Home Search

applications - search results

If you're not happy with the results, please do another search

IP camera designs run Linux

TI is offering Linux camera application source code and free codecs with two new IP camera reference designs based on its RISC/DSP SoCs. The...

My First Linux Encounter or How to Switch to Linux

I was a Windows user for several years when I decided to switch to Linux, late 2005 or early 2006, I can't recall exactly....

Securing your network premises with Endian

Author: Cory Buford Unified Threat Management (UTM) devices unify all network security elements into a single device. They often include a combination of routing, firewall,...

Linux-ready AMC board rev’d to 2.16GHz

Performance Technologies (PT) announced a faster version of its Intel Core 2 Duo-based AdvancedMC (AMC)-format single-board computer (SBC) for communications, security, data acquisition,...

Ask Linux.com: document wrangling, lighter distros, and Boot Loops II

Author: Linux.com Staff In a world where anyone can ask, but few can respond ... they compress standard-out on the fly, impose order on...

Lancelot reaches Holy Grail of KDE menu

Author: Bruce Byfield KDE 4 is barely eight months old, and already it has three options for a main menu. Until now, users have either...

Red Flag Linux Olympic Edition fails to medal

Author: Preston St. Pierre Red Flag is China's biggest Linux supplier. The Red Flag Linux distribution is based on Red Hat Linux. Red Flag recently...

Linux mobile stack adds Flash

Azingo announced that its LiMo-based browser now integrates the Adobe Flash Lite 3.1 web multimedia technology. The integration of Flash Lite into Azingo Mobile...

Community service for free software users

Author: Drew Ames In recent years, Linux distributions have successfully made the transition from being the exclusive domain of technical users to being suitable for...

With Linux, Even Rootkits Are Open Source

Linux has traditionally been regarded as significantly more secure than other common platforms, and in particular the Windows line. Part of the security equation...