Home Search

install - search results

If you're not happy with the results, please do another search

GNOME, KDE Aim at Windows

KDE and GNOME, the open-source software projects that together form the face of most Linux installations, have undergone revisions that boost their usability...

Not Yet Another Setup Tool Anymore

Long-time Linux security specialist Immunix has produced one of the first GUIs for YaST, a text-based installation and management environment in Novell's SUSE Linux...

Linux live and kicking – Part 1

Dipping a toe in the waters of Linux can be a daunting prospect. Friendly installers on major distributions take the edge off, but...

Hardening the PAM framework

In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...

HP’s NX5000 Linux notebook: A breach of the Windows wall?

Author: Joe Barr This article is supposed to be a review of the first PC with a Linux distribution preloaded offered by a tier-one OEM...

‘Microsoft negotiates’

Author: Robin 'Roblimo' Miller These two words were part of a recent NewsForge headline, and to me they were the two most important words in...

Hardening the PAM framework

In yesterday's article we began looking at how PAM can securely authenticate Windows users. Today we'll check the PAM framework, harden the basic services...

Thanks to Linux, this beer’s for you!

Author: Tina Gasperson Want to send your best buddy, boss, or promising client a drink "on you" via your wireless phone? You can, if your...

Codehost Releases BrightQ Pro v2.0

Codehost Inc. writes "BrightQ Pro v2.0 makes printing from Unix and Linux more powerful and seamless than everCULVER CITY, CA September 21, 2004 –...

Hardening Linux authentication and user identity

PAM is an authentication mechanism that originated on Solaris, but is used on various systems, including Linux. The Linux PAM implementation allows a system...