, you can bet most IT pros will be running virtualization in the data center before the end of next year.

MRTG Configuration in Debian

  • debianhelp.co.uk; By debianhelp.co.uk (Posted by gg234 on Mar 7, 2006 11:06 PM CST)
  • Story Type: Tutorial; Groups: Debian
MRTG Configuration in Debian: The Multi Router Traffic Grapher (MRTG) is a tool to monitor the traffic load on network links. MRTG generates HTML pages containing PNG images which provide a LIVE visual representation of this traffic.

Prepare to get Rational App Dev certified

This tutorial covers setting workbench preferences, working with views and perspectives,of the import and export wizards, using the Help features to aid in development , the resource Local History feature, and managing your workspaces in Rational Developer for WebSphere Software. It is the first tutorial in a series of seven tutorials created to help prepare for the RAD Certification Test 255.

Borland's Delphi goodbye

Stob Farewell my lovely

XenSource clears mind of CEO

Start-up XenSource has experienced its first growing pains in the form of a CEO swap and a few layoffs.

Review: MythTV 0.19

I've been a MythTV user since version 0.16, so I was happy to find out that version 0.19 is now available. MythTV 0.19 brings a number of improvements, new features, and added stability and usability.

Writing Behind a Buffer

  • LinuxSecurity.com - Feature Stories (Posted by tadelste on Mar 7, 2006 6:22 PM CST)
  • Story Type: News Story
In this paper we are going to describe a kind of vulnerability that is known in the literature but also poor documented. In fact, the problem that is going to be analyzed can be reduced to a memory adjacent overwriting attack but usually it is obtained exploiting the last null byte of a buffer, hence we are going to show that the same result is still possible writing behind a buffer, under certain conditions. To fully understand the subject of this article it's necessary to describe the memory organization1 of running processes, then the memory adjacent overwrite attack, concluding with our analysis.

Linux Call Center: Once Upon a Time in America

In 1998, I knew one person who used Linux. He and I ran Red Hat 4.2 and 5.0 on fast 486 Intel processors at Cap Gemini. One day I asked him who to call for support and he answered, "What"? So, I started a Linux call center.

« Previous ( 1 ... 6659 6660 6661 6662 6663 6664 6665 6666 6667 6668 6669 ... 7359 ) Next »