Home Search
applications - search results
If you're not happy with the results, please do another search
IP camera designs run Linux
TI is offering Linux camera application source code and free codecs with two new IP camera reference designs based on its RISC/DSP SoCs. The...
My First Linux Encounter or How to Switch to Linux
I was a Windows user for several years when I decided to switch to Linux, late 2005 or early 2006, I can't recall exactly....
Securing your network premises with Endian
Author: Cory Buford
Unified Threat Management (UTM) devices unify all network security elements into a single device. They often include a combination of routing, firewall,...
Linux-ready AMC board rev’d to 2.16GHz
Performance Technologies (PT) announced a faster version of its Intel Core 2 Duo-based AdvancedMC (AMC)-format single-board computer (SBC) for communications, security, data acquisition,...
Ask Linux.com: document wrangling, lighter distros, and Boot Loops II
Author: Linux.com Staff
In a world where anyone can ask, but few can respond ... they compress standard-out on the fly, impose order on...
Lancelot reaches Holy Grail of KDE menu
Author: Bruce Byfield
KDE 4 is barely eight months old, and already it has three options for a main menu. Until now, users have either...
Red Flag Linux Olympic Edition fails to medal
Author: Preston St. Pierre
Red Flag is China's biggest Linux supplier. The Red Flag Linux distribution is based on Red Hat Linux. Red Flag recently...
Linux mobile stack adds Flash
Azingo announced that its LiMo-based browser now integrates the Adobe Flash Lite 3.1 web multimedia technology. The integration of Flash Lite into Azingo Mobile...
Community service for free software users
Author: Drew Ames
In recent years, Linux distributions have successfully made the transition from being the exclusive domain of technical users to being suitable for...
With Linux, Even Rootkits Are Open Source
Linux has traditionally been regarded as significantly more secure than other common platforms, and in particular the Windows line. Part of the security equation...