Home Search

environment - search results

If you're not happy with the results, please do another search

GNOME 2.20 shows significant improvement

Author: Jeremy LaCroix GNOME 2.20 was released yesterday. Even though I use GNOME regularly, I normally don't get excited over new releases, because most seem...

Internet services entrepreneur uses OSS to “decouple” software and hardware

Author: Tina Gasperson BinHost, a Web hosting and Internet services company, launched in 2000, "a time when discussion and email lists were not particularly easy...

OS Security: Windows, Then Linux and Only Then Mac OS X

Outside of the race for the lion's share of the operating system market, the platforms from Microsoft, Apple and various distributions of Linux are...

Porting C/C++ sources from Windows to UNIX

Author: JT Smith Software programs are often made to run on systems that are completely different from the system in which the program is coded...

Taming the GIMP with KDE window-specific settings

Author: Kirby Foster KDE's window-specific settings feature gives you a fine level of control over the way windows behave. It lets you change settings such...

Internet Radio in NetBSD and Linux without KDE or GNOME

Author: JT Smith Listening to Internet Radios seems easy nowadays with the rampant powerful graphical environments of KDE and GNOME. Given that the computer you...

Buddi: A simple way to track personal finances

Author: Dmitri Popov Although the idea of using an application to manage your personal finances makes a lot of sense, not all of us have...

Linux on cell phones: the trend is up

Author: Murry Shohat This summer, in a perfect storm of activity, the cell phone suddenly became a full-fledged wireless computer. Those prime-time TV commercials promoting...

ALT: Linux from Russia

Author: Susan Linton Russia may have bowed out of the Cold War, but with the release of ALT Linux Personal Desktop 4.0, Russia has become...

Digital security with GnuPG plugins

Author: Peter Enseleit The GNU Privacy Guard (GnuPG) allows you to encrypt, decrypt, sign, and verify communications and data, as well as create and manage...