Home Search

bit - search results

If you're not happy with the results, please do another search

Linux: Tuning up your hard disks using hdparm.

Nukes writes "hdparm is a tool for altering various parameters associated with IDEdrives (Not SCSI). This involves things like the block prefetch, the DMA/PIO...

Report from the KDE World Summit: Day six

Author: Tom Chance Wednesday at aKademy provided KDE hackers with their first day without a special focus. The KDE PIM (Personal Information Management) developers had...

Open Source Localisation Conference

Karl Kelly writes "LRC '04 Open Source LocalisationThe Localisation Research Centre's annual localisation conference will take place this September at the University of Limerick...

XML-based documentation using AurigaDoc

Author: Scott Nesbitt One XML's many uses is creating documentation. XML is incredibly well suited to producing output in multiple formats -- everything from HTML...

LDP Weekly News – August 25, 2004

The Linux Documentation Project Weekly News Issue Number : 33 & 34 Publication Date : 2004-08-25 Table of Contents 1. New document proposals 2. Updated HOWTOs, FAQs and Guides 3....

Cliff’s List Filter – Aug 17-23

Author: Ian Palmer Welcome to this week's coverage of news from the Linux Kernel, GNOME, KDE and Mozilla developers lists. Up this week: KDE...

First virus for AMD64 processors emerges

Anonymous Reader writes "Symantec Corp. announced on Tuesday that it has discovered the first "proof of concept" virus targeting AMD’s 64-bit processors. The virus is...

Email Sender ID: The hype and the reality

Author: Joe Barr There are a number of promising technical papers under consideration by the Internet Engineering Task Force which deal with the ever-growing problem of spam....

PHPlist: Not your everyday Mailman

Author: Sean Michael Kerner Like many (if not most) open source developers, I use Mailman, the GNU mailing list manager, for all of my newsletter...

Securing Web services: Be your own CA

Author: Jeffrey L. Vagle In this article we continue our discussion of some of the foundations of public key infrastructure (PKI) that we began in...