Home Search

install - search results

If you're not happy with the results, please do another search

Linux gifts for Christmas

Author: JT Smith Why not give Linux as a Christmas gift? MozillaQuest Magazine (MozillaQuest.com) suggests you do: "Are you looking for a neat and very...

MP3.com win in hand, he takes aim at Windows

Author: JT Smith InformationWeek.com has a feature on Michael Robertson, who's promising to deliver an operating system that can run both Windows and Linux applications....

Weekly news wrap-up: Microsoft sues Lindows over trademark, Red Hat considers trademark changes

Author: JT Smith - By Grant Gross - Linux start-up Lindows made the news this week, although probably not in ways it wanted to. You remember...

Roaming with your Linux laptop: Using QuickSwitch

Author: JT Smith - By Mohit Muthanna - Most Linux laptop users don't leave home without their trusted sword. They use it at home, at...

RedHat: Powertools: ‘Mailman’ update

Author: JT Smith Red Hat: "Updated Mailman packages are now available for Red Hat PowerTools 7 and 7.1. These updates fix cross-site scripting bugs which...

Web review: XL penguin boxer shorts — cheaper by the dozen

Author: JT Smith -by Tina Gasperson - Anybody want a 36-inch penguin? LinuxMall has those. This is the kind of thing that would be good for...

Caldera Open Sources AIM Benchmark under the GPL

Author: JT Smith aldera International, Inc. today announced it has made Suites VII and IX of the AIM Benchmark available under the GPL (GNU General Public...

Connecting a wireless laptop or notebook PC to a wired PC network

Author: JT Smith Reader writes: "MozillaQuest.com has a nice new series about wireless networking. In part 2 of the series, MozillaQuest Magazine reports : 'All...

Trustix: OpenSSH vulnerability

Author: JT Smith Trustix: "A malicious local user can pass environment variables to the login process if the administrator enables the UseLogin option. This...

Trustix: ‘glibc’ Security advisory

Author: JT Smith Trustix: "There is a problem in the glob(3) function of the Glibc library which allows for exploitation of programs that pass...