Home Search
install - search results
If you're not happy with the results, please do another search
Linux gifts for Christmas
Author: JT Smith
Why not give Linux as a Christmas gift? MozillaQuest Magazine (MozillaQuest.com) suggests you do: "Are you looking for a neat and very...
MP3.com win in hand, he takes aim at Windows
Author: JT Smith
InformationWeek.com has a feature on Michael Robertson, who's promising to deliver an operating system that can run both Windows and Linux applications....
Weekly news wrap-up: Microsoft sues Lindows over trademark, Red Hat considers trademark changes
Author: JT Smith
- By Grant Gross -
Linux start-up Lindows made the news this week, although probably not in ways it wanted to. You remember...
Roaming with your Linux laptop: Using QuickSwitch
Author: JT Smith
- By Mohit Muthanna -
Most Linux laptop users don't leave home without their trusted sword. They use it at home, at...
RedHat: Powertools: ‘Mailman’ update
Author: JT Smith
Red Hat: "Updated Mailman packages are now available for Red Hat PowerTools 7 and 7.1. These updates fix cross-site scripting bugs which...
Web review: XL penguin boxer shorts — cheaper by the dozen
Author: JT Smith
-by Tina Gasperson -
Anybody want a 36-inch penguin? LinuxMall has those. This is the kind of thing that would be good for...
Caldera Open Sources AIM Benchmark under the GPL
Author: JT Smith
aldera International, Inc. today announced it has made Suites VII and IX of the
AIM Benchmark available under the GPL (GNU General Public...
Connecting a wireless laptop or notebook PC to a wired PC network
Author: JT Smith
Reader writes: "MozillaQuest.com has a nice new series about wireless networking. In part 2 of the series, MozillaQuest Magazine reports : 'All...
Trustix: OpenSSH vulnerability
Author: JT Smith
Trustix: "A malicious local user can pass environment variables to the login process if the administrator enables the UseLogin option. This...
Trustix: ‘glibc’ Security advisory
Author: JT Smith
Trustix: "There is a problem in the glob(3) function of the Glibc library which
allows for exploitation of programs that pass...