Home Search
environment - search results
If you're not happy with the results, please do another search
GNOME 2.20 shows significant improvement
Author: Jeremy LaCroix
GNOME 2.20 was released yesterday. Even though I use GNOME regularly, I normally don't get excited over new releases, because most seem...
Internet services entrepreneur uses OSS to “decouple” software and hardware
Author: Tina Gasperson
BinHost, a Web hosting and Internet services company, launched in 2000, "a time when discussion and email lists were not particularly easy...
OS Security: Windows, Then Linux and Only Then Mac OS X
Outside of the race for the lion's share of the operating system market, the platforms from Microsoft, Apple and various distributions of Linux are...
Porting C/C++ sources from Windows to UNIX
Author: JT Smith
Software programs are often made to run on systems that are completely different from the system in which the program is coded...
Taming the GIMP with KDE window-specific settings
Author: Kirby Foster
KDE's window-specific settings feature gives you a fine level of control over the way windows behave. It lets you change settings such...
Internet Radio in NetBSD and Linux without KDE or GNOME
Author: JT Smith
Listening to Internet Radios seems easy nowadays with the rampant powerful graphical environments of KDE and GNOME. Given that the computer you...
Buddi: A simple way to track personal finances
Author: Dmitri Popov
Although the idea of using an application to manage your personal finances makes a lot of sense, not all of us have...
Linux on cell phones: the trend is up
Author: Murry Shohat
This summer, in a perfect storm of activity, the cell phone suddenly became a full-fledged wireless computer. Those prime-time TV commercials promoting...
ALT: Linux from Russia
Author: Susan Linton
Russia may have bowed out of the Cold War, but with the release of ALT Linux Personal Desktop 4.0, Russia has become...
Digital security with GnuPG plugins
Author: Peter Enseleit
The GNU Privacy Guard (GnuPG) allows you to encrypt, decrypt, sign, and verify communications and data, as well as create and manage...