Home Search

environment - search results

If you're not happy with the results, please do another search

Linux System Auditing by Example

CowGirl writes "Think you have a secure Linux system? Following best practices during installation and setup is a must, but if you haven't set...

Extending OpenOffice.org: Turning OpenOffice.org into a document conversion tool

Author: Dmitri Popov One of the less well-known features of OpenOffice.org is its ability to run as a service. You can put that ability to...

NFS Server and Client Configuration in Ubuntu

dave writes "NFS was developed at a time when we weren’t able to share our drives like we are able to today - in...

BitRock Develops Intsaller for MySQL Enterprise

Erica Brescia writes "The BitRock Custom Stacks enable MySQL Enterprise subscribers to be up-and-running with the open source database’s monitoring and advisory service with...

WinSCP 4.0 beta released

Martin Prikryl writes "Newest software was released by WinSCP. It allow secure file transfer between local and remote computer. Here the list of changes...

Dragonia Magazine: online magazine for Linux users

michuk writes "We are proud to announce the completion of an English version of the eighth issue of Linux users' Dragonia Magazine. In this issue...

Linux Setup a LightTPD chrooted secure webserver

Anonymous Reader writes "Security, speed, compliance, and flexibility--all of these describe LightTPD which is rapidly redefining efficiency of a webserver; as it is designed...

KDE 4.0 Live April Snapshot Screenshots

Michael Larabel writes "From a KDE SVN trunk snapshot on 04-18-07, we have a few KDE 4.0 screenshots to pass along today. Mind you...

A Quick Introduction to R

Guest writes "The aim of this article is to introduce the R environment and to show its basic usage. Only a small share of...

Certification on the upswing again

Author: Bruce Byfield After several years of decline, the demand for certification and training in GNU/Linux and other free software areas is stronger than ever....